About:

Writes at Wrongthink about digital freedom, privacy and security. Libre hardware/software devotee pursuing off‑grid self‑sufficiency and P2P/federated tools to help others reclaim digital autonomy.

Website:

Specializations:

Interests:

Digital freedom Privacy Security Suppressed information Exploring uncomfortable realities Free/libre software Owner-controlled computing Hardware without remote management backdoors Debian Linux and Alpine Linux P2P, federated, and self-hostable social networks Bulletin board forums Off-grid living and self-sufficiency Darknet/uncensorable platforms Helping others reclaim digital autonomy

Outgoing Links:

Felipe Contreras
Subscribe to RSS:
The blog post discusses a solution for managing remote systems with dynamic IP addresses, emphasizing the need for privacy and minimal reliance on intermediaries. It critiques conventional methods like dynamic DNS and email alerts...
The post discusses the importance of data availability in backup systems, emphasizing simplicity and control over backup solutions. The author shares personal experiences and evolution of their backup routine, advocating for a 3-2...
The post discusses the necessity and implications of content piracy, particularly in the context of media that is restricted by DRM, geographic locks, or proprietary platforms. It argues that piracy can serve as a form of protest ...
The blog post details a personal account of upgrading the Debian operating system from version Lenny to Squeeze. It discusses the challenges faced during the upgrade process, including compatibility issues with various packages an...
The author reflects on their criticisms of uBlock Origin, questioning whether their expectations are too high. They discuss the tool's weaknesses, particularly in cookie handling and CSS filtering, and explore complementary extens...
The post critiques Microsoft's recent strategies in Windows 11, highlighting the forced online account creation, the introduction of an AI agent to manage complex settings, and the integration of Edge as a dependency for desktop a...
The blog post discusses the use of OpenSnitch, a network firewall for Linux, which allows for application-specific firewalling. It provides a detailed guide on setting up OpenSnitch, including configuring default settings, creatin...
The blog post details the author's experience upgrading from Debian Squeeze to Debian 7 Wheezy, highlighting key features and historical context of Wheezy, including its support for IPv6, the introduction of systemd as a tech prev...
The article discusses the current state of computer architectures, focusing on RISC-V and OpenPOWER. It highlights the challenges faced by OpenPOWER due to proprietary practices and a lack of serious commitment from its founders, ...
The blog post details the author's experience upgrading from Debian Etch to Lenny, highlighting the technical challenges and changes encountered during the process. Key points include the management of package selections, the tran...
The author embarks on a personal journey to upgrade through historic Debian releases, starting with Sarge and moving to Etch. The post details the upgrade process, including necessary commands, configurations, and challenges faced...
The post discusses the implications of privacy-oriented users in the alt tech and open source communities who often misrepresent their device metrics to avoid tracking. It questions whether this self-erasure is ultimately harmful,...
The post discusses the advantages of using OpenSSH for digital security and system administration, emphasizing simplicity over complexity. It critiques the trend of using overly complicated web services for tasks that can be accom...
The blog post discusses the author's experience upgrading from Debian Buster to Bullseye, detailing the transition process, challenges faced, and the new features introduced in Bullseye. It highlights the significance of the cross...
The blog post discusses the Debian Buster release, highlighting its position as a transitional version between older and newer technologies. It details the upgrade process from Stretch to Buster, including necessary preparations l...
The blog post discusses the upgrade journey from Debian Jessie to Stretch, highlighting significant changes and improvements in the operating system. It covers the introduction of the Wayland display server, the transition from ip...
The post reflects on the author's experience upgrading from Debian Wheezy to Jessie, highlighting the improvements in the Linux operating system, including the transition to systemd, the introduction of new tools, and the evolutio...
The author reflects on their past experiences with Linux, specifically Debian, and embarks on a journey to install and upgrade Debian 3.1 Sarge, the version they first attempted to use. They detail the challenges faced during inst...
The author discusses the importance of using local mail agents for system notifications on user devices, highlighting the limitations of traditional email notifications in a server environment. They recommend using GNU mailutils f...
The author critiques the current housing crisis, arguing that property owners who hoard multiple homes are morally bankrupt and contribute to the plight of those in need of housing. They introduce terms like 'landleech' to describ...
The post discusses the low adoption rate of DNSSEC, with only about ten percent of registered domains utilizing it. The author shares their decision to implement DNS authentication for their site, particularly due to the nature of...
The post explores the nostalgic portrayal of upper middle-class suburbs in films from the 1990s and 2000s, examining how these settings are depicted as lush and green. It discusses various films and TV shows that capture this aest...