considering that clicking on "status page" in the printer driver opens http://localhost:58510/index.html in the browser and Windows sees it as "Canon G2070 series HTTP", I wonder if they took the lazy path and the USB is used as a simple network adapter...
Moonrise2473
I specifically bought this to print photos, ink is not ridiculously expensive like other models, is like $150 per liter, which is still high considering that's colored water, but not the usual $5000 per liter.
i already opened it and filled with ink, if it was from amazon i'd do that, but i bought it from a small business and that would cause a big loss to them, the printheads are now primed and a return is e-waste as they're going to dry if sitting unused in a warehouse. At work we have many usb to ethernet print servers from the early 00s, they're now e-waste and i can get one for free (it's just that wifi is more convenient and i can place it wherever it fits, instead of routing a cable to the switch)
edit: wait... i realized only now that printheads are disposable (they're removable and not preinstalled) but they don't sell those as a spare part?????? FUCK! Will this be destined to the e-waste collection in 2-3 years?????
I also took 30 minutes of reading the manual before realizing that, yes it doesn't appear in the wifi network list because it doesn't actually have wifi connectivity...
edit before someone calls me dumb "u even don't know how to read the manual": the user manual is shared with other 10 models and has sections like "how to share the scanner in the network"
But it's global version or China version?
China version ROM is like this since the mi 6, the excuse was "limiting grey market sales"
Also the ROM now uses a different signature so from mi 5 onwards, flashing global ROM on china version, doesn't allow to lock the bootloader again (you can send the command to lock it, but then you get a softbrick)
Illegal but tolerated: just think to all the Chinese companies thriving on Facebook ads sales
They crack down on it only when they need to punish a specific target/person
When you enter China, you have to run their application on your phone to fill the immigration form. Way more convenient compared to the paper slip, right? 😉
It's this https://apkpure.com/zhong-guo-ling-shi/com.gov.mfa
Luckily, you don't need to install full malware but only medium malware, there's a way to run it as a web app inside tencent WeChat by scanning a special qr code.
I run this stuff inside insular because tencent is tencent and even on fully patched Android 15 without any file access permission they still manage to drop fingerprinting files disguised as images in /pictures/.gs_fs0
For connecting to my servers, technically ssh on standard ports isn't blocked (otherwise it would hurt their bots, no?) but I don't want to show my server IP address, so I use a hysteria2 proxy hosted on a Oracle VM in the Japan datacenter. There are services like doggygo that rent access to those proxys for literal pennies (like $2 per month) but payment need to do with alibaba's alipay or tencent wepay which is ultra traceable (linked to Chinese id+Chinese bank account+Chinese phone number) and very stupid. Honeypot?
There are reports of evil maid attacks where a secret service agent poses as room cleaner in your hotel room and tampers with your laptop when you're away, but for normal people this seems unlikely. Keep your electronics with you at all times, always use a VPN, check hashes of executables if really need to run them (better not) and you're going to be ok
In this specific case can do it but the bootloader unlock request must come from a Chinese ip address, from a verified Chinese number (get otp code via SMS) and wait like one month
They're mostly configured to ignore it, at most quarantine it
I set the mail server to bounce everything that doesn't match dkim.
I almost don't receive spam anymore.
The problem is that sometimes some legitimate services didn't configure their email server correctly
This could be an option but a little cumbersome to keep updated perhaps?
Debian on auto update with minimal packages lasts for years
Another option that I'm using is this:
- I do a encrypted backup with Borg on a separate drive on my server
- On my work desktop PC, Windows, at boot it connects via ssh and syncs that Borg backups on a new HDD that I purchased and installed, one way sync, silently and without prompts (We are a small business and I am allowed to do that, if you're not allowed to do that it could be your parents PC)
- Success syncs are pinged to healthchecks.io which emails me if after too many days (configurable) the sync hasn't been completed
- Errors are also sent to healthchecks.io
- Company group policy settings then keeps my backup server automatically updated
I Hope for astrobot PC