Skip Navigation
Why do you still hate Windows?
  • FDE requires third-party software (veracrypt)

    There's bitlocker, I think it was added in 7 or Vista. What do you mean?
    But other than that, I would rather use VC too.

    standard system utilities (think ssh, git etc.) are not available on a fresh install

    Hmm, depends. It has a built in openssh client and server, but the "feature" (automatically installing package) is off by default. It can be enabled at install time with the use of the standard windows image modification tools (DISM I think?)

    And then you're supposed to download and install .exe files from the internet? Since microsoft controls what goes in the windows store

    I think it's better that Microsoft does not have that much control over software distribution.

    But again, most things you want aren't there, and you can't even trust the things that are there.

    Of course you can't, nobody can tell by looking at the store page if it was modified by anyone, including Microsoft.
    The amazon app store for android explicitely tells that they are adding tracking code to every uploaded app, and to make this possible they replace the digital signature of apps uploaded. Google with the play store does not tell anything like this afaik, but for a few years now it also basically compromised the digital signatures of developers, by requiring the private keys to be mandatorily handed in for continued app updates.
    I don't trust that these companies that already rely on mass surveillance as a revenue stream, they won't add tracking code to apps unauthorized by the devs. If not right now, it will happen in the future.

    For some reason, a billion dollar company cannot curate a software repository of the same quality as the ones maintained by unpaid volunteers in the Linux world.

    Besides quality, I think open source distro's repository and it's packagers are largely more trustable. They are not motivated financially to modify the packages in unwanted (by the user) ways, and they are transparent.

    So yeah, I think it's just not there yet. Maybe in a few years windows will be a viable alternative for desktop systems.

    I think they are drifting farther and farther away.
    It was an option. But the shitshow of 11.. thanks that's too much. I'm not installing that for anyone. And 10 is soon end of life...

  • how to post YouTube videos anonymously?
  • There is a surprising (to me) amount of Perrtube recommendations here. Has something happened that suddenly so many of you recommend it?

    Also, could you give advice on a few instances that are maintained and allow uploading? In the past (a half or 1 year ago) I've had trouble finding one.

  • how to post YouTube videos anonymously?
  • There is a surprising (to me) amount of Perrtube recommendations here. Has something happened that suddenly so many of you recommend it?

    Also, could you give advice on a few instances that are maintained and allow uploading? In the past (a half or 1 year ago) I've had trouble finding one.

  • They lied to you about car surveillance
  • Changing the "id" like the MAC address or the IMEI has no impact on any system.

    On the system none, yeah. But if you pick an IMEI that's also used by an other phone, that is what can cause trouble, as I know. It's the same as when multiple devices have the same MAC or IP address on the same network.

    For example, when a client device gets its IP from the dhcp server on a router, which allocates a random ip from a specific pool, it does not influence anything like ip packets routing...

    That's because it is not random. The DHCP server keeps track of the addresses it has assigned to someone, and will never tell the next new client to use an IP it has already assigned someone.
    But if you set your IP statically and pick an IP that is used, or if you run multiple DHCP severs for the same network without coordination, then problems will come.

  • Are there any guides, tutorials or similar on how to use Steam more privately?
  • I don't have experience with it, but as I know that is a GUI helper for Wine.

    A steam emulator is different. It is often just a single file, a program library that holds program code.
    On windows it is a DLL file, on Linux it does not have an extension but it's the same concept. The game loads it because it actually searches for the official version of this file, but both Linux and Windows implement the search for it so that a library file (with the expected name) besides the executable is preferred instead of whatever is installed systemwide.

    Lutris on the other hand is a GUI tool to manage your "wineprefixes", which is maybe better called wine environments. If you are familiar with python, it's more like python's virtual environments.
    And besides basic tasks, it has a lot of additional tools to make using Wine easier.
    Afaik there are also other such utilities, I don't yet have experience with any of them.

  • They lied to you about car surveillance
  • On one hand yes, but on the other hand, doesn't it confuse the cell network? I think the IMEI is used for routing or some other similarly basic operation. Like the MAC address, but it's for a larger area and more easily can cause trouble

  • 2.6M Piracy Reports Against French Users Resulted in 234 Financial Penalties * TorrentFreak
  • I wanted to search for the postman tracker's address, so went to check on notbob.i2p. website unreachable. Isn't this a relatively fairly popular site here?

    Edit: on a second try it now loaded in ~10 seconds.
    This latency is probably not to much of a problem, but two things:

    • the instability that it couldn't even start loading the site, and it's regularity
    • if a text site with few graphics takes this much time to transfer, bittorrent and movies will be even worse because that's often not compressible
  • 2.6M Piracy Reports Against French Users Resulted in 234 Financial Penalties * TorrentFreak
  • 1-2 days is slow but acceptable I think. It's a compromise.

    But for some reason for me it's much slower, even though I run a router that participates in routing and usually has 50+ or even 3 digit share ratios, with ~80 GB traffic a day in both directions, so it must be integrated well.

    Now I realized I have only tried a single I2P torrent yet, and it was just 2 MB, and my experience was coming from both i2p sites and outproxies often being very slow or unreachable with the common tunnel settings.

