• 0 Posts
  • 114 Comments
Joined 3 years ago
cake
Cake day: July 12th, 2023

help-circle

  • True, I guess the process is the studios have deals/threats to sue the ISPs if they don’t do it.

    Either way regardless of their reason or motives. The ISP is the one that’s in charge of sending the threat and dealing the punishment, and again the key point is (again region may vary, do research on your ISP), but typically they send a warning first. So in short, if you just want to get started quickly, you can just start torrenting with no VPN (you should probably seed things for as little time as possible), and hope you can afford a VPN before you get the threatening letter, if you do get the threatening letter… then stop all peer 2 peer based piracy until you can afford to do it safer.


  • TheFogan@programming.devtoComic Strips@lemmy.worldXXX
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    1 day ago

    True, I suppose maybe there’s an alternate route… like allowing WW1 to happen, but perhaps, finding a way to change the Treaty of Versailles to be less punative and leave more room for economic growth.

    Of course there’s so many variables still. Without nukes being used in ww2, would the cold war have stayed so cold.


  • TheFogan@programming.devtoComic Strips@lemmy.worldXXX
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    Also worth noting with that definition of time travel, logically it would seem, time travel would be self eliminating.

    IE, I go back in time, stop whatever I would consider the worse event in history… thus putting the world on a trajectory where myself or whoever invented the time machine no longer happens, leading to someone else inventing it, going back for a different reason, also changing the trajectory of history also eliminating the events leading to his time machine’s creation. Effectively the dice keep re-rolling until we get a world where the time machine is either not invented or not used, most probably early human extinction.


  • TheFogan@programming.devtoComic Strips@lemmy.worldXXX
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 days ago

    At first I thought you meant that killing hitler would effectively kill everyone born after hitler since the conditions of their birth didn’t exist anymore.

    Well I would say, actually a really good point there, though I wouldn’t say “everyone born after hitler”, I guess really depends on one if WW2 happens. IE you kill hitler, but Heinrich Himmler lead the nazi party and history played very similarly. then you could expect possibly generations to unfold almost identically to the original timeline.

    But yeah it’s the variation of the art career concept, except that I find the premise that hitlers actions were the cause… Fascism and Hitler were, a symptom of a broken country. Prevent the collapse, and the germans don’t vote for Hitler.


  • TheFogan@programming.devtoComic Strips@lemmy.worldXXX
    link
    fedilink
    English
    arrow-up
    21
    ·
    edit-2
    2 days ago

    Honestly I oppose the idea of going back in time and killing hitler. To me butterfly effect and everything. Just break into the hospital and swap hitler and another babies places, and poof you won’t get the same combination of nature and nurture that created hitler.

    Or even more important, wouldn’t stopping WW1 be the key there. No historian here but there’s a lot of complicated economic stuff that happened after WW1 that leads to the rise of facism. Would seem to me killing hitler (or preventing his rise in other ways), would just wind up with a new guy in the same roll.



  • Well first off, torrenting doesn’t “require” a VPN, you may want to look up your area etc… in most of the united states, basically if you torrent without a VPN, there’s a chance that your ISP will detect it and typically they will send you a letter saying “we know you downloaded _____ illegally, if we catch you again, we will cancel your service”.

    which depending on what you are going for (like say new releases and big name targets are what they will be watching for the most)… that could take years to even happen.

    Now as far as safe, and lower risk… you could always look up pirating on the IRC… it’s not the most user friendly route out there, but that’s kind of the point, it’s ancient technology and for the most part no one bothers to monitor it.

    and then of course there’s just tons of bootleg streaming sites. bottom line anything that’s not peer 2 peer, is pretty much impossible for ISPs to identify what you are doing on… and thus are pretty safe.



  • and security on pages is useless if you are logged in.

    We’re already talking the least of security problems (IE the device being physically confiscated).

    In ross’s case which hurt him more do you think, the fact that his system probably had logs of what he installed… or the fact that it was taken while he was logged in as administrator to the silk road? and it supposedly contained a journal… not system logs, but activities that he specifically wrote out detailing his daily activities.

    The point again is someone gaining physical access to the computer itself, while you are literally in the process of doing things that you don’t want known about, what you are currently working on is 100x more valuable to the thief, feds or whatever, than any of the low level stuff that the logs are likely to be recording.


  • You posted this same silly thing about 3 days ago.

    anyway why isn’t the advice “encrypt your drives” instead of “disable all logging”.

    I mean your own examples are like the least serious problem.

