• 32 Posts
  • 852 Comments
Joined 3 years ago
cake
Cake day: June 22nd, 2023

help-circle





  • Thanks, yeah, my friends use Fusion 360. I don’t have a working Windows machine right now but maybe I can set something up or run under Wine.

    Yeah right now what I want to do is duplicate a shower door guide which is a 3 inch plastic part with some specific grooves and a screw hole. It’s incredibly hard to find the right one online or tell that it’s right. Home Depot doesn’t even have that kind of thing in their store any more. I do at least have a reasonably intact one that I can measure with a caliper.

    Yikes, a 28 minute video, but I guess I’ll watch it during some downtime at some point. Thanks again.












  • I’d stop short of saying “solution” but they can be of some help. There are still surveillance methods that work against them, maybe not to decrypt the actual messages, but to monitor who is talking to who and maybe jam the communications. When you say “protest” etc., do you mean you’re part of some big mob in the streets and you want portable gizmos to communicate with other people who are also protesting? Or do you mean you’re all sitting at home coordinating something and the wired internet works?

    Almost anything you do that’s scalable across lots of users and likely to be replicated, will also be targeted by surveillance. So the trick is to do something one-off that nobody else is doing and that isn’t figured into systematic monitoring. So that means concocting something unique or obscure, that only you and a few of your friends know about.

    Generally maintaining security in something like this is difficult and paranoia-inducing and you end up feeling like you’re in Spy vs Spy cartoon if you remember those. The only real solution is to get rid of the surveillance regime.