Modlog
TimemodAction
3M
mod
Locked Post Bloben – Self-hosted web CalDAV calendar client.
3M
mod
Locked Post DNS over Dedicated QUIC Connections
3M
mod
Locked Post Are We P2P Matrix Yet?
3M
mod
Locked Post Rent Free Media - Open source Patreon / Substack
3M
mod
Locked Post SelfPrivacy — Run your own selfhosted suite with a few clicks
3M
mod
Locked Post Researchers Identify ‘Master Problem’ Underlying All Cryptography
3M
mod
Locked Post RadeonSoftwareSlimmer: Radeon Software Slimmer is a utility to trim down the bloat with Radeon Software for AMD GPUs on Microsoft Windows.
3M
mod
Locked Post NVSlimmer - NVIDIA driver slimming utility for Windows
3M
mod
Locked Post Kukkee – The free, open source and self-hostable Doodle alternative
3M
mod
Locked Post VSCode Extension - Get GitHub Links from VS Code
3M
mod
Locked Post Redditle - Reddit-only Google Search
3M
mod
Locked Post Flowbite – open-source component library for Tailwind CSS
3M
mod
Locked Post spring4shell-scan: A fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities
3M
mod
Locked Post XPEViewer: PE file viewer/editor for Windows, Linux and MacOS.
3M
mod
Unstickied Post XPEViewer: PE file viewer/editor for Windows, Linux and MacOS.
3M
mod
Stickied Post XPEViewer: PE file viewer/editor for Windows, Linux and MacOS.
3M
mod
Locked Post What is TLS fingerprinting?
3M
mod
Locked Post Europe Is Building a Huge International Facial Recognition System
3M
mod
Stickied Post In response to disinformation spread trough mod log.
3M
mod
Locked Post Is your SSH key still safe?
3M
mod
Locked Post In response to disinformation spread trough mod log.
3M
mod
Unlocked Post In response to disinformation spread trough mod log.
3M
mod
Locked Post In response to disinformation spread trough mod log.
3M
mod
Restored Comment WTF is wrong with you starting personal attacks? i was merely sharing info that a sensitive tool (a terminal) was sharing telemetry with the developers, which is a rather uncommon situation in the world of terminal apps, and you accuse me of being delusional and make fun of me? Now for a more central argument: does telemetry really improve anything? Would you say Firefox has become better for users since introducing telemetry? I personally wouldn't. The problem is what kind of metrics are you collecting? If you're collecting literally everything (full memory dump + control flow and execution times) then sure you can make some nice optimizations. But if you're looking for more targeted metrics, it's hard to find the metrics that do matter because bugs are by definition something you did not anticipate. It's a little bit like with test-driven development: if you want to make TDD robust, you need an even more complex implementation of the tested code as part of your test suite. The snake bites its own tail... by @southerntofu
3M
mod
Removed Comment WTF is wrong with you starting personal attacks? i was merely sharing info that a sensitive tool (a terminal) was sharing telemetry with the developers, which is a rather uncommon situation in the world of terminal apps, and you accuse me of being delusional and make fun of me? Now for a more central argument: does telemetry really improve anything? Would you say Firefox has become better for users since introducing telemetry? I personally wouldn't. The problem is what kind of metrics are you collecting? If you're collecting literally everything (full memory dump + control flow and execution times) then sure you can make some nice optimizations. But if you're looking for more targeted metrics, it's hard to find the metrics that do matter because bugs are by definition something you did not anticipate. It's a little bit like with test-driven development: if you want to make TDD robust, you need an even more complex implementation of the tested code as part of your test suite. The snake bites its own tail... by @southerntofu reason: Troll
3M
mod
Banned @southerntofu from the community CKTN
reason: Troll
3M
mod
Removed Comment https://news.ycombinator.com/item?id=30896837 by @linzilla reason: Off-topic.
3M
mod
Removed Comment Don't use chrome. Use Firefox by @isleofmist reason: No ads in a thread designed for Chrome.
