stupid_asshole69

joined 4 weeks ago
[–] stupid_asshole69@hexbear.net 1 points 3 hours ago

It’s maybe only marginally piracy, but yt_dlp can be used to automatically scrape channels and playlists.

Useful when you watch a lot of stuff that gets taken down.

[–] stupid_asshole69@hexbear.net 8 points 3 hours ago
  1. Looks like team rockets blasting off again!
[–] stupid_asshole69@hexbear.net 9 points 9 hours ago

No less safe than anything else I reckon.

[–] stupid_asshole69@hexbear.net 1 points 9 hours ago* (last edited 3 hours ago)

That’s probably a bad idea.

Not only are you going from committing a crime in private to committing a crime in public, you’re putting yourself in one of the most vulnerable positions possible when it comes to computer security (every few months there are new attacks developed specifically to target users of free public wifi).

Even if that wasnt a problem to you, businesses often have content blockers and traffic shaping to prevent you from torrenting and when they don’t you’ll be competing with everyone else actively streaming video and audio to their phones as well.

It’s also trivial to figure out who’s torrenting on public wifi and has been for years.

If you’re truly concerned about this new law then public wifi isn’t the solution.

E: and if all that doesn’t convince you and you go through with it, you’ll be causing a problem that will actively make people look for you so the wifi isn’t completely jammed up.

[–] stupid_asshole69@hexbear.net 2 points 15 hours ago (1 children)

I tried a lot of the alternatives before switching to a vpn for torrenting.

For a long time I only used private trackers with encryption required and dht and whatnot off. It worked pretty good, especially with traffic shaping on the router.

If you really want to avoid paying money that’s where I’d start. The problem you’re gonna run into comes from how the law is used against piracy, who does it and how.

If I were gonna go that route today I’d set up doh or dot first. Both are free if you want to use mullvads servers.

Good luck.

[–] stupid_asshole69@hexbear.net 5 points 18 hours ago (3 children)

Free vpns sell your data. It’s why they’re free. Processor cycles and bandwidth cost money so if you want someone to use their processor cycles and their bandwidth to encrypt and route your traffic through their servers without clandestinely peeking, and using lawyers and advanced security techniques to ward off the police, you gotta pay them.

In order to seed torrents you need to have a port on your vpn endpoint that is accessible to the internet and gets passed to the computer running your BitTorrent client. This is called port forwarding. There are only so many ports, so a vpn provider that offers port forwarding will probably charge more and you might not be able to get certified hood classics like :42069 because someone is already using it.

I use airvpn for torrents but depending on your European country you might not be able to. There are other port forwarding vpns. The cost is cheap, most come out to less than $5 a month.

Most let you run multiple devices at the same time so you might have your computer at home torrenting through the vpn while you’re away at work browsing porno on the toilet connected to the vpn which lets you get past the work content blockers.

So… just pay for a port forwarding vpn.

[–] stupid_asshole69@hexbear.net 12 points 19 hours ago

Nothing is inexpensive, fashionable and free of the garment industry’s ills.

Cheap stuff is cheap because it is made thousands at a time by people paid nothing and shipped as low weight/value containers on giant cargo ships leaking bunker fuel into the ocean as they go.

If cheap and fashionable are most important, get a secondhand pair of shoes and put in new insoles. If it’s fashionable and good you want there’s a bunch of brands targeted at avoiding the particular ill you see in the world. If it’s cheap and good, hippies will tell you who the real criminals are.

Probably the best way is to unplug it from the charger and remove the battery.

You can’t effectively use the device while it’s not vulnerable to attack.

What kind of eavesdropping are you worried about? I ask because concern over advertising is different than concern about laser listening (a technology that was available to me in kit form as a middle school student many years ago).

It’s not reasonable to ask how to avoid all eavesdropping because without any context you quickly start wondering if you could recover from being rendered and detained for the maximum legal duration in your jurisdiction.

Look into the t-series thinkpads. T480 is the meme one, but many newer models are very inexpensive and modular. I don’t have dells, but people who do recommend the Inspiron or Vostro ones. They’re similarly cheap and repairable. There are business class hp laptops for cheap too.

For my needs these computers have been very useful and fast.

Often a whole parts unit (bad screen, no ram, no hd for example) of one of these laptops can be had for the price of a single replacement part from one of the smaller manufacturers.

Because they’re so common, new production third party replacement batteries are available and new old stock as well.

If you value environmentally friendly actions, using these machines is literally taking plastic out of the waste stream.

[–] stupid_asshole69@hexbear.net 1 points 2 days ago (2 children)

If you haven’t already bought something:

What do you have now?

I would generally recommend against chromebooks. They’re often aimed at the lowest end of the market and have esoteric processors and boot processes that will make you frustrated.

I would generally recommend against small laptop manufacturers like framework etc. because of parts availability. People will say that you can get parts from the manufacturer but for how long? People will say you can make the parts themselves because the design is open source but I have a board etching setup, hot air station and injection molding machine and I don’t do that.

Obviously if you just want to “vote with your dollars” the above doesn’t matter.

If you want to get a laptop that’s gonna run linux well and last a long time get a used business class machine. There will always be a huge market for parts and they have almost always had someone put the effort in to document getting their distro to work right on their work assigned computer.

The black sheep option is to get a mac. Parts are everywhere for cheap and every microsoldering and computer repair shop will work on them because so many people have them and want to get them fixed. Obviously do your research first, but asahi is coming along and you’ve always got a Unix system to fall back on if it isn’t working out.

You’re thinking about this wrong.

Instead of trying to pick the one that will handle a fail state best, you can more effectively assume a fail state and take steps to mitigate it. That is to say: implement key (in your case, password) rotation.

Just establish a trusted system, log in and change your passwords periodically.

You can even do rolling rotation where you only change a few each week.

If that doesn’t seem like the right choice to you, then consider this: you’re thinking about an unconfirmed or possibly even uninvestigated situation where your secrets have been compromised. The solution isn’t to find the secret handling software that deals with this situation in the best way possible, it’s to change secrets.

view more: next ›