    Who is logged in and when? So we’re talking a multi user system that’s clearly hosting a lot… that’s kind of important for an administrator to be able to track who is logging in when, to know if something goes wrong.

    Package manager logs what’s installed. well duh, what’s the scenerio that this is even a factor? I don’t want big government to know I had, qbittorrent or whatever? There’s no program that’s likely installed via apt that’s illegal to have.

    So yeah in short, stuff that’s vital if you ever need to troubleshoot, useful in general, almost unthinkable to imagine situations where this is a problem (at least in situations in which someone has your user account, or root access to your system for these to be the high priority.

    On the whole the idea there is like.

    “If someone steals your car… they could also steal the car users manual”.


  • Just switch to physical pen and paper…

    Wait, CRAP, did you know that a pysical notepad logs every pen stroke? not only on the paper it’s written, but it puts traces onto the next page as well.

    Sure it’s not sending it to others… but if the police cease the notepad they can recover everything currently written in it, and possibly even some of the pages that were torn out from the indentations on the other pages.


  • Did they actually honor it? I recall quite a few people tricking AIs into like, saying they will sell a car for $1, but the company not honoring it.

    Or is it likely just car salesman negotiation tactics… IE the matress is actually inflated 75%, AI is given a hard minimum of how low it actually can go, but obviously instructed to do everything possible to close the sale but at the highest price the user will be willing to pay.

    Holy frick, actually that sounds like the real hell now that I think of it. Will AI bring haggle pricing to online stores. We have to spend 20 minutes trying to give a story to an AI to get the best price on, something… which of course will then lead to someone developing an AI for shoppers trained to haggle with these for them. End result we burn up an ocean, with 2 AI’s making up bogus stories about how badly they are suffering.



  • I guess my point is federated services, at least prior to a world where they become mainstream, are only particularly good if

    1. You have a group of people all willing to use them together (IE Matrix, Friendster etc…), Join as a group don’t expect to find other specific individuals.

    2. If you do want to meet people, you are looking for pretty broad categories encompass millions. IE on lemmy you can certainly find an anime community, you won’t find an active jujitsu kaisen community.

    Anyway so my point on things like Dating, Linked In etc… those topics are likely to be the last to have a hope in the federation, because their services on their own, require users, but more importantly those users have to be localized (IE dating sites need, both a high volume of users, and those users need to be in close geographical proximity, and have some reasonable male to female ratio, and then have some level of common interests). A linked in needs… job seekers, and companies/head hunters. Of which you can’t expect companies to put in resources without a large userbase… and you can’t expect the userbase to grow without company usage.


  • Is there even really a function for linkedin without… well what it is? The last people to adopt new and open source tech are… corporate executives, and to my knowledge the whole point of linked in is, a psudo job hunting web page, with some social media pages as a secondary (of which people are only going to be posting “work hard” and “I work hard” kind of messages because… well they’d never post something that might make them less attractive to employers.

    I guess the point is, what’s the use of an open non corporate controlled linked in? I can convince a handful of friends to maybe join a facebook alternative to make it useful, Lemmy certainly is an ok reddit alternative, at least for the equivelant of bigish communities, and mid sized tech communities.

    Things I don’t see working in federation, are things that you are looking for… well people that aren’t going to switch for you… and most importantly people geographically close to you. Companies aren’t going to use their HR members time searching for people on a niche career site, dating sites are likely lost causes because… well no matter how bad the sites are… a dating site where most people are 300 miles away from the nearest compatible person isn’t going to be of much use, and job seekers don’t have the luxury of moving before the companies they want to work for go.



  • I mean DNS is always the issue… but then that’s kind of the double edged sword as well isn’t it?

    Conceptually 4 options come to mind.

    1. DNS as current - weakness domain name changes or DNS outages or poisoning

    2. IP address - Issues, migration etc… some instances may need to move services etc…

    3. SSL private/public keys - probably the strongest I’d imagine. only real weakness I can see is… 1. it has no ability to find a server, and I guess if a server is hacked and it’s private key is stolen, federated servers would not be able to spot the imposter.

    I do think 3 might be the strongest option. I don’t know anything on how lemmy etc… works. I’d imagine a strategy would be, When A and B federate with eachother, A records B’s Domain name, IP, and public key (and B gets A’s as well), if DNS goes down attempt recorded IP. If neither work wait for an incoming connection and if the new connections public key matches an existing public key, it assumes the identity.

    But as far as the user side I don’t really know. Obviously we can only match users as their domains. I can’t imagine how I could find you again with gammaray@sh.itjust.works when sh.itjust.works domain is unregistered.