3M
mod
Removed Comment I've been using Molly since I found out about it, like a year ago, and I'm happy with it. But prior to using Molly, I was using Signal on Lineage for MicroG, so I find > As an example, we cannot use regular version of Signal on LineageOS with MicroG. Signal tells us it cannot to connect to the network really misleading. The proposal is good, and the concerns about google play are valid, but I'm not sure if they're deliberately misleading, or if perhaps Google has actually threatened Signal users on LineageOS with MicroG... Or perhaps things have changed since I started using Molly... And yes, there are more options, there's Molly, and several other ones, so this would be another Signal client... by @kixik reason: Off-topic, topic is Langis and not molly or other forks.
3M
mod
Removed Comment How is it different from [molly](https://molly.im/) ? by मुक्त reason: Off-topic.
3M
mod
Removed Comment It seems similar to "Signal-FOSS" by TwinHelix: https://www.twinhelix.com/apps/signal-foss/ by @Edo_Secco reason: Off-topic.
3M
mod
Banned @electrodynamica@mander.xyz from the community CKTN
reason: I said no off-topic, you cannot hear, alrighty I make it easy for you.
3M
mod
Removed Comment Let's do a small thought experiment about quantum superposition. The idea is that we don't know where the particle is until we've measured it. So, "in theory" it is everywhere with certain probability that it will eventually be measured to be "somewhere". So let's imagine we have a rectangular bar magnet with opposite poles on each end. Now let's imagine that we set the bar magnet on a table. We have a separate bar magnet that we set some distance from the other one on the table, far enough away that they do not interact. Now imagine we slowly move the second bar magnet closer to the first at an angular trajectory, say 5 o'clock. Eventually we will move them close enough together that they interact. The first bar magnet seemingly "jumps" to this position of the second. This is the essence of making a "measurement". It isn't that it is "everywhere" until it is "somewhere", it is simply that in the process of making a "measurement", we determine where it will be through the interaction of forces. by @electrodynamica@mander.xyz reason: off-topic
3M
mod
Removed Comment Oops I forgot to talk about EM on scales of stars, magnetars, and such... by @electrodynamica@mander.xyz reason: Stay on-topic.
4M
mod
Removed Comment Great! Thanks for the hard work! It works better then song tube and is actually piped ;) by @Decentralizer reason: Dupe
4M
mod
Banned @sexy_peach@feddit.de from the community CKTN
reason: Troll.
5M
mod
Stickied Post Regarding respect towards Developers, Normal People, Organizations as well as Article and Blog Authors.
5M
mod
Removed Post Crying for abuse, then ban, censor and remove the response that contained the entire story. reason: resolved..
5M
mod
Unstickied Post We Have No Reason to Believe 5G Is Safe
5M
mod
Unstickied Post Track the value of any NFT portfolio in real time
5M
mod
Unstickied Post Fact check: Bitcoin consumes a small fraction of 1% of global power
5M
mod
Stickied Post Crying for abuse, then ban, censor and remove the response that contained the entire story.
5M
mod
Removed Comment > Yes it is illegal to impersonate others. In this case you try to pretend on a social network to be someone else who you are not, this can have serious consequences If I were doing so to commit fraud, or to evade capture as a fugitive, or something like that, then this would be wrong. I do not do those things. If I'm doing it to fuck with Facebook, or to create ambiguity about who I am, I see no moral issues here. I would be deceiving people, this is true, but I am not gaining by it, or harming anyone pursuing a legitimate end. "Impersonate" usually means to take on someone else's identity, rather than to create a new previously non-existent one. Maybe there's a language barrier here. If so, I apologize. I have no desire to take on someone else's identity. For that matter, I was actually thinking about using the pictures but with my own real name. If there were 20 other Tom Smith's in my city who look nothing like me, that might be useful. I'd be careful that this didn't accidentally overlap onto some other Tom Smith (excepting myself) such that it caused them problems. Poor Rusty Shackleford. > The reason why you do want to do this is obvious, to fake, scam or do other shady stuff and then maybe even get away with it because you hide trough your anonymity. I think you're projecting. I don't want to harm anyone. Though I'll cop to the "do other shady stuff" thing, since to tut-tutting grandmas everywhere even my explicitly written goals are "shady". Not everyone who wants to hide is a fugitive of the law. All I want to do is hide. by @DPUGT2 reason: off-topic
5M
mod
Banned Arthur Besse from the community CKTN
reason: Creating fake drama and attention that exist only in your head, you proved absolute nothing. https://lemmy.ml/post/168793/comment/118643
5M
mod
Banned @Gamerie@feddit.de from the community CKTN
reason: Fake report.
