I wonder if these services are on small cloud providers. If so then they can just block their entire CIDR.
I wonder if they were to move to GPC if they would have better luck.
Migrated account from @[email protected]
I wonder if these services are on small cloud providers. If so then they can just block their entire CIDR.
I wonder if they were to move to GPC if they would have better luck.
When you look at the value proposition purely from a capitalistic standpoint, I get why scammers and black hats exist. I just wish they could point their weapons toward the 1% and pull something similar to a Mr. Robot and redistribute their wealth.
Fwiw there are a large number of people who volunteer their time and effort toward worthwhile projects. It’s just they don’t get rewarded anywhere near the level of benefit that they provide.
I agree with this. Self-hosting requires the user to understand their network, their software, how it all interacts.
If you provide a hardware product and call it a solution, people are going to expect a turn-key solution like a plug-and-play router.
You’re going to end up supporting a bunch of newbies who, by no fault of their own, can’t tell you an error code in the console let alone whatever UI you give them.
I think a better solution would be a course that walks newbies through self hosting.
These are fucking kids. They are still learning what devices do and what their appropriate use is. If they are like me, they have probably already found ways to watch porn, monitor their crush’s computer, read their email, and get into their webcam.
It’s not lack of education.
It’s lack of impulse control.
These are people writing laws about technology. They are absolute idiots.
Differentiators? The idea behind the tor browser specifically is to make it harder to fingerprint you by giving trackers the exact same information for each browser session across all its users, making it harder to differentiate between one user and another.
It might depend on the VPN provider. If it’s someone like Google, no way.
But Mullivad that has a proven track record of not keeping logs, that might be worth it.
I’ve also heard tor over i2p but don’t know enough about the latter to have an opinion
The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera “tried to access a link containing apparent CSAM.” Presumably, this “apparent” CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it.
It looks like a combination of bad opsec and clicking on a download link.
I know there has been some back and forth whether it’s good to use a VPN with tor and feel like this is just going to open up that conversation again.
Have you tried listening to them at 1.5 or 2x speed?
Much easier to listen to.
They did a blog post about how the feds had made a second attempt to get metadata from them and they could only provide two fields of information: the date the account was created and the last time it connected to the service.
It’s in the public record as well if I’m not mistaken.
Is there anyway we can open source this technology? I’d love to surveil police and politician phones if possible.
His wife forced him to install security cameras in every room of his apartment and banned him from going anywhere after work. She knew his schedule and expected him home immediately after work ended.
This is so toxic. Not saying cheaters get what they deserve but if you can’t trust your husband, I think you have bigger problems than infidelity.
My very cursory glance at the paper is that basically they are encrypting live calls. Basically they are doing what zoom has been doing since the pandemic.