

I’ve been running navidrome for a few years, I can’t really think of any pitfalls. Have you come from any other kind of media server? Do you plan to stream to mobile clients?
I’ve been running navidrome for a few years, I can’t really think of any pitfalls. Have you come from any other kind of media server? Do you plan to stream to mobile clients?
Yes that’s right. Generally it’s considered best practice to offload SSL/TLS termination to a reverse proxy designed to do that.
A big part of the anonymisation of Tor is from the routing, so I’m doubtful that just using their Firefox customizations would be enough.
Using Tor Browser with default settings is probably the least time consuming way of reducing a site’s ability to uniquely identify you.
Hi, I’ve just seen this post. I use Navidrome and I’m active on Lemmy, so would be happy to moderate this community if you haven’t had any other offers.
It depends on your thresholds. Most of the weird shit was sexual, which I don’t have a moral issue with other than I didn’t consent to be exposed to it.
Unfortunately there were some other types of photos with content that we felt necessary to inform police about. Not explicitly CSAM, but children were involved.
Oh wow. I know we don’t know each other but I want to thank you, and other people, doing this job. It’s so important.
I worked two separate jobs doing film photo processing when I was a university student. The first was at a factory that handled a lot of police photography. I saw way more crime scene photos than I needed to.
The second time was in the photo development lab for a high street pharmacy chain. I swear, either people didn’t realise their photos were developed and handled by other people, or some of them really got off on us seeing their weird shit.
I’ve been using Ardour for quite a long time now.
You know, I love those albums where they fucked around did things like hard-pan all the drums to the right channel. I’m here for the experimentation.
Thank you, that’s all really helpful.
Thanks very much, I’ll try that out
Thank you for the suggestions! I’m trying to recreate one of the pads - the more ‘organ’ sounding one. The other more ambient pad sounds to me like it’s actually a guitar played with some form of tremelo picking/strumming, with a lot of reverb and delay.
Right, I understand.
There are browsers that implement a lot of Tor Browser’s anti-fingerprinting features, such as LibreWolf.
The problem is that if you’re connecting to a site from an unique IP address then you’re still uniquely identifiable regardless of how much your browser resists fingerprinting measures. If you have a dynamic IP address, information can still be derived from this to build an approximate profile for you (location, language, possible interests, statistically likely demographic bands etc.). It’s surprising how accurate these can get.
The strength of the anti-fingerprinting features in Tor browser is really an additional protection on top of the main anonymisation feature: the routing. Everyone using the Tor browser and routing appears (kind of) the same to a site.
Connecting through a VPN provider is a half-way measure, but still won’t be as good as Tor. To a site or tracker you’ll appear as one of a smaller set of people connecting from that VPN where your browser fingerprint is different from others in the pool of people connecting via that VPN. That may not be enough to personally identify you, but it’s enough to build a fairly well-targeted profile of you.
So tl;dr: anti-fingerprinting browser features are really cool and technically clever, but they don’t protect against all the ways you can be profiled. And somewhat counter-intuitively, using only browser-level de-anonymisation features could actually make you appear more unique to sites or trackers, because you’ll be one of relatively few people with that combination of browser and network connection profile.