emotional_soup_88

joined 1 month ago
 

I successfully setup an obfs4 bridge. I would've wanted to contribute with a normal middle or entry(?) relay, but I don't know where my ISP stands on the subject...

The stats are slowly starting to roll in after two days of uptime. My distribution method is still being reported as 'Telegram' only. Do I need to add 'any' or explicitly mention the other methods in torrc, or is it a matter of time before the other methods also start working?

I have a 1 Gbps connection. Is there a way to maximize how much I give to the bridge? Either through the OS (Linux) or through torrc?

Is it a huge blow to the bandwidth and/or reachability if I only use IPv4? If that's the case, I'll have to check with my ISP whether the public IP that they gave me also includes an IPv6...

Any other recommendations are also welcome! Especially now that the Danes reportedly are starting to use Signal in such numbers, which to me means that there might be a need for further censorship circumvention and/or internet anonymity...

[–] emotional_soup_88@programming.dev 5 points 2 days ago (1 children)

Haven't checked my low level sound drivers in a long time - I'm using pipewire and wireplumber to control it all. Is ALSA still there at the bottom/as a dependency? Arch btw.

I also remember using DC++: https://dcplusplus.sourceforge.io/webhelp/index.html

Bittorrent is probably better for anonymity/privacy, though, right?

Emotions, soups and two upright eternity signs. You're right. F...

Depending on where the alleged offenses were committed, not decrypting that for which the authorities have a warrant to analyze can be a crime in itself. I'm all for encryption, but without plausible deniability - something that VeraCrypt offers with their hidden volumes feature - encryption might by itself not get you far. Again, depending on the jurisdiction in question. And depending on whether the authorities really want to invest the time and money into "catching" one pirate. And, finally, at least encryption gives you the choice not to decrypt on demand. I just wanted to give encryption some nuance.

[–] emotional_soup_88@programming.dev 15 points 3 days ago (2 children)

HOW COULD I MISS THAT OPPORTUNITY

crying myself to sleep

[–] emotional_soup_88@programming.dev 20 points 3 days ago (4 children)

It had to be 'toys' and not, say, 'loot'? 😳 Sorry, I hear what I wanna hear...

Most recent white lie: probably something I said not to hurt another person (cute baby/you did great/how could he/etc).

Most recent indecent lie (to save my own ass/to defame or to hurt somebody/etc): I have never tried drugs.

 

An interesting paper, which gives an overview on a few decentralization solutions while also pointing out their limitations. It aims at suggesting a reference framework for a decentralized internet, as was its purpose initially. Before the age of Evildoers. Before the age of Zuckerberg.

[–] emotional_soup_88@programming.dev 2 points 4 days ago* (last edited 4 days ago)

This about the IFS variable was eye opening! Thank you SO much! This is exactly what I was trying to understand, namely, how on earth the for-loop is smart enough to understand how to count when I haven't specified a numerical interval (as I do in for instance C when I practice that). This just solved it all. Thanks! Now I also understand why my code gave me excessive outputs when I changed ls into ls -l. The IFS variable made the for-loop count every single blank space!!! :D

[–] emotional_soup_88@programming.dev 1 points 4 days ago* (last edited 4 days ago) (1 children)

Reading this part of the Bash manual for the third time today, I think I finally understood it better, thanks to this part in particular:

[...]execute commands once for each word in the resultant list [...]

In other words, whatever follows in is half expected to result in a list of words (items), each for which command is then executed. Beyond that, I guess I'd have to simply look at the logic behind for-expressions.

Thanks!

[–] emotional_soup_88@programming.dev 6 points 4 days ago (1 children)

I was a teacher for some years and I absolutely understand your style of explanation. I don't find it condescending at all! Thank you so much for the in depth guidance! Some of it I already knew, some of it I didn't. Anyhow, a new perspective is always appreciated! :) God, Bash (GNU/Linux in general) is so much fun!

18
[GUIDANCE] "For" in Bash (programming.dev)
submitted 4 days ago* (last edited 4 days ago) by emotional_soup_88@programming.dev to c/linux@programming.dev
 

Edit: SOLVED. Thank you all for your incredible insights! All of you helped me improve my code and knowledge! Special thanks to @Quibblekrust@thelemmy.club who just NAILED it. :)

I'm playing around with Bash just to learn.

LIST=$(ls); for i in $LIST; do echo "I found one!"; done

The variable "i" could literally be anything, as long as it doesn't have a special meaning for Bash, in which case I'd have to escape it, right? Anyway, my real question is: how does do (or rather the whole for-expression) know that "i" here means "for every line/item that ls outputs"? The above one liner works great and writes "I found one!" the number of times corresponding to the number of lines or items that ls outputs. But I would like to understand why it worked...

I'm a complete beginner at both Bash and C, but I understand some basic concepts.

Penguins are birds too 🥹

 

These are ALL the listening ports and live connections on a freshly installed Linux system, this being DietPi. I dare you to do a tcpdump or netstat or whatever on a fresh Windows installation.

The ssh connection I actively chose to enable and the dhclient is a must have for hosts to dynamically get an IP address allotted, unless you set yours statically.

