

What does Lemmy (an open community) have to do with privacy? What does privacy have to do with piracy?


What does Lemmy (an open community) have to do with privacy? What does privacy have to do with piracy?


The counter to this is always that just because someone wouldn’t pay doesn’t mean the creator’s work has no value. To that I would yes that is completely true. The creator’s work has value, but maybe not monetary value. You can’t always conflate value to money (ex. FOSS, canonical sci-fi lore, protest symbols, etc).
There is also a morality component used against my argument that would say I’m ignoring the intent, consent, and ownership the creator has. Its usually worded that I’m using outcome-based morality and that the ends always justifies the means by that logic. But I pay for X, not for access to use X. If the creator can opt without my consent to remove X from me, I’m not longer obligated to follow that moral constraint. Morality is a two-way street.


Germany hasn’t officially endorsed ChatControl, and groups like Hetzner outright oppose it. In the US, ChatControl takes the form of the LAED Act and the EARN IT Act. All three focus on this appeal to emotion that to protect kids we need to get rid of end-to-end encryption. Legislators are pretty fucking dumb when it comes to this stuff, though. They don’t understand that if they have a backdoor to encryption, everyone has a backdoor to encryption.


that would require sitting down and manually doing that for every conceivable payee
That’s just called VLOOKUP(). I think you’re over-complicating this process. If you sit down and look at your finances, you’ll notice that the number of payees you have isn’t some absurd unmanageable amount. As others have mentioned, there’s no real use case for involving AI this way. There’s no scale, no real benefit to financial tracking, etc. I get this is just to use AI for the sake of using AI, but that’s not really a goal when writing financial software.


Honestly, you don’t even need NLP for this. Excel supports regex now so you could just do a call like =REGEXTEST(A1, "(?!)^w.*mart$"). Then just mark by type and graph out to see where your main spending is coming from.


Germany’s legislation is largely spearheading the effort. They aren’t trying to build the infrastructure to support it, they already have the infrastructure. They are one of if not the biggest GDPR actors and have a large datacenter presence through companies like Hetzner and DE-CIX.


SSL_ERROR_BAD_CERT_DOMAIN means incorrect SAN information, proxying, or DNS manipulation is occurring.
You could compare what you see in the browser and what you see via something like:
$ openssl s_client -showcerts -connect cs.rin.ru:443
You could also check the DNS resolution and traceroute to see how you are getting there to confirm if DNS is being effected or you are being proxied:
$ dig cs.rin.ru @127.0.0.1 A
$ mtr cs.rin.ru


I’m sorry, its been a long day.
DNS4EU doesn’t provide DDNS service, you are correct. Checkout deSEC, they partner with DNS4EU and the EU as part of the initiative to limit dependency on US based infrastructure.


You might try DNS4EU: 86.54.11.1 86.54.11.201 DoH: https://protective.joindns4.eu/dns-query DoT: protective.joindns4.eu
I’m familiar with V:tM and some Mage, but nothing Werewolf. I do have a technical background though. AI hallucinations have already been explained in the comments, but one way you could approach this is through the use of what’s called cognitive hacking. Its a subset of social engineering that mostly focuses on things like rigging elections instead of getting people to hand over passwords and such. You manipulate content, spread disinformation, and insert narrative driven data.
Its an interesting tool in that you’d be in effect hacking your players. You might read up on a base intro to it: https://em360tech.com/tech-articles/what-cognitive-hacking-cyber-attack-targets-your-mind https://doc.lagout.org/Others/Cognitive Hacking.pdf
One tip to make it more successful: You can’t make someone think positively about something they already have an established negative belief about. You can however widen that gap and work to re-enforce their negative belief. Its the key to radicalizing people and lets you plot out what their actions will be (effectively railroading themselves without knowing they are).
I had a similar setup to this awhile back. You have to port the number to your VoIP provider of choice and then decide on what client you are going to run (no need for SIM card). I was wanting voice service and only needed limited SMS, so I went with linphone (and played around with zoiper too). If you are needing good SMS support, then JMP is probably the best. It supports both SMS and MMS. You won’t get E911 access I believe, but as data only its a good solution.
Free wifi is all over the place and if you wire up a mobile hotspot in your car (yes it somewhat defeats the purpose), you can get some pretty decent coverage.


