What are we talking about? Each time you connect to your WLAN Access Point or turn on your mobile data, Android tries to check if you’re not only connected with it, it wants to do a check for Captive Portals. Usually a Captive Portal Check makes sense whenever you’re in a hotel or airport because in such a case you get a code/coupon to login into the WLAN, this acts like an activation/authentication process.
Logos are owned by their respective brands/corporations. A quick tour on how 8192.one is set up and configured. The only expense incurred is the cost of owning the domain. Everything else, GitLab CI/CD, Cloudflare is on free tier. An architectural overview. Vscodium Vscodium is a fork of Microsoft Vscode which attempts at eliminating Micro$oft’s telemetry and phoning home. Official website: https://vscodium.com/ Hugofly plugin for vscodium. https://marketplace.visualstudio.com/items?itemName=akmittal.hugofy Hugo: Hugo is a static site generator written in Go.
Image by LineageOS. I have been building my own lineage images for a while but, I have to say this is by far the simplest method. Sit down and eat, no cleaning up the kitchen. This is a quick guide for building lineage with the lineageos4microg/docker-lineage-cicd docker container. Why? Cross platform, docker runs almost anywhere. So if you are stuck on windows, no need to boot up a VM and potentially lose on performance.
Shelter? Shelter is a free and open source app that employs the “Work Profile” feature of modern Android phones to provide further control and isolation between apps. Why should you use this? Apps inside shelter get a separate virtual file system that is isolated from your primary, where all your apps live. This means any sketchy big brother app you install with Shelter will have its own isolated file system and contacts (As seen in the picture).
This is a modification of a bash script originally authored by me but altered to work with slack by a fellow redditor at /r/netsec going by u/FunDeckHermit. Now I am not a slack user for ideological reasons, but I understand some may be. So this is for them! Operational security disclaimer: This script isn’t designed to gain logs of ‘anyone’ trying to gain authorized/unauthorized access to a machine with SSH.