A software developer and Linux nerd, living in Germany. I’m usually a chill dude but my online persona doesn’t always reflect my true personality. Take what I say with a grain of salt, I usually try to be nice and give good advice, though.

I’m into Free Software, selfhosting, microcontrollers and electronics, freedom, privacy and the usual stuff. And a few select other random things as well.

  • 1 Post
  • 865 Comments
Joined 5 years ago
cake
Cake day: August 21st, 2021

help-circle

  • Stupid article. For once, there’s no reason to call them a “Church”. They’re not. They specifically do some shenanigans, to legally qualify as a “church”. But that’s pretty much it.

    Secondly, they live off of secrecy and not getting their lunatic practices and beliefs exposed. Why call for letting them continue on that path? I’d say them not having any doorhandles anymore is a good thing. Now it’s less likely they can lure in some vulnerable people. Solely by the front door being closed and having no handles.

    I think if you write an article like this, don’t lead with all the church stuff, and bury the parts with the abuse and brainwashing at the bottom. Do it the other way round.

    (This comment is an opinion piece.)


  • I think there’s two concurrent, but different definitions of the word Fediverse. One means, software that can speak the ActivityPub protocol. And the other one means, social media service which is able to interconnect between different websites.

    The first one is more useful if you want to use it and know whether it connects you to your friends on Mastodon and the other big ones. The latter is the more technical definition and includes older protocols as well, as well as newer ones and alternative approaches to form a network in a certain way. I guess it’s the more correct one. But it doesn’t tell you a lot as a user. Maybe technically it can exchange your user statuses but nobody uses it so you can’t really do anything with it in reality. Or there’s two approaches and you were talking about a different manifestation than somebody else, and you’re both federated but not part of any compatible ecosystem.


  • Sure, I’m not debating that. And there’s other ways to destroy or impede (with) something to generate attention towards it. Sorry for getting political here, but other example that comes to my mind is how people supposedly cut cable ties of the German train system to draw attention to the cause of climate politics. It is massively annoying for all commuters, and people who are already on board for a more enviromentally friendly way to get to work. Because now everyone is 2h late, except people with a car. And I always question the validity of it.
    But ultimately it’s completely unclear who does it. Could very well be people trying to make climate activists look bad in some false-flag-operation. And in this instance (post deletion) I’m willing to believe it’s genuine.
    But the gist of it is the same… Is it going to archieve the long-term goal? Because the short- and mid-term way of working is, you’re being destructive to tear down the remaining good things about something faster, so it eventually is going to have to get replaced… And I’m more on board with, focus on direct constructivism. For example I just left Reddit and went here. And I’m somewhat happy the crowd working towards something is more pronounced than the people immediately trying to destroy it as well. I mean theoretically we probably should - by that reasoning. I’ve seen the AI scrapers hammer my Fediverse instance, too.





  • Ah, I get it. Yes. That section is weird. And it’s unalike the bureaucrat English around it. And I’d say the call to action: “Embark on a journey […]” is pretty much like ChatGPT sounded 2 years ago. I’m fairly certain the other text comes from humans with some expertise in writing legalese or specifications, and this will be a ChatGPT snippet.

    The committer also has this weird habit of naming their commits “Update Readme.md”. So I’m also fairly sure they’re not your average open-source developer using Git how it’s intended.

    Most other markdown files in that specific directory smell of ChatGPT as well.






  • I found some info here: https://ageverification.dev/

    But that’s difficult to read, very technical. And mostly written from the user perspective. It looks to me like they’re (for once) trying to come up with a proper solution. Everyone can be an Attestation Provider, Relying Party or repurpose the white-label App. At least in theory. It’s all specified and in the open. And then the European Union contributes some list of trustworthy Attestation Providers (governments, banks, mobile network providers…)

    I think due to the project structure, it’ll be more like the Covid-Certificate App, which could be customized by every member state and it’s theoretically possible to use it as one uniform solution.

