liveinthisworld

@liveinthisworld@lemmy.dbzer0.com
4 Post – 50 Comments
Joined 1 months ago

Does the UAE have something similar to China?

Unless they're doing some serious DPI (no idea how they would do that on Wireguard traffic other than plain metadata mining), the only ways they can stop traffic is by stopping anything to certain IP spaces, or certain types of traffic through certain ports, or a combination of both. If they have truly blocked the Mullvad IP space, then no this will not work, but OP mentioned using a different app to access them, which lets me assume that it was a problem with the client.

True, DoH and this will be useless

Just install wireguard on your OS and get the files from the Mullvad site. Also, pay in XMR

3 more...

Have they heard of VPNs or no?

7 more...

Nobody is hacking your computer LMAO. It just lets them establish a connection to your computer to leech the file(s), nothing more

Nice try RIAA. My favourite isn't in the Mega thread HAHAHA HAHAHAHA losers

Maybe I should have said "it's not anonymous based on your threat model"

Technically speaking, VPN logs tend to include the IP address of clients connecting to them, after which the good VPN providers like Mullvad, IVPN and maybe PIA tend to purge them somewhere in their process. Now, if the VPN is running in a RAM-only node, then these logs probably don't touch storage, which means there's not much need to shred information from hard drives for the VPN provider.

With that said, an ISP can technically log your traffic and see that you're connecting to the IP range associated with a VPN. That and perhaps some more covert side-channel/correlation attacks can, in theory, compromise your identity.

Of course, this is going deep into OPSEC and forensics, and I don't think the NSA is that interested in the average Billy torrenting "The Office" to go through that many logs, even if the studios sue in court. Hence, technically your privacy is somewhat maintained with the good VPN providers, but you're definitely not anonymous

1 more...

I can understand the argument against bandwidth, but how do you conclude that it is not anonymous enough? Even against a VPN?

2 more...

What you're talking about is supposed anonymity in obfuscation, and that has been proven to not work.

Also, most VPN companies keep logs and can be subpoenaed. Not all, but most. I2P is meant to anonymize your traffic, so I do not see the point of your statement

Read instructions/nfo

I start playing music on YT music, and if there's anything I like I will pirate it

Unless you PGP-encrypt everything by hand you've just lost the fight

Are recommendations against the rules?

2 more...

Can I share seeds over I2P?

They don't seem to be, so ultra, gigarapid, whatbox etc. There's plenty of lists online and on Reddit if you'd like to try something else

You'll have a hard time running AI on relatively affordable mobile devices

Tell me more about this special proxy

3 more...

Link broken?

1 more...

Thanks

I believe thunderbird has good PGP integration, and new users can just use Kleopatra instead of GPG on the command line.

The real question is, do your friends run Linux?

I wonder if it's possible to set up my own email server with Proton acting as a proxy in front of it. When other people send emails to me, it goes through proton and lands in my email server and vice-versa. Not exactly forwarding but acting as an end-point of sorts. I know nothing about e-mail so I can't quite get the right words for it.

If you're worried about metadata like time-stamps, message size and IP addresses, it shouldn't be too hard for someone of your technical calibre to spin up a VPS, install mutter, configure POP3, set up routines/automated actions with cron to send replies on a calculated but random schedule through a VPN/TOR/I2P. Yeah decrypting messages will have to be by hand but you're doing that anyway.

Why don't you use PGP with email?

And that's really cool

2 more...

Can I trust Deezer to not fuck it up? There were reports a while back that when checked in a spectrogram (or something) that Deezer was packaging fake FLACs by upsampling some other codec

True, but I could also get a beefy seedbox for $60 a year

Apologies for my tone earlier. I simply did not expect an in-depth and genuinely thought someone did a copy-pasta from another relevant thread/got an LLM answer in. It was my mistake to assume as such and I apologise.

Ah, indeed for some reason this part about the Linux kernel completely escaped my mind about it being a monolithic kernel. Yeah I can see the problem now. Unfortunate that OTA updates are the only way for updates to reach devices not supported by custom ROMs.

I'm sorry again.

They're getting sued right now

They're getting sued though. They don't need to stand up for us; them not taking shit is just acting as cover for us

1 more...

In Europe? I don't think they're available in the US

DM me about this please

2 more...

I'm just surprised they honoured the DMCA. It's a seedbox lmao what were they thinking???

It runs on a rooted device?

I feel like at least part of this is copy-pasta, but whatever. You make valid points, but I do not understand how it is relevant to the question. If proprietary drivers can be plugged in as modules (which is what GKI wants), shouldn't I just be able to update to the latest FOSS GKI myself (which is exactly what Google wants to do with Play updates to the kernel) and keep the drivers from the vendor?

1 more...

Sorry but I'm having trouble following the discussion. Copying over from another comment:

If I keep the proprietary drivers of the vendor in place and just upgrade to the latest GKI by Google, shouldn’t that be OK in theory? Unless the KMI itself changed and everything breaks.

1 more...

I don't understand: If I keep the proprietary driverss of the vendor in place and just upgrade to the latest GKI by Google, shouldn't that be OK in theory? Unless the KMI itself changed and everything breaks.

How about you teach wifey how to sail the seas? Seems like a win-win.

They should stand up for themselves which should in theory help pirates

As he said, paid with crypto and managed with his own keys. I don't see how the seedbox provider can trace you if you do that, so there's not that much to worry about

1 more...

I agree, Apple music is so massive that sometimes I can't find something on YT Music + Amazon + Tidal + Qobuz, and voila, it's on Apple music

Man, why is everyone like this? Please read the documentation, the traffic is encrypted and metadata cannot identify you. Unless the NSA has an active hack for I2P lying around, NO-ONE IN THIS WORLD can find out what chunks of traffic just went flying by your internet connection

4 more...

That shouldn't be possible in theory unless I don't know it well enough. Care to provide a screenshot?