Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SN
stupid_asshole69 [none/use name] @ stupid_asshole69 @hexbear.net
Posts
0
Comments
23
Joined
1 mo. ago

  • Once you get them out, you absolutely gotta mow a perimeter around the house and pick any crap laying against it.

    The reason mice run around the edge of the room is that they’re trying to find cover to stay out of sight. If you have a good ten feet of mowed grass between your house and the rest of the world, mice won’t cross it as much and you won’t pick them up from elsewhere.

    Same for junk laying around. I had a couple of stacks of tires and some chainsaws under an awning against the house and they got in that way. Put up a shed a couple dozen feet away and kept that part clear and they’re not around.

  • The internet as it’s been experienced by most living westerners is a product of a unipolar post Soviet world. Cryptography is widespread because it allows for transactions over a new medium.

    Alternately, if you want to be crazy, https intentionally builds a web of trust too complex for users to interrogate and acme normalizes accepting new certificates without any real scrutiny and tor is only secure if the exit and entry nodes aren’t communicating or storing data.

  • I know how that goes. I had to learn to recognize my own emotions and keep from letting them control how I go about day to day life.

    It’s weird to say but the same technique of feeling the emotion then putting it away for later that helped me control acute feelings like anger and sadness also helps me keep from getting disrupted by emotions that slowly well up like depression.

    Of course there actually has to be a later. There has to be a time when that stuff gets expressed otherwise it just builds up and overcomes your ability to function.

  • I cut down to one or two drinks a month, became more aware of my own emotions and developed some responses to them that help even things out.

    Having a normal routine helps. Like a “normal person” routine where you go to sleep at a reasonable hour, get up at one as well, eat healthily, exercise, wash yourself, spend time outside etc. making it a routine means it’s something you do automatically.

    That was really hard for me for decades. Sometimes I’ll still be awake far too late or skip a shower and have to catch myself.

  • At least a couple of years ago, rd was looked down upon because users only share within the rd network so despite using torrent technology and maybe even torrent releases only subscribers get the benefits.

    If you want an off ramp from it, private trackers are easy to get into now. They want interviews where they give you the answers first and people still fail them.

    What are you torrenting and watching on?

    If you’re one of those people who just leaves their computer on at home all day you can go ahead and set up the arr stack in preparation for getting that pi5 you mentioned.

    No matter if you stick with rd or switch to something else: If you have a spare old computer lying around you can use that too. People will say “no, your power bill!” but the cost is almost always negligible and the hard drives you add for more storage will be the same power draw no matter what. For me, running twelve drives in an old gaming case with a 4th gen i5 comes out to a little under a buck more a month than my rpi3 in the same (not really, I couldn’t plug the sas expander and hba into it, but with the drives in a set of external enclosures) configuration. And the rpi was less stable. And less upgradable. And less powerful and less efficient as I started to use the cpu more.

    A free/$20 “junk” pc starts to look a hell of a lot better in the long term when it’s competing against a platform that can only be cheaper per month at idle.

  • Some third party headphones and stuff show up like this.

    Go ahead and shut down the apps you have open, restart the phone and once it finishes restarting, turn on lockdown mode, install any updates asap and then do the privacy check up.

    You want to restart to get before first unlock security back on, then turn on lockdown mode because a lot of device and inter process communication gets disabled and if the problem keeps coming back you’ll know to start looking somewhere else. You want to check for and install updates because updates contain security fixes. The privacy check up will tell you what stuff you’ve given access to various ins and outs of the phone and that may tell you something useful.

  • Is that the button that does online shit?

    If they’re charging for online shit then the button that does online shit is t gonna work unless you paid to have online shit.

    I don’t think online shit should be $40 a month like psn is but having a button that does online shit require that you have the online shit subscription to work is a nothingburger.

  • Please bear in mind that even if you were to figure out a process for torrenting without a vpn in a jurisdiction with a law against it that you don’t want to bear the repercussions of, you still need to seriously audit and understand your own security practices.

    Just last week, the guy who runs the website “have I been pwned”, which hosts a searchable database of credentials that have been found in data breaches, was phished and had to add the people on his mailing list to his own websites database of people who suffered from data breaches.

    This person is a security consultant to many organizations all over the world and operates one of the first resources used to figure out the breadth and depth of an individual or organizations exposure to leaks.

    There are many cases just like this ripped from the headlines example.

    If experts in the field cannot guarantee their own security, it follows that you cannot do so either and you may be well served by thinking critically about your own capacity to perform the research required to accomplish the task you’ve laid out for yourself.

    To put it more succinctly, and I have to ask that you read the following with as much kindness, understanding and warmth as possible:

    You are likely not capable of figuring this out for yourself in a way that keeps you safe from the law.

    Please be careful out there and make good decisions. Not everyone on Reddit or lemmy is an expert and many people don’t have your best interests in mind.

  • I remember a while back the European country air is incorporated in passed an anti vpn law to prevent people from using them to stream soccer games (?). In compliance with the law, air said it wouldn’t offer services to people in that country.

    So depending on what country the op is in and how the company is complying with the law, airvpn might not be an option.

  • That’s probably a bad idea.