5M
mod
Removed Comment I hope this doesn't come across negatively, but I don't agree with most points you've made. I am interested in your response though as maybe I misunderstood your points or I'm incorrect on something. - **Instances do not obfuscate your IP**: many privacy friendly front ends do indeed hide your IP address from the original service by default. Majority of the others will hide your IP from the original service provider with a change of settings. By using these front ends, you're shifting your trust from the big tech companies to whoever is hosting the front end instance you're using. For some/many people, keeping their IP address and usage habits hidden from the big tech companies is sufficient for their threat model. - **Honeypot**: this is a very similar point to the first point **instances do not obfuscate your IP**. Again, users are shifting trust from big tech to instance owner. If the users self host the instance, then the risk is further reduced to just trusting the repo maintainer(s). - **not configured to use privacy related settings by default**: from what I've seen, even the default settings of all/most privacy front ends are better than using the original service. By using the alternative front ends, you're limiting/eliminating the ability for the original service provider from running tracking, analytics, etc. software on your machine. For example, YouTube may know that your IP address accessed a particular music video, but they won't know which of the recommended videos you hovered over or for how long you hovered over them. YouTube won't know if it was played in the foreground or background. It won't know if you repeated a particular part of the song 30 times and it may not even know that you watched the music video on repeat for 2 hours (assuming the front end cached the video and didn't request the video each time it was played). YouTube is also much less likely to definitely know that you were the one who accessed the music video and it wasn't your friend, family member, or guest that shared the same IP since you're not signed into YouTube and it's less likely that YouTube could gather additional information about your machine. So while the default settings for many of the privacy front ends may not truly be private from the original service, it's most likely much more private (from the original service provider) than using the original service directly. - **propaganda reasons**: I don't understand this point. All the privacy front ends are doing in most cases is acting as a proxy for you to access content on the original service provider. If propaganda exists on YouTube, then you can access it directly from YouTube or from the privacy front end of your choice. I assume you mean the protections (eg - notices that the information may not be credible) that the original service providers implement may not be seen on the privacy front end. If so, then you may have a point here if the privacy front ends are capturing and relaying that information to the end user. However, I'm not sure how this relates to privacy. - **Installing more software and alternatives increase the risks**: that statement is true, but it also deals more with security than privacy. Additionally, the other points require many assumptions. Are the alternative front ends always installed on the user's machine? If so, are they always installed in addition to instead of in replacement of the original service provider's apps? Does every user of alternative front ends also install additional browser extensions? You could also argue that the extended footprint isn't too bad as it doesn't modify what content or how content is displayed and only changes where it's displayed from. Additionally, if more people used these extensions, then you're more likely to share your footprint with others. Many of the privacy friendly front ends don't support logging into the original service so tasks like uploading, posting, etc. are not an issue for those front ends. - **Some alternative Services and alternatives are highly controversial**: I'm not claiming to be an expert on this topic, but I haven't seen much (or any at all honestly) discussion about any alternative front end being controversial. The closest I've seen to that is which front end is better (eg - Teddit or Libreddit) or which alternative service is better (eg - Mastodon vs Plemora vs Lemmy vs Pixelfed, etc.). I'm not familiar with Odysee though so I definitely have some more research to do. The other points you made here though are just reiterating the other points you made previously. It sounds like you're saying "well, every single privacy alternative front end doesn't protect my privacy 100%, even though most protect my privacy 75% or better by default, and some introduce potential new risks, which in many cases could be mitigated, so no one should consider using any privacy friendly alternative front ends" or even "protecting my privacy 100% is too hard so its better that I do nothing". Protecting your privacy 100% is **extremely** difficult (if not impossible), but it doesn't mean you and others shouldn't do things (like using privacy friendly front ends) to marginally improve your privacy - especially if it just means navigating to one URL instead of another. by @rhymepurple reason: Bullshit, learn to read https://docs.invidious.io/FAQ.md
5M
mod
Banned @rhymepurple from the community CKTN
reason: Do not defend product x or service x because you like it, post evidence for your claim otherwise you will get banned.
