this post was submitted on 28 Mar 2024
859 points (96.5% liked)

Mildly Infuriating

35733 readers
2328 users here now

Home to all things "Mildly Infuriating" Not infuriating, not enraging. Mildly Infuriating. All posts should reflect that.

I want my day mildly ruined, not completely ruined. Please remember to refrain from reposting old content. If you post a post from reddit it is good practice to include a link and credit the OP. I'm not about stealing content!

It's just good to get something in this website for casual viewing whilst refreshing original content is added overtime.


Rules:

1. Be Respectful


Refrain from using harmful language pertaining to a protected characteristic: e.g. race, gender, sexuality, disability or religion.

Refrain from being argumentative when responding or commenting to posts/replies. Personal attacks are not welcome here.

...


2. No Illegal Content


Content that violates the law. Any post/comment found to be in breach of common law will be removed and given to the authorities if required.

That means: -No promoting violence/threats against any individuals

-No CSA content or Revenge Porn

-No sharing private/personal information (Doxxing)

...


3. No Spam


Posting the same post, no matter the intent is against the rules.

-If you have posted content, please refrain from re-posting said content within this community.

-Do not spam posts with intent to harass, annoy, bully, advertise, scam or harm this community.

-No posting Scams/Advertisements/Phishing Links/IP Grabbers

-No Bots, Bots will be banned from the community.

...


4. No Porn/ExplicitContent


-Do not post explicit content. Lemmy.World is not the instance for NSFW content.

-Do not post Gore or Shock Content.

...


5. No Enciting Harassment,Brigading, Doxxing or Witch Hunts


-Do not Brigade other Communities

-No calls to action against other communities/users within Lemmy or outside of Lemmy.

-No Witch Hunts against users/communities.

-No content that harasses members within or outside of the community.

...


6. NSFW should be behind NSFW tags.


-Content that is NSFW should be behind NSFW tags.

-Content that might be distressing should be kept behind NSFW tags.

...


7. Content should match the theme of this community.


-Content should be Mildly infuriating.

-At this time we permit content that is infuriating until an infuriating community is made available.

...


8. Reposting of Reddit content is permitted, try to credit the OC.


-Please consider crediting the OC when reposting content. A name of the user or a link to the original post is sufficient.

...

...


Also check out:

Partnered Communities:

1.Lemmy Review

2.Lemmy Be Wholesome

3.Lemmy Shitpost

4.No Stupid Questions

5.You Should Know

6.Credible Defense


Reach out to LillianVS for inclusion on the sidebar.

All communities included on the sidebar are to be made in compliance with the instance rules.

founded 2 years ago
MODERATORS
 

What is the difference between cellular data being used on my phone and cellular data being used on my notebook? Data is data.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 23 points 8 months ago (2 children)

I'd have a lot of fun trying to get around it. For example, if the phone and the computer were on the same non-Internet-connected wifi network, and you set up an SSH server to send outbound requests through the 4G modem, would they be able to find out you're using the hotspot?

[–] [email protected] 20 points 8 months ago (1 children)

There are a ton of methods carriers use to detect hotspot traffic, from the device itself handling the categorization, to TTL values attached to requests, to other very clever network sniffing strategies.

[–] [email protected] 6 points 8 months ago

Every method I've encountered in the past was thwarted by a good ole VPN. This was all on unlocked or rooted phones though so YMMV work carrier phones.

[–] [email protected] 10 points 8 months ago

I'd just try to disguise the traffic as coming from something else. Someone further down says just switching to an OS that doesn't actively snitch does the trick, but if you really wanted you could make your requests look like just about anything, given added volume is free.