    Not only are you going from committing a crime in private to committing a crime in public, you’re putting yourself in one of the most vulnerable positions possible when it comes to computer security (every few months there are new attacks developed specifically to target users of free public wifi).

    Even if that wasnt a problem to you, businesses often have content blockers and traffic shaping to prevent you from torrenting and when they don’t you’ll be competing with everyone else actively streaming video and audio to their phones as well.

    It’s also trivial to figure out who’s torrenting on public wifi and has been for years.

    If you’re truly concerned about this new law then public wifi isn’t the solution.

    E: and if all that doesn’t convince you and you go through with it, you’ll be causing a problem that will actively make people look for you so the wifi isn’t completely jammed up.

  • I tried a lot of the alternatives before switching to a vpn for torrenting.

    For a long time I only used private trackers with encryption required and dht and whatnot off. It worked pretty good, especially with traffic shaping on the router.

    If you really want to avoid paying money that’s where I’d start. The problem you’re gonna run into comes from how the law is used against piracy, who does it and how.

    If I were gonna go that route today I’d set up doh or dot first. Both are free if you want to use mullvads servers.

    Good luck.

  • Free vpns sell your data. It’s why they’re free. Processor cycles and bandwidth cost money so if you want someone to use their processor cycles and their bandwidth to encrypt and route your traffic through their servers without clandestinely peeking, and using lawyers and advanced security techniques to ward off the police, you gotta pay them.

    In order to seed torrents you need to have a port on your vpn endpoint that is accessible to the internet and gets passed to the computer running your BitTorrent client. This is called port forwarding. There are only so many ports, so a vpn provider that offers port forwarding will probably charge more and you might not be able to get certified hood classics like :42069 because someone is already using it.

    I use airvpn for torrents but depending on your European country you might not be able to. There are other port forwarding vpns. The cost is cheap, most come out to less than $5 a month.

    Most let you run multiple devices at the same time so you might have your computer at home torrenting through the vpn while you’re away at work browsing porno on the toilet connected to the vpn which lets you get past the work content blockers.

    So… just pay for a port forwarding vpn.

  • Nothing is inexpensive, fashionable and free of the garment industry’s ills.

    Cheap stuff is cheap because it is made thousands at a time by people paid nothing and shipped as low weight/value containers on giant cargo ships leaking bunker fuel into the ocean as they go.

    If cheap and fashionable are most important, get a secondhand pair of shoes and put in new insoles. If it’s fashionable and good you want there’s a bunch of brands targeted at avoiding the particular ill you see in the world. If it’s cheap and good, hippies will tell you who the real criminals are.

  • Probably the best way is to unplug it from the charger and remove the battery.

    You can’t effectively use the device while it’s not vulnerable to attack.

    What kind of eavesdropping are you worried about? I ask because concern over advertising is different than concern about laser listening (a technology that was available to me in kit form as a middle school student many years ago).

    It’s not reasonable to ask how to avoid all eavesdropping because without any context you quickly start wondering if you could recover from being rendered and detained for the maximum legal duration in your jurisdiction.

  • Look into the t-series thinkpads. T480 is the meme one, but many newer models are very inexpensive and modular. I don’t have dells, but people who do recommend the Inspiron or Vostro ones. They’re similarly cheap and repairable. There are business class hp laptops for cheap too.

    For my needs these computers have been very useful and fast.

    Often a whole parts unit (bad screen, no ram, no hd for example) of one of these laptops can be had for the price of a single replacement part from one of the smaller manufacturers.

    Because they’re so common, new production third party replacement batteries are available and new old stock as well.

    If you value environmentally friendly actions, using these machines is literally taking plastic out of the waste stream.

  • If you haven’t already bought something:

    What do you have now?

    I would generally recommend against chromebooks. They’re often aimed at the lowest end of the market and have esoteric processors and boot processes that will make you frustrated.

    I would generally recommend against small laptop manufacturers like framework etc. because of parts availability. People will say that you can get parts from the manufacturer but for how long? People will say you can make the parts themselves because the design is open source but I have a board etching setup, hot air station and injection molding machine and I don’t do that.

    Obviously if you just want to “vote with your dollars” the above doesn’t matter.

    If you want to get a laptop that’s gonna run linux well and last a long time get a used business class machine. There will always be a huge market for parts and they have almost always had someone put the effort in to document getting their distro to work right on their work assigned computer.

    The black sheep option is to get a mac. Parts are everywhere for cheap and every microsoldering and computer repair shop will work on them because so many people have them and want to get them fixed. Obviously do your research first, but asahi is coming along and you’ve always got a Unix system to fall back on if it isn’t working out.

  • You’re thinking about this wrong.

    Instead of trying to pick the one that will handle a fail state best, you can more effectively assume a fail state and take steps to mitigate it. That is to say: implement key (in your case, password) rotation.

    Just establish a trusted system, log in and change your passwords periodically.

    You can even do rolling rotation where you only change a few each week.

    If that doesn’t seem like the right choice to you, then consider this: you’re thinking about an unconfirmed or possibly even uninvestigated situation where your secrets have been compromised. The solution isn’t to find the secret handling software that deals with this situation in the best way possible, it’s to change secrets.