

A solution to what exactly? Nobody has provided any information about definitive risks.
An as OpenWRT goes it would either be a permanent solution or no solution at all. How would it be temporary?


A solution to what exactly? Nobody has provided any information about definitive risks.
An as OpenWRT goes it would either be a permanent solution or no solution at all. How would it be temporary?


I have one mikrotik poe AP I use and am quite happy with, but certainly not something I’d recommend for non-technical people because it’s firmware isn’t consumer friendly.
However my question is really what’s the real risk in using TP-Link devices. Neither the article or any of the comments link to any explanation of the actual risks. Is my network actually open to hackers now? Is my router able to be used for dos attacks or for other purposes now? Everyone is acting like their flaws are common knowledge and there’s zero info about genuine flaws or exploits.


Do you have any information to share about their bad security? I have a couple of their routers which seem to work quite well. Any I really at risk, and anymore than I would be with something from Linksys or Netgear?
They are not bugs that will eat your food though, which was the point I made.
I had one plop off the ceiling onto my shoulder while I was working a few weeks ago. Took a pic and sent it to my daughters to remind them spiders are our friends and then took him off my shoulder and put him on the ground.
My philosophy… if he’s surviving in my house, he’s eating bugs and providing a service.
Spiders are keeping your house free of bugs that will eat your food if they find it. They’re working hard and get little thanks.

And if your apartment building was 5 buildings away, burned down and your children died due to their wreckless behavior, predictable outcome, wanton disregard for the lives of the innocent people all around and prevention of firefighters from responding to the scene, what would you call it? It was just an oopsie?
INAL but it actually meets the definition of 3rd degree murder is Pennsylvania I believe.
“In Pennsylvania, third-degree murder is a homicide committed with malice but without the specific intent to kill (first-degree murder) or during the commission of a felony (second-degree murder).”
When you’re in just as much or more danger from the “good guys” as you are the “bad guys”, and they have an equal disregard for the law, they’re no longer the good guys.


Did something similar… turned the electric stove on high, waited until coil was glowing red and then touched it with my finger. I still remember how excited I was waiting for it to glow! 😄
That finger has no normal fingerprint now - the ridges and swirls are gone. Kids are dumb.


You won’t go low on vitamins if your carnivore diet incorporates organ meat. Most people don’t want to do this however. Liver isn’t terribly popular, kidneys and other organs even less so.


Powershell works really well on other OSs now. I use it on MacOS and Linux daily. I might loath MS but Powershell is a fantastic shell and after working with an object-oriented shell I hate going back to anything else.


Interesting… thanks for the reply!


So did you just cancel the HBO max subscription in YouTubeTV, or did you cancel YouTubeTV altogether?


That used to be true but no longer. For anything but gaming Apple’s M series chips are amazing.
I’m a 30+ year Windows and Linux user and developer that preferred machines I could build myself. A few years ago switched jobs and was given an M1 Pro for work… it’s incredible how good, fast and low power the M series are. I’ve used my laptop 8 hours straight without plugging it in. That’s simply not doable with any other machine.
I still dislike their walled garden, and for high end gaming Apple’s a no-go, but for most things it’s hard to argue with how good they are. The machines may come at a premium, but they are high quality, work great and for battery use they don’t have a rival.


In theory the unique id produced by the scan could be salted by you, uniquely for each website or application, and then provided to the site. This would keep aggregators from being able to track all your activity, or at least it would if they didn’t already have fingerprinting techniques that do it without the need of another unique identifier.


I’d put it in the lawful category. 4 space indentation and other strict formatting requirements chaffs me to no end, just like a hard-ass teacher requiring name and student number in some specific and strict format at the top of a page.
I don’t have it but one of my kids does. She sees colors with certain numbers and letters. Certainly doesn’t seem to have a downside for her and in my reading I haven’t heard of a sensory overload issue. Is this strictly related to the synesthesia or perhaps synethesia exaggerating an existing autistic or ADHD issue?
Your description of hearing shapes and colors sounds a lot like someone with synesthesia, a rare condition that’s seems to have no downsides and only benefits.
Thank you for that! I’m keeping the cvedetails link bookmarked.
My two devices, the Archer BE9300 router and the TL-WA3001 AP aren’t listed with any known vulnerabilities, though I suppose it may be they haven’t been tested. The BE9300 is pretty popular though so that would be surprising.
The known vulnerabilities in their other devices don’t appear malicious or any worse than other common vendors either however. Given the state of the US government and its desire to monitor it’s citizens, I can’t decide if it’s contempt for TP-Link is a bad thing or not. They might just be mad they can’t get the vendor to give them a backdoor.