This works really well. I also open the downstairs windows. The hot air going up and out creates a draft effect, sucking in cold air from the downstairs windows.
wintermute
Every frickin day... at least once, I read a post's title and start looking around for clues that it's not real... My mind goes: "is it the onion? Is it April's fools again already? This can't be true..."
Username also checks out.
Also known as Aguará Guazú, meaning big fox in guaraní.
+1 for Volumio! I didn't know it can use Jellyfin as a media source. To be fair, I just started using Jellyfin and didn't want to migrate everything to it until being sure it will stay. So far it's looking very good though.
- 'No' is already the default, that's why you get the banners, to trick you into opting in. There are a couple of filters that you can enable in uBlock Origin to get rid of (most of) the banners.
They also want billionaires to know that is a bad idea to turn against them.
I recently installed the "Dataview" plug-in, and it's amazing. You can create documents or sections by querying data from other documents, effectively using Obsidian as a database.
I don't think git is the right tool for this. It's designed for text files, not binary. Also, there's no need for version control here. Git won't store diffs of binary files, so if a file changes (even the slightest change like an mp3 tag) it will keep a full copy of the old file.
OP wants to sync, so I would use rsync here. It will be way faster and efficient. If you want to know what rsync did, you can keep a log file of it's output.
This is the way... You can build one with an ESP dev board and a couple of components. M5 stack has a couple of different ones that already come with IR and the firmware is pretty easy to download and install.
I think BLE is only required for the initial compromise (extracting the pairing key). After that the attack can be performed over classic BT, and can impersonate either part (headphones or phone) to the other.
It's still very targeted and sophisticated, so no reason to panic unless you have reasons to think someone with the resources could target you.
Regarding the attacks, they go way beyond eavesdropping calls, since BT headphones usually have access to contacts and smart assistants, that you can use to extract a lot more information