No, installing Tailscale on all machines is not actually required. You can setup a funnel that exposes a service to the internet for all to see. This also removes the requirement for them to access via Wireguard if desired. https://tailscale.com/kb/1223/funnel


I think the idea of an IP address (IPv6 or not) providing anyone a semblance of privacy is wishful thinking in this age. Google ad revenue in the EU is estimated to be lower because the power in GPDR areas isn’t in PII obfuscation, its in the consent model. Positive opt-in to Legitimate Vendor Interest makes tracking difficult, not whether your IP is generic. You have to remember companies like Google are still able to monetize off of users in mobile CG-NAT environments in the US/EU. Given the roughly 150 other metrics Google (or any publisher/SSP would have access to), removing one doesn’t really stem the tide.
What’s also interesting is how IPs become anonymized. For IPv4, the industry standard I kid you not is to take the 4th octet and mark it zero. That’s it. It just assumes carriers use /24 CIDRs like someone’s home network might. The funny part is what if that was 50.50.0.0/22? A publisher could in practice replace one user’s IP with another user’s IP which means that they still would be passing PII unanonymized which could violate GDPR.
IPv6 uses the same basic system. 2001:db8:85a3:8d3:1319:8a2e:370:7348 becomes 2001:db8:85a3::. You just truncate at the 64th bit. Rolling through available host bits doesn’t really matter then. IPv6/IPv4 really aren’t ever used for Google user syncing.


I’ve mentioned this elsewhere, but to fair, even without you providing Google an IPv6 address, they still know exactly which computer contacted them from inside your LAN. Even in GDPR territory they can do that.


Yes, that is correct. As I said, there is probably already a docker image out there for the provider you go with.


Pretty sure that is just a discrepancy between when a site has last checked client announcements from the tracker and when what the tracker currently shows. As of 2025, TPB for example links to 3.2 million torrents. Assuming client announcements were set to an average 1hr interval, that would require TPB to make 76.8 million checks every day for announcement updates.
So, I could see sites not maintaining accurate seeder/leecher data.


The only real constraint here is VPN port forwarding. You would need a VPN provider that supports that in order to hit DHT swarms. So, just make sure the provider has that.
As for kill switching, run the VPN and torrent client through docker. There is probably already a docker image out there that does that depending on what provider you go with. Essentially what you’d be doing is sandboxing your torrent client and then only passing in the VPN interface via docker network to that client. If the VPN tunnel goes down there is no other egress point off the network segment and zero chance for traffic using a different interface.


I would only expose a port to the Internet if users other than myself would be needing access to it. Otherwise, I just keep everything inside a tailscale network so I can access remotely. Usually I believe people put a reverse proxy in front of the Jellyfin server and configure your certificates from there. So Jellyfin to proxy is insecure and then proxy to internet is secure. Lets Encrypt is an easy way to do that. And if you are going to expose a port you definitely want fail2ban monitoring that port.
If using tailscale funnels, you can technically skip the certificate part as that’s done for you, but that would take away from the learning experience of setting up a proxy.


I don’t trust them, but based on some assumptions. They are statically less likely to be taken down. That cannot be argued, but because of strictly enforced rules, most (at least the ones I’ve seen) do not allow VPN IP addresses to be registered. The issue there is the user has a forced increase in reliance on the site operator to maintain pseudo-anonymity.
The fact you were able to buy in without any proof of who you are or that I’ve encountered people just giving away invites to strangers, would suggest at least some of these trackers are not trustworthy. What protects those communities is their insular nature. Once that’s circumvented, its essentially just the same as a public tracker.
Damn kids with your twitternets and me mes.