The link to the above release post has the wrong caption for me. Its title says "Ambulance hits Oregon cyclist, rushes him to hospital, then sticks him with $1,800 bill, lawsuit says - Divisions by zero"

This was something I suggested for this instance, since there is even a guide for hosting an onion service: https://lemmy.dbzer0.com/post/135234

Maybe /u/db0 will have more time after the spam settles down, but it seems he's got a lot on his plate at the moment between being an admin and doing AI stuff.

[-] BermudaHighball@lemmy.dbzer0.com 5 points 1 year ago* (last edited 1 year ago)

Have OSes evolved enough that encrypted DNS is available? If so, would someone with enough technical knowledge link a guide on how to set it up within a popular OS?

I imagine that even if you plug in one of the suggested DNS provider IP addresses into your network settings, the OS is still going to make plaintext requests that your ISP can snoop on unless you require it to be encrypted somehow.

Note that H.264 and H.265 are the video compression standards and x264 and x265 are FOSS video encoding libraries developed by VideoLAN.

I agree, and with FOSS you have the opportunity to contribute back to the software. One time I was using commercial software and reached out to the company about how to decode a special file format for use in a script and the response was that it was "proprietary". If it was FOSS or even if they just had given me the information, I would have contributed to growing the ecosystem.

New account created today, yeah that's fishy.

Torrents use cryptographic hashes to verify the torrent content, so if he seeds it to you, then your torrent client will validate data he gives you. If the data doesn't verify or if he wants you to do anything else like clicking a link, avoid and report.

It's sometimes possible to find the same files on other download sites, but "retrieving dead torrents" in general isn't possible without having the same data.

247

In the past, most software I used was paid and proprietary and would have some sort of limitation that I would try to get around by any means possible. Sometimes that would be resetting the clock on my computer, disabling the internet, and other times downloading a patch.

But in the past few years I've stopped using those things and have focused only on free and open source software (FOSS) to fulfill my needs. I hardly have to worry about privacy problems or trying to lock down a program that calls home. I might be missing out on some things that commercial software delivers, but I'm hardly aware of what they are anymore. It seems like the trend is for commercial software providers to migrate toward online or service models that have the company doing all the computing. I'm opposed to that, since they can take away your service at any time.

What do you do?

This was data from pushshift before Reddit nuked it in March. You can find this torrent (called "Reddit comments/submissions 2005-06 to 2022-12") and others, including 2023-01 and 2023-02, on https://academictorrents.com by user Watchful1.

[-] BermudaHighball@lemmy.dbzer0.com 9 points 1 year ago* (last edited 1 year ago)

Note that Mozilla VPN uses Mullvad's network under the hood. Also, depending on your device you should be able to block connections that don't use the VPN. On Android, the "kill switch" can be found in the settings as described here: https://mullvad.net/en/help/using-mullvad-vpn-on-android/#block-without-vpn

Good question. It's not quite the same.

The most compelling reason is that browsing an onion service does not leak any information about the destination to an exit relay because the connection goes directly to the destination service. Connecting via an onion service makes timing correlation attacks much harder to carry out to deanonymize users since there is no exit relay to record when connections to lemmy.dbzer0.com are made. Posts and the timestamps associated with them on a public social network make timing correlation attacks even easier to perform, since there is evidence on which to validate the results.

It also acts as an advertisement about the site's commitment to anonymity and privacy.

9

Is there any chance that Divisions by zero could run an onion service so that its users could get the extra anonymity/privacy benefits that come with it when browsing over Tor? For comparison, Reddit also runs an onion service.

There is a setup guide for doing this with lemmy, which was published just a few days ago, at https://join-lemmy.org/docs/administration/tor_hidden_service.html

Use Tor Browser if you need anonymity, which isn't offered by private browsing mode or most other extensions. In case you don't want to route through the Tor network, Mullvad Browser offers the same fingerprinting resistance techniques as Tor Browser.

[-] BermudaHighball@lemmy.dbzer0.com 4 points 1 year ago* (last edited 1 year ago)

If you want to learn Python, the tutorial in the documentation is a thoroughly excellent starting point. Reading the documentation (the most up-to-date, deliberate content) will make you far more of a Python wizard than codecademy ever could.

There is a group trying to copy it at therarbg.com. Standards are not as high as rarbg as it appears and content is still being imported, but the interface is familiar.

You can also try bitsearch.to, which is just a general torrent indexer for torrents.

Neither is as complete as rarbg was. Ideally therarbg and others will come to fill its place.

view more: next ›

BermudaHighball

joined 1 year ago