• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: July 5th, 2023

help-circle



  • For the 40mm impact munitions in the list. Riot control gear.

    “Grenade launcher” here isn’t very specific. Could be like an M203 or something, which is a tube launcher that lobs 40mm rounds up to about 100m. You can absolutely get 40mm frag grenades and blow shit up, that’s what most people think of when they think of a “grenade launcher,” but that’s not what it’s on the list here. You can lob gas canisters, smoke, illumination flares, etc etc etc, just depends on what you’re trying to do.







  • Louis explains in several videos on his channel.

    They’re experimenting with a business model where they ask users to pay for the product if you get value from it. Development isn’t free, their time is valuable. In return they’ll never harvest and sell your data.

    If this experiment is a success it can demonstrate that it’s a viable business strategy to not harvest data, which is good for everyone.

    Personally, at this point I’m trying out the FUTO keyboard but it’s too janky for me to pay for it. Lots of bugs and swipe is not good. I hope it gets better and I’m trying to help the project by submitting bug reports.

    Grayjay I’ve barely used but I see the potential, and if it gets good I’ll pay for it. I paid for Signal messenger because it’s the same kind of thing.

    It’s up to you. They’re telling you what the price is, it’s the honor system if you use it and get value from it.



  • You’re mixing some things up. Yes, some agencies will have some POLICIES about not wanting to hire personnel with a history of drug abuse/use, but that is separate from the clearance adjudication process.

    A secret clearance is a secret clearance, and you’re correct that it’s much simpler to get a basic secret than it is a TS-SCI or to be read into certain programs. But there isn’t a “FBI” secret and an “Army” secret.

    There’s no timeline for how long it’s been since you’ve smoked pot, or number of times, or anything. I think a poster said that it’s about whether the investigation finds you trustworthy enough for the level of eligibility they’re investigating you for, and that is correct - and there isn’t a hard and fast rule necessarily.

    If you do an investigation and are asked if you’ve ever used any illegal drugs and you say no, but in your criminal record you have a possession charge, that’s bad. You’re obviously lying, and not even being smart about it. If you say you used to smoke trees every day and are blazed right now, that’s bad because you obviously don’t give af about laws and stuff (not my opinion, this is the opinion of the Fed that still thinks it’s illegal). If you say you used to smoke with your friend for a couple months in college a year ago but stopped and think that was probably a dumb decision, that’s not necessarily bad, it all depends on how the interview goes. They’ll ask for the names of who you smoked with and how you got the weed - so they can check if you were hanging out with known cartel members or just some other joe schmoe at UCWhatevs.

    At the end of the day it’s all based on context and a ton of factors. They dig a lot deeper and have a much higher standard for more selective clearances or programs, which shouldn’t be a surprise to anyone? But it’s all about whether you’re trustworthy to keep certain sensitive information from unauthorized people.


  • You’re not wrong about reolinks, amcrest, hikvision, etc but their price:quality can’t be beat and they work well with many different NVR software suites, which makes them popular.

    If you’re concerned about how they call home (they do, I’ve sniffed packets on my network to test the rumors and seen it on every one of them), you need to isolate the cameras off of the internet so they are blocked from the outside connection. This can end up being mildly tricky to very complicated depending on your network equipment, the way your LAN is set up at home, whether you want to view your cameras remotely, etc, but it’s the most cost effective long term option that is not subscription/cloud based.

    I use blue iris on an old computer. It works great. I have unifi network gear, and I tried some of their cameras out but they’re not really ONVIF compliant and they’re extremely expensive for an equivalent Chinese brand. That’s the made in USA price, and tbh Unifi cameras aren’t even that expensive, they’re more “prosumer” for small business deployments or nerds at home. They have a walled garden ecosystem that I dipped my toe into and didn’t care for some of it, but I still use their access points, routers, and switches because they’re great quality and really easy to config.

    But, if you have never done any of that, you might just want to go with an off the shelf solution or be willing to spend a lot of time reading. You DON’T want to mess up your network security trying to install local cameras if you’re not sure what you’re doing.

    One thing that hasn’t been mentioned yet is an RF/analogue camera kit. It’s not as easy to set up as POE (two cords to each camera and they’re way bigger so running them through walls will do more damage that you have to patch later) you can get an all-in-one NVR+4/8/12/16 etc camera kit with as many bells and whistles as you want. It will be cheaper as well and you don’t have to worry about network bandwidth issues because it’s analog. The feeds are super nice.