If you are struggling with privacy invading connections on your Windows system but don't feel like you can or want to switch to Linux, may I suggest https://safing.io/download/

 

AI systems exist to reinforce and strengthen existing structures of power and violence. They are the wet dream of capitalists and fascists. Enormous physical infrastructure designed to convert capital into power, and back into capital. Those who control the infrastructure, control the people subject to it.

While it sways away from the initial thesis of how the use of LLMs could be detrimental to our very being and expression of identity - at least that's how I interpret what they're saying - it ends in a fantastic claim on how AI is a tool of the ruling class. Worth a read!

 

What do you think is most likely to be taking them so long?

Hardware/software/other technical aspects:

  • keeping their software in sync with new hardware - obviously (?) it's going to be a 64-bit game, but maybe there are other aspects to it, for instance, adapting the maximum quality of textures, meshes, shaders, animations and what have you to be appropriate for today's computing power (CPU, GPU, new PCIe standards, etc), considering how long ago the game's development began.
  • game engine - are they making something from scratch, reusing older assets or "borrow" for instance UE5?
  • other?

World building aspects:

  • there are tons of loose ends to tie up or to build upon from previous games - did they not have plans for a sixth game when Skyrim released and thus were left clueless on how to develope the story? Most unlikely...
  • are they taking time trying to incorporate fan theories and stories?
  • resolving contradictions from previous games?
  • other?

Political aspects:

  • the acquisition by Microsoft?
  • internal strife?
  • budget?
  • other?

Other aspects:

  • "simply" fine tuning to achieve perfection?
  • all of the above?
  • none of the above?

Context: I have never ever participated in game development ✌️

 

But in all seriousness, this is a continuation of a previous post, namely: https://programming.dev/post/43003673

TLDR

I wanted to contribute to decentralization and to fighting censorship from home. This is were the project is right now. I bought a shower rack, discarded its wheels and just attached it - with wires, ouch - to the underside of a shallow support table on which my TV stands.

1a

I get my 1 Gbps connection from a pretty generous ISP. For one, they hand out static public IP addresses for free! Not that I understand what that would cost any ISP...

1b

The connection is distributed with a gigabit switch - which by the way supports jumbo frames 🤙 - to two routers.

2a - router one

This router is configured to route everything through a WireGuard interface (peers set to some Mullvad server, been "subscribed" for over six years now). Everything that goes through this router is encrypted. Too bad they still don't support DAITA on routers... I'm working on a workaround though, where I'm playing with the thought of forwarding traffic within a Linux machine through its DAITA-enabled Mullvad app, but that's another story...

3a - access point one

This is where I access the internet whenever I need encryption. Both wirelessly and wired. Here you will find endpoints such as PCs, smartphones and my only one IoT - a vacuum. This is also where a PC is running an i2pd daemon to share some bandwidth and a Snowflake proxy to enable Tor for people that live in places that ban normal Tor connections.

2b and 3b - router and access point two

Router two simply routes traffic between my unencrypted LAN and my ISP. Access point two is where I access my various servers residing on 4b. They are, for now, a Tor bridge. Upcoming: A Headscale "server"? Because the Tailscale control server is one of the few parts of Tailscale that isn't open source.

Hardware and software

  • 1a - some ONT provided by the city
  • 1b - TL-SG105E
  • 2a,2b - Raspberry Pi 4 with OpenWrt
  • 3a - ASUS RT-AX58U with Asuswrt Merlin
  • 3b - ASUS RT-AX58U v2 with Asuswrt Merlin NG
  • 4b - Raspberry Pi 5 with Raspberry Pi OS Lite

Good night

 

https://www.change.org/p/stop-google-from-limiting-apk-file-usage

I hope that my rooted One UI 7 doesn't get the update through some backdoor in the Google Play Services package... Or the next time I unblock Google Play to update the very few paid apps that I use...

 

Page 35. I haven't confirmed anything, so do your own research!

Happy new privacy respecting year!

 

Edit/Solved: Thank you for all the great input! Both on alternative solutions and on security implications. I'm going to make a draft on how I would setup the e-mail method as securely as possible as a programming/scripting exercise, but will IRL probably end up using either some reverse tunnel/shell variant.

Edit 2: or, as a hardware solution, install an extra NIC that I expose to the opennet - thus enabling remote port forwarding - while binding all my sensitive processes/traffic to my encrypted NIC.

I cannot ssh into my Linux box from outside of my LAN since I'm behind a VPN that doesn't support port forwarding. Is it possible to make my Linux box receive, interpret and execute commands through e-mail instead? I've tried looking for answers through DuckDuckGo's search engine, to no avail. If I may dream, I would like to setup an e-mail server with a systemd service or just run a script that continuously downloads the emails, prints their content to stdin and executes, perhaps through command substitution, whatever is in stdin.

 

Late night reading. :)

 

Learned a lot from this essay/presentation. One point that I "liked" is how Trump and US based big tech virtually (pun intended) hold other countries hostage, either with export/import tariffs or by threatening to stop trade ("adapt this policy or forget about trading with us") or with sensitive data.

Also, this is the organization that he is working for. They have some tools for and guides on privacy too: https://www.eff.org/

view more: next ›