Imprint9816

joined 1 year ago
[–] [email protected] 1 points 1 week ago

Yeah. The 2$/month port forwarding option can also be a great deal as well especially if combined with the lifetime pro memberships they used to sell for $30 back in the 2010s.

[–] [email protected] 43 points 1 week ago (7 children)

Mullvad, IVPN, and Proton are the top tier for privacy respecting VPNs.

Windscribe and AirVPN are also decent options but do not have the audit history to be in the same tier as the other 3.

Most other VPNs people mention either have a dubious history or no real proof of their claims to be privacy respecting.

[–] [email protected] 30 points 2 weeks ago (4 children)

Your a massive a-hole if you get amusement out of people getting screwed out of not being able to use a product they paid to use.

[–] [email protected] 3 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

3 minutes in before its revealed its actually a sponsored video to advertise daily.dev

[–] [email protected] 20 points 2 weeks ago

Tor cant save you from bad opsec.

[–] [email protected] 12 points 3 weeks ago* (last edited 3 weeks ago)

It sounds like they just report the number they are sure of at the time and update the filing later. Very high chance the number of affected is much more then 1.3M - the number of unique email addresses alone makes it pretty clear its more.

The situation doesn't come without precedent either. It's not uncommon for organizations disclosing data breaches with US state officials to update those filings down the line as investigations into potentially compromised data continue.

[–] [email protected] 35 points 3 weeks ago* (last edited 3 weeks ago)

I admit this is not a helpful answer but...

If you want to have hundreds of gigabytes or more of media storage plus backups, its going to be expensive. There is no secret cheap way.

This is what makes debrid options so appealing. You can amass terabytes of media data for a cheap monthly cost.

You can then supplement that with a small nas or drive of rare or hard to find media / offline selection in which case you could probably run raid 10 with the small amount that you would actually need to backup.

[–] [email protected] 4 points 4 weeks ago* (last edited 4 weeks ago)

Would be basically impossible. Most of what is leaked these days is just rebundled from other leaks. For example if you listened to MB on this its only a small % of data from new leaks that actually ends being new info.

Any attempt of doing something like this would prove to be trash data pretty quickly and would not have a major effect.

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago)

That's fair, and the reasons why someone buys a phone is a personal choice.

I would suggest with things like a headphone jack that, while its annoying to buy an adapter (usb-c to headphone) it may be worth the cost vs sacrificing something like hardware security.

Sadly a lot of the time consumers are forced to choose between security and privacy or convenience.

[–] [email protected] 31 points 1 month ago* (last edited 1 month ago) (5 children)

If the security benefits of a pixel is less important then the fact Google made it then GOS is simply not meant for you.

Its silly people complain about it being only compatible for pixels but never seem to blame other android brands for making significantly less secure phones. The responsibility should be put on phone makers to create secure phones that meet GOS requirements, not to expect GOS to make a less secure OS.

The whole AOSP environment is very Google centric so its pretty weird to think because your not buying a pixel that you are somehow avoiding Google.

[–] [email protected] 2 points 1 month ago* (last edited 1 month ago) (1 children)

Honestly i found that whole excerpt to be pretty nonsensical.

Don't see how that relates to what i said and then you quoted but reworded (why?). Plus it all just circles back into "its bad cause the UX is slightly more inconvenient".

If the author had any substance to his argument it wouldn't require laying out a ridiculous scenario just to get the reader to understand what in hell he is trying to say.

He basically tldrs the whole article a few sentences later with " I want it to be easy to use." The author never seriously considers if that's worth the cost.

[–] [email protected] 9 points 1 month ago* (last edited 1 month ago) (3 children)

Author seems to ignore that FOSS projects tend to be much smaller teams without budget to create the user experience that private VC funded projects can.

Ths whole accountability argument seems to be pretty disingenuous, allowing anyone who wants to evaluate the source code is about as accountable as it gets.

The not-so-subtle "you will be lazy about what your doing if someone is not paying you not to be" vibe throughout this article is off putting to say the least.

I also find prioritizing user experience over the sharing of source code to be misguided. Allowing folks to gate keep knowledge and hide what they are doing is a big price just for a better user experience.

The real issue with FOSS is the same as with P2P networks. Most people are leechers whose only contribution is lip service.

 

Was hoping to get help finding a guide with more detail on setting up something like rdt-client for people who don't use docker.

It appears like its very much possible but it seems like pretty much all guides assume the user is setting it up in docker.

Currently have zurg and plex debrid setup with RD which works great but i find plex debrid a little lacking in being able to find what im looking for compares to using the *arr programs.

 

Initially saw this article from Brian Krebs mastodon account.

https://infosec.exchange/@briankrebs/111608035574860035

18
Kuketz Custom ROM Review: /e/ (www-kuketz--blog-de.translate.goog)
84
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

Confirmation in linked github discussion.

 

"We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through official and informal police communications, and only to ask for help after forensic analysis obviously failed completely.

We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a "ransom"; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It's one of those cases confirming that our servers do not store log, data or metadata of clients' traffic.

(*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens' personal data"

 

Thought this might be helpful to others who use Mullvad Browser.

Got to the advanced preferences and set webextensions.storage.sync.enabled to true.

view more: next ›