Yet Another Tech Blog, focused on digital privacy, open-source tools, OS/firmware tweaks and building tech that works for you, not against you.| Metalhearf's Blog
Introduction # Let’s address the elephant in the room: you’re probably here because you want to activate Windows or Microsoft Office without paying Microsoft. That’s bad, but who am I to cast the first stone. Maybe you’re a student on a tight budget, a filthy cracker who just wants to “crack Windows, get the job done, and move on” without any philosophical debate about software freedom, or perhaps you’re just tired of subscription models eating into your wallet every month. Well...| Metalhearf's Blog
Introduction # You know that feeling when you see a 47 second voice message in your group chat? That little sigh of resignation before you reluctantly tap play, knowing you’re about to invest nearly a minute of your life listening to something that could have been summarized in a single sentence? Voice messages have quietly invaded our digital conversations, transforming from a convenient feature into what many consider a digital nuisance. While proponents praise their emotional richness an...| Metalhearf's Blog
In this guide, we will explain how faillock works and how you can configure it to avoid account lockouts, or reset your account if it’s locked due to too many failed login attempts. Whether you’re troubleshooting or improving the security of your system, this guide will walk you through everything you need to know. What is faillock? # faillock is a security feature that prevents brute force attacks by locking a user account after multiple failed login attempts. By default, after 3 failed ...| Metalhearf's Blog
Introduction # If you are on X, formely known as Twitter (or any social media to be honest), there is a lot of personal usage data that could be very interesting that you generate by just using their service. This data is generated based on the tweets you write, retweet, like or share and pretty much anything else you do within their app. Those Interests allow X/Twitter to generate a more or less precise targeting profile to better serve their advertising and editorial algorithm. For better (...| Metalhearf's Blog
Introduction # In this article, we will set up a Middle Relay, that will hopefully quickly be promoted to a Guard on the Tor network. Before going any further, be sure to understand the implications of this type of relay by reading my dedicated article first! Tor Relay Types Explained 2021-09-21·4 mins Linux Tor 1. Installing Tor # I used a Debian 11 (Bullseye) in this example. To make this tutorial easier, we’ll install tor from our package manager. apt update && apt install tor 2. Config...| Metalhearf's Blog
Introduction # During one of my long scrolls through Reddit, I once discovered a post proposing different ways to participate in the open source world. Among the obvious solutions were: participating in the development of open source projects, using your connection to seed Linux ISOs (😉), or even… hosting your own Tor relay. I quickly got interested and started learning more about it (technically, legally, etc.), and since then I’ve been contributing a few nodes to the network myself. ...| Metalhearf's Blog
If you are a still a lucky owner of a Nintendo Game Boy (the original, Color or Advance version), you should give a quick check to your games and saves to ensure they are not vanishing into oblivion. Technical limitations & conception # Today’s save systems in games # It’s pretty common nowaday that the saves of our games to be stored locally on the device your are playing on: your computer, console or even smartphone. Depending of which one, it could also be stored on a SDCard (looking a...| Metalhearf's Blog
Yet Another Tech Blog, focused on digital privacy, open-source tools, OS/firmware tweaks and building tech that works for you, not against you.| Metalhearf's Blog
The EU is pushing legislation that would scan all our private messages, even in encrypted apps.| Metalhearf's Blog