I will probably upload some of their more recent albums (that are mostly just updating to current audio quality standards) as well. But next I will be uploading some more rare music from the Soviet Big Children's Choir. Next Red Army album is probably going to be the Lenin Album.
lmfao the vamps name is phyre i jusrt cant
So like, unless youre really digging into wireshark or something over a long time, you really dont know what connections are encrypted or unencrypted coming from your OS. Thats more what I'm referring to. Certain OSes like whonix have safeguards for this, and linux in general is much better about this. Its hypothetically possible a malicious actor could hijack an operation that isnt encrypted coming from your OS to bork you.
And yeah tor browser on its own without JS and high tracking prevention is the way to go if you dont want a big hassle dealing with your OS. I was more referring to TORing all of your computer traffic, which should only be done with specific OSes. Mullvad browser with vpn is fine for the vast majority of people and it doesnt reduce speed a lot like TOR does.
Tor can be very dangerous if you don't compartmentalize it enough and use the wrong software with it. Its pretty well documented that if you request a normal http page (not https) malicious tor nodes are constantly checking for it so they can attempt to serve you bad shit to steal info. You never really know when your computer on say, a windows machine, will make a bad request. So it becomes imperative to use operating systems and technologies that limit that issue. (Re: use tor only on the tor browser, or use qubes+whonix to compartmentalize potential bad requests).
The most secure 'every day' thing someone can do is use almost any linux distro, mullvad browser (or a normal hardened firefox), and a trusted vpn (proton, mullvad, ivpn, out of these three mullvad is probably the best).
the most secure thing possible (re dont do this its ridiculous for 99.9% of people) is probably a sneaky self-made wireguard vpn entry node + tor + qubes/whonix. and by sneaky wireguard vpn i mean doing stuff and things in order to not pay for an ISP with your vpn server. that means you have pivpn or something setup on a hidden raspberry pi on a network you probably dont have permission to run vpns on.
lmao the company running this, Hi Auto, is also an israeli firm
from what i can tell they hook into google voice's api and then hook the output into an llm to respond. the order is put into their system through RAG. this is like, script kiddie shit but they have a company of 50 people doing it (with 12 actual programmers). they also advertise 90% accuracy of the order which is fucking abysmal, any legit data scientist would be ashamed of such a low rate. it should be noted that accuracy is usually measured per token, so imagine it getting 10% of your syllables wrong in your order, which can end up with an order that is very wrong and could trigger the wrong RAG (ordering something you dont want). some of this is likely due to issues with audio quality from shit ass drive thru mics, loud motors, and bad noise cancelling. you can get a much higher accuracy spooling up a random local speech+llm model at home while picking your nose
last time i used those it didnt circumvent cloudflare blocking properly so guess they have some secret sauce here not sure
Krolden is taking issue that they can see the vpn traffic at all, as in they can see that youre using a vpn (re: ISP knows who you are) and can sell that info to third parties who will now use your identity associated with that IP address (because ISP sold them info that the VPN connection came from you)
theres ways around this of course and its actually somewhat easy to measure how big your fingerprint is. most sites of course wont have access to this paid info so reducing fingerprint is only useful to hide from google or cloudflare, and even then they wont know specifically what data you have, just what IPs you accessed. also since so many people use the same VPN it makes it very difficult to track you, you need to have a large fingerprint which can be mitigated by using linux (or with piracy, having a separate server that doesnt fuck with anything but torrents and so on)
ISPs can also tell if youre using i2p or tor so ultimately its just a masturbatory argument, of course nothing is perfect, we all know that the only way to be truly secure is to steal internet from someone else without them knowing who you are, and you also need to be sure they dont have cameras and you have a sophisticated setup with qubes + vpn + (maybe) tor depending on what you want to do. this is of course an absurd amount of security for looking at pig poop memes on hexbear
And now we're getting back to the original point of this new secret protocol, it hides that its vpn traffic, at least to current systems. I've been able to visit sites that normally block me or limit me. From what I can tell it reduces speed by half or so but if your speed is already good its usable, whereas something like TOR drops it all to a crawl, like 300kb/s if youre lucky. Dial up shit. This new protocol implementation good for daily driver obfuscation
as to 2 i do use wireguard and so on on occasion but its not really a good way to obfuscate who you are to some random website or bypass a firewall (unless you own a server in china or something)
ive heard of i2p but afaik it has similar issues with slowness as tor, hosting your own exit relay from that list of isps is still going to result in excessive latency
im talking stuff like daily driver privacy, not 'organizing a revolution' privacy, which really shouldnt be done on the internet to begin with
@TankieTanuki@hexbear.net