

Can someone prove me wrong, I thought Crucial was a big deal in consumer memory upgrades?


Can someone prove me wrong, I thought Crucial was a big deal in consumer memory upgrades?
Yeah, by virtue of not owning the entire connection (which is impossible unless you own the ISP, intermediary providers, and the service you’re connecting to) somebody somewhere is going to see something that may be identifiable to you. There are services that are offered by many companies for huge enterprises that give you basically a direct connection to a data center and a lot of times that traffic can be totally encrypted, but it’s usually for very big enterprises and isn’t cheap to get.
And you’re definitely helping the privacy part running a VPN on the router level, but still, there’s always a chance of something getting leaked. It’s pretty low and gets better all the time, but that chance always exists. It’s the reason why air gapping is still a thing for things that ABSOLUTELY cannot be attacked/compromised/viewed by some random person.
Again, if you’re going off of a privacy stance, you’ve made things hard enough that unless a huge ISP has some kind of agreement to sell data to advertising companies and spending the time to implement services to get you and the 2 percent (which is probably a huge overestimate) of customers taking similar steps, it’s just not worth them making the effort.
For whatever it’s worth, that’s not a huge privacy violation. Most routers auto-identify devices. Most IP scan tools just identify the device by default too.
If it’s a good enough public/hotspot network, they will have “client isolation” turned on and it’ll keep you from seeing any other devices but the actual network equipment.
Some of that is built in (mostly if it’s an ONT/router combination unit). And a lot of what they can see is just because you’re sending all of your traffic through them no matter what VPN you’re running. Knowing MAC addresses is pretty much a requirement for “the internet” to work correctly and, while you can obfuscate a MAC address on some devices, there is a (small) chance that can cause problems too.
I know hearing from someone that actually works for one may not be super convincing, but if your ISP is a smaller provider than like AT&T/Spectrum/Cox, they are almost certainly not going to spy on you just because they want to. I’m a customer of the ISP I work at. If I was told tomorrow I had to turn on some kind of deep packet inspection/intercept/spying service, I’d resist it as much as possible simply because I don’t want to see that and I don’t want someone to see what I’m doing. I can only assume that other companies have similar positions on the matter.
I work for an ISP. There’s a number of ways that that they could have figured it out and probably 98 percent of them are genuinely there as a troubleshooting method and nothing more.
As another user said, if it’s a fiber connected ONT, there’s some remote management tools we can use to see what’s there. Some ONTs have a router built in as well and in some cases, we’ve actually done a site scan of WiFi networks for customers set up like you. We can see all the WiFi devices nearby and pretty quickly tell you “yeah, your speed/connectivity issues are because you have about 80 2.4ghz networks being broadcast around you.”
If they offer their own routers, someone could even do a site scan off of your neighbors routers and get an idea what’s around. If most of your other neighbors are using their own routers ISP provided router and you’re the odd one out, odds are that non-ISP device they’re seeing is you. This one is the least likely though, there’s a number of easier methods to see what’s the device is besides using other devices in neighboring houses.
Additionally, there’s a chance they did document something like “customer is using their own Asus router, not ours” and they just checked ticket/service order history. They could have got this from you telling them in the past, a technician being onsite and seeing this, or as the other comment mentioned, you’re connected to their network, they’re going to see the MAC address of the device plugged into their equipment in a few places pretty easily.
Because you weren’t going to pay. The people that don’t know any better/have the money to spend on a subscription would just as soon pay for the convenience of not doing everything above.


I’d tell you why that is but due to some vague, shadowy group that I won’t ACTUALLY name but give vague hints about, I can’t tell you.
I think it has a lot to do with what you’re comfortable with.
Are you going to store just movies and TV shows? Then yeah, a RAID failure that can’t be recovered from for one reason or another won’t be the end of the world.
Storing priceless family photos that for some reason you’re ONLY storing here? Maybe go to the extra expense and do it “right.”
You’re introducing multiple points of failure to a system designed around protecting against failure. Everyone is going to argue against it because it’s additional risk that can be avoided. There’s also a chance of the host computer chipset going wonky and disconnecting the devices (I’ve seen it enough times it IS possible. Usually a reboot fixes it, but odds are the RAID would still need rebuilt), or a bad USB cable, or you forget that it’s in a RAID and plug it in to another computer, or any other hypothetical that seems unlikely but could happen.
If you want my advice that you didn’t ask for, plug them both in and mount them separately, put all data on one of the drives, then use a tool like FreeFileSync to copy all data over to the second drive drive. You’ll miss out on the theoretical 2x read speed, but this way if one or the other DOES come disconnected, you just need to plug back in and you’re back working without a chance of a RAID needing rebuilt.


A much better way of putting my point.
The fact that someone like him was elevated to the status he was coupled with someone feeling they needed to go as low as killing another human to make things better is insane. I hope American history (as long as America still exists long enough for this to become history) looks back at this like we looked back at other huge events in American history and some 4th grade teacher someday has to try to explain to our great-grandchildren how we let things backslide to this point followed immediately by a chapter on the first presidential debate held entirely virtual with augmented reality and holograms.


I can’t say I feel sorry for him, specifically.
But anyone who can’t agree with the fact that us being here, where a man (whether you agree or not) was shot at a public event for his beliefs and people are celebrating it, is absolutely insane for things to have gotten to this level, needs to do a bit of thinking.
And I mean that as, whether you think it was his beliefs (which I fully believe are WILD) that led to him being shot because they had no basis in reality and only sowed hate or the guy who shot him was crazy and shot him, we all need to admit, this situation is so far out of normal that I’m not sure there’s a chance to go back.


Not sure when Croatia switched to digital, but I think the year they found her was around the time the US had only just switched to digital.
So everyone else has good points but there’s one other part I don’t think was mentioned.
Most ISPs use a PON based network. This lets them connect one fiber in their network and “split” that to up to 128 (or more, depends on the OEM) customers. You need a either GPON (Gigabit passive optical network) or XGS-PON (10 gigabit symmetrical passive optical network) SFP module and usually the ISP has to get a serial number off of that module to provision the proper data service.
This is contingent upon the ISP being willing to do that. The one I currently work for, we really don’t do that except for businesses.
Lived in Kansas my whole life. Can confirm I grew up with and now own more lawn chairs than people that live in my house (gotta have extra for guests).
I do however enjoy hiking, I just have to leave the state to make it “hiking” and not a “long walk.”

I still see it.
That’s assuming IF there ever was a push to build things like this to help homeless they WOULDNT find a way to make it look as inhumane as possible.


For what it’s worth… I can’t find the source, but I saw specifically that staff said that was not true.
What about a WiFi connected smart outlet? It can be voice controlled or controlled from a phone or turned on at the outlet. You can set just a “run timer” (from the time I turn it on, run 2.5 hours) without it repeating.
AND if you need to make sure it’s off at any point, just check your phone.
TP Link Kasa outlets can run for 23 hours and 59 minutes at a time.
Nothing says professional like a Gmail account.
Also, try harder to look legit next time. Your title says $280,000 and then in the post, you got back $65,000.
For anyone else seeing this post… If you have to pay money to get your money back… they’re using the fact you were gullible enough to be scammed to scam you again.
All good here. Been running it for a few hours. The weirdest thing is the UI stuff that has and hasn’t been changed.
Reminds me of Motherlode back in the online flash game days