• 0 Posts
  • 84 Comments
Joined 1 year ago
cake
Cake day: June 16th, 2023

help-circle














  • Right, a KVM’s usefulness is narrow and you’re ideally using it as a sort of backup to a backup of critical systems. That means you usually only hear about them in server environments, and that means that sysadmins pay a LOT of money for enterprise-grade KVMs.

    But it’s very cool that we can build a dirt cheap, half-decent KVM out of a Pi nowadays. I might have just left mine running if I there wasn’t a Pi shortage; I wanted that Pi for other stuff.


  • It’s good for critical systems that you might need to reboot and do things like see the BIOS (which you can’t see if you’re using a normal VNC-type remote access solution). It’s probably not necessary for most setups, but it can be very useful in certain situations. I made one myself, then literally never used it, and I’m now using that Pi in a different project.


  • Yes, but my point is that you’re asking a flawed question. It’s possible for us to give you a bunch of different services or processes to look for, but it’s trivial for these companies to just make a new service or process with a different name that’s harder to find. You’re trying to play a cat and mouse game that you’re not going to win.

    I work in IT. Most of our clients’ computers are managed by an MDM, which means that we can push ANY package or software to the computer at ANY time, without notifying the user. Most of our clients don’t bother with tracking software, but some do. And make no mistake, tracking software is basically legal spyware.

    So, my point is this: it doesn’t matter whether or not you have evidence of tracking software on your computer. Just assume that it’s there, and don’t use your computer for anything you don’t want your employer to see. That is the safest route.




  • The SIM is just an identifier. There’s nothing particularly special on a SIM card, that’s why the switch to eSIM has happened so seamlessly. So, you’re right; it’s totally POSSIBLE that an eSIM could stick around if you delete. But it’s also possible that your phone could save the info on a SIM card.

    For the record, I don’t think that’s likely. Your phone’s operating system (iPhone or Android) is built by a different company than the carriers that presumably want to track you. I doubt they’re secretly colluding with carriers, because Apple and Google (especially Google) have enormous business models built around tracking you, and profiting off your data.