  • Are there any guides, tutorials or similar on how to use Steam more privately?
  • Ater purchasing and downloading a game from Steam, the Steam client is not actually needed for it to be playable. Of course it will try to start up Steam, and if isn't installed then it will complain, but if use use a "steam emulator" that can be worked around.
    This is useful if you don't want Steam to track how much and when do you play, when is it that you are online, what achievements you got and such. This is afaik also the only way to say no to forced automatic game updates.

    One such emulator is Mr Goldberg's steam emu.
    It has a bunch of configuration options, per-game settings, optionally portable settings, windows+linux support, and I think it's even open source.

    Using the Goldberg emu is not piracy, neither DRM circumvention. The Steam API is not a DRM, most Steam games just make the Steam client a hard dependency, not bothering with making it work without it.
    When the game is protected by DRM (this should always be marked on its store page), the steam emu won't be enough, but you would also need to patch it's DRM protection. Sometimes that's easier, sometimes harder.

    Steam emus may or may not work with multiplayer games.
    The Goldberg emu has a replacement Steam's own multiplayer network communication system, which works through the local network or a selfhosted wireguard-like VPN, but with big centrally hosted multiplayer games you'll run into licensing validation problems or such.

  • Meta admits using pirated books to train AI, but won't pay for it
  • I apologize for the confusion

    Meta is working to address these concerns

    Sure, they are working to solve these concerns by teaching their LLM to lie and obfuscate, and by becoming so big nobody sues them anymore. I'm sick of this.

  • Monero mentioned in the news
  • Did you check coincards? Can't check it myself right now, sorry for that, but I remember they have a lot of kinds of cards.
    I haven't used the service myself, but looking to do so. I know them by Privacy Guides's recommendation, if that tells anything. They only recommend Monero for crypto, and Coincards for cards.

  • 2.6M Piracy Reports Against French Users Resulted in 234 Financial Penalties * TorrentFreak
  • I2P and it's sub 100 kb/s speed? Series, games would never finish downloading, but then also only those torrents are accessible through I2P that are published to an I2P tracker, there is no DHT (yet?). Clearnet torrents and clearnet peers are not accessible through I2P.

    Or is it something on my end that makes it that slow? ISP download bandwidth is stable and much higher.

  • Legality of removing sim cards from cars in Australia
  • You are allowed to modify a car however you like

    I'm pretty sure that's not the case. Like, even if we are not taking about adding a badly welded 4 wheel attachment without the use of a trailer hook, the car will have to go through technical inspection every few years.
    If the inspectirs deem that a non-functional such system is a problem, you'll not be driving your car anywhere.

  • Legality of removing sim cards from cars in Australia
  • This is just the usual "nothing to hide" handwaving argument.

    This data is not used by some theoretical policeman to laugh at how bad you drive, it is part of commercial datamining present in virtually all devices and services you use.

    GPS and such? Great that I have a smartphone that I trust more, and have more control over, than this big blackbox with no access whatsoever.

  • SponsorBlock (and DeArrow): "YouTube is currently experimenting with server-si…" - Fosstodon
  • I can't morally justify blocking ads and viewing their content for free.

    I can't morally justify anything they are doing, and have been doing for many many years already. Yet I use their public services because they are unavoidable. But I would never give money to such a company.

  • SponsorBlock (and DeArrow): "YouTube is currently experimenting with server-si…" - Fosstodon
  • Ads need to be tailored to the user when delivered

    1. It does not. If you install a new browser and open YouTube the first time, they'll be able to show ads to you
    2. They could be tailored based on other factors too, like country, region, or even household by the IP

    I think the backend could just generate the ad ridden video feed for the specific user. Most probably it would be very resource intensive, but I can only hope so.. but then I also don't know much about HLS and other fragmented streams so it might not be a performance problem at all.

    like a linked list

    I think the full list of chunks is (currently) known beforehand. That's how yt-dlp can download on multiple threads, but also how it can show the number of total fragments relatively quickly on the progress bar

  • WARNING: Reto-Haveno
  • Yeah, caution is warranted but what they tell does not give any reason for why reto would be a likely honeypot, and their post potrays it as such, by just pointing to changes being made to the source that are known for needing to be changed by the network operator.

  • Hello, world! You, me, and The Matrix.org Foundation
    matrix.org Hello, world! You, me, and The Matrix.org Foundation

    Matrix, the open protocol for secure decentralised communications

    Hello, world! You, me, and The Matrix.org Foundation

    Introduction of the first Managing Director

    1
    Why does Ruby Gem 3 install gems to Ruby 2 directories?

    I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

    Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

    I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

    1
    Google's Web Environment Integrity made me remember this video
    vimeo.com Trusted Computing

    "Trusted Computing" - ever heard of it? This motion graphic style documentary explains what the term "trust" has in common with "Trusted…

    Trusted Computing

    The video is a short documentary on Trusted Computing and what it means to us, the users.

    If you like it and you are worried, please show it to others. If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

    5
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)RE
    ReversalHatchery @beehaw.org

    Computers and the internet gave you freedom. Trusted Computing would take your freedom. Learn why: https://vimeo.com/5168045

    Posts 3
    Comments 999