5M
mod
Removed Comment BS by @X51 reason: nonsense without anything.
5M
mod
Removed Comment "locking the discussion is not how you deal with it.” - and yet that's what you did to that rubbishy 5G post a few days ago by mekhos reason: troll
5M
mod
Banned mekhos from the community CKTN
reason: Troll someone else
expires: 5M ago
5M
mod
Stickied Post We Have No Reason to Believe 5G Is Safe
5M
mod
Stickied Post Fact check: Bitcoin consumes a small fraction of 1% of global power
6M
mod
Unstickied Post Bitcoin transaction produces CO2 emissions as a household in 3 weeks
6M
mod
Stickied Post Bitcoin transaction produces CO2 emissions as a household in 3 weeks
6M
mod
Unstickied Post Signal developer talks about Web3 - His First Impressions.
6M
mod
Stickied Post Signal developer talks about Web3 - His First Impressions.
6M
mod
Unstickied Post Regarding respect towards Developers, Normal People, Organizations as well as Article and Blog Authors.
6M
mod
Stickied Post Regarding respect towards Developers, Normal People, Organizations as well as Article and Blog Authors.
6M
mod
Stickied Post Track the value of any NFT portfolio in real time
6M
mod
Unstickied Post The best Linux phones you can buy right now
6M
mod
Unstickied Post The 100 greatest innovations of 2021
7M
mod
Stickied Post The best Linux phones you can buy right now
7M
mod
Removed Comment > It is to obfuscate your IP, or shall I say your real location. No, it is used to create a virtual private network over other (potentially unsafe) networks not more, not less. > Proton mentioned that it is no solution for censorship in their chart Yes, and it isn't meant to circumvent censorship, it's a VPN. > I was referring to the fact that you need to make your kernel - or OS - compatible. To get high speeds, wireguard runs in the kernel. It doesn't have to it's not necessary for operation, I already mentioned wireguard-go, which runs perfectly fine in userspace. > WireGuard has no independent audit At least it's small enough, that an audit could actually mean anything. And you are, of course, free to pay for an independent audit if you can afford it. > you find all over the internet reports from IP leaks, DNS leaks. Again - it's a VPN, not an anonymity tool. > I do not even started to question the professionalism behind WireGuard Thats valid, their documentation is also utter crap, especially if they intend to have it used by the average microsoft+cloud CrapOps personnel. > If you want a link only with some of the security concerns that are still unfixed [link] That link doesn't address any security concerns that are not related to the (mis) use as an anonymity tool. Also it is an advertisement for proprietary VPN software. by @pinknoise reason: trolling
7M
mod
Removed Comment Dude none of your links are relevant and the one about the cyphers doesn't even work. What the hell is your deal here? Why do you care what vpns other people use? You're really not holding up a good argument here. by krolden reason: trolling
7M
mod
Banned krolden from the community CKTN
reason: Troll
7M
mod
Banned @pinknoise from the community CKTN
reason: I told you to stop.
8M
mod
Banned @hello_lebbit from the community CKTN
reason: You troll in every sub with the software parasite thing. You annoy everyone and you are not helpful.