    So unless there’s some certification for “Relying Parties” which I missed while skimming the documentation, I’d say in theory it’d be possible to use it on a technical level. Of course it’s still a preview so the EU has lots of opportunity left to mess it up.


  • Thanks for the nice conversation.

    Now that OP is inactive, I can also spoil the surprise: My link further up was Rick Astley singing: Never Gonna Give You Up.

    It’s safe to click. I just figured since OP isn’t listening to answers, I’ll give them some video to learn -hands-on- about videos on the Darknet.

    If someone had clicked the link, they’d get the opportunity to learn how fast or slow a video loads. And how it (likely) first requires the user to lift some security measures or videos won’t load at all. (At least my browser does, there’s no JS and then NoScript also complains about the media file.)

    We and other people in the comments pointed that out in the proceeding conversation. But nobody clicked the link anyway. I always have the feeling the groups of Threadiverse users and people with the capacity to surf the Darknet are pretty much disjoint groups. But it’s really nice to once and again talk to someone with some more knowledge and/or first hand experience. 👍



  • I think we’re somewhat on the same page here.

    That means going through an exit node […]

    I2P doesn’t have exit nodes. Once you load content from outside the network, that won’t be via I2P, only chance is to get it directly via another connection. For example your default internet connection. So either the browser or operating system is configured to block that. Or you’ll leak your IP.

    Then you didn’t have ‘Safest’ mode enabled

    Yeah, that’s why I said, use a dedicated browser for that. Something preconfigured to not allow any of that.
    Yet better: Use Tails like recommended by Snowden.

    Those are called bugs and they do happen […]

    I’m not so sure about this… Is “safest” mode really all you need? And does it reliably deal with 100% of the attack vectors? Last time I tried it wasn’t too good for example against browser fingerprinting (which doesn’t reveal an IP, but might be bad as well). And there’s a million ways from WebRTC, to trying to get the IPv6 address if all you did is configure an IPv4 proxy, DNS leaks, browser plugins, the webfont system does a lot of weird things, all the things done to do multimedia are very complex and might offer side-channels, I recently learned how to extract some information with CSS alone, no JS needed… Does “safest” really do a 100% job? I mean what I’ve done until now is to discourage people to mess with their browser settings themselves because it’s (a) easy to make mistakes or miss something, and (b) I wasn’t sure if that setting even does all the heavy-lifting without going into detail with all the other changes for example TOR browser bundle has?!

    I’d need to look it up but I think there’s a lot of opportunity without resorting to 0-days.

    EDIT […]

    Yeah, I think that’s why good (and easy to use) pron sites you’d “recommend to people” aren’t really a thing on there.

    And there’s the other thing that horny people might just click “allow” on something, because their brain is currently not in logical thinking mode.


  • First, this was an I2P link not a Tor .onion link. They are different, non-interoperable anonymity protocols.

    True. I wasn’t sure what people use to access I2P sites.

    first the whole point of Tor and I2P both is that nobody knows your IP address. Not even the website operator.

    Sure. And then they load some resource via the clearnet and get your IP address anyway. Or use WebRTC, or one of the several other methods to squeeze an IP out of a browser.

    Lastly, if you’re taking the trouble to use Tor or I2P in the first place – turn off javascript.

    And now your porn site doesn’t show videos anymore 😁 I have a hunch, this is one of the two reasons why there aren’t any good porn sites around… Despite OP not liking that answer…


  • Yeah. If you’re clever you use some TOR browser bundle or something like that to access the Darknet. Not only for security. You also void your anonymity / privacy once you use just any random regular browser.

    The Darknet is a bit of a mixture of people who use it for legitimate purposes, people who tinker around, and some shady people and trolls. So you’d expect some chance of someone trying to use JavaScript against you, or leverage other browser techniques to leak your IP etc… It’s not a frequent thing by any means, but it’s a possibility.