For my travel devices, I use Tailscale to talk to the server. For raw internet, I use their funnel feature to expose the service over HTTPS. Then just have fail2ban watching the port to make sure no shenanigans or have the entire service offlined until I can check it.
Mordikan
- 0 Posts
- 47 Comments
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Meta Secures Bittersweet Fair Use Victory in AI 'Piracy' Case6·11 hours agoThis is the argument that bothers me:
The court also identified a third argument, which the authors didn’t pursue in great detail; market dilution. Under this theory, AI models trained on copyrighted works can generate “countless works that compete with the originals, even if those works aren’t themselves infringing,” Judge Chhabria wrote.
So, even if what you make isn’t infringing on their rights, its still competing with them which should be forbidden. That whole argument is a machine shouldn’t be allowed to compete with a human. So, if I am inspired by another’s work, that’s ok, but if a machine does that we need to ban it.
Mordikan@kbin.earthto Privacy@lemmy.ml•Do you think sometimes privacy practices of people at c/privacy or r/privacy communities are overparanoid or take things too far?2·1 day agoYes and no.
A lot of privacy threads focus on fantastical what-if scenarios that just never really come up. For the majority of Internet users, the biggest threat they would face comes from the adtech sector. Now most people aren’t going to understand what is collected in realtime as that’s usually company specific and usually encoded on the site/app, but standards are all open for anyone to read. Mostly this is going to come in the form of OpenRTB 2.6 (https://iabtechlab.com/wp-content/uploads/2022/04/OpenRTB-2-6_FINAL.pdf) or the Prebid library and its User ID Module (https://docs.prebid.org/dev-docs/modules/userId.html) with maybe some custom fields and VERY granular audience mapping.
Specific to that standard,
3.2.20 Object: User
and3.2.27 Object: EID
and3.2.28 Object: UID
are the important ones, but honestly all of the information can be used in conjunction with other pieces. Now if you look through that info, you’ll notice you don’t really see that much. You’re real name isn’t present. Your email isn’t present. Your physical address isn’t present (although its likely your geo location info is accurate from the device object). The thing is that so many little bread crumbs exists and so many actors are mapping those bread crumbs that once human psychology is overlaid on top of it crazy amounts of information that was not collected can be inferred. People think info like “His name is John Smith” is important when really “This is device ID EA7583CD-A667-48BC-B806-42ECB2B48606” and the numerous IDs built from that or a dozen other things is what matters.Just from that standard with enough data/time, its possible to determine your demographic/sociographic information. One could determine who you will vote for and political leanings, how much money you make, what your job is, your sexual orientation, etc. This is great if someone is trying to sell you Tide detergent, but its also really useful if you’re wanting to start a “grassroots” campaign to add/remove rights for specific citizens. It allows you to know where you can get a foothold for your legislation (Cambridge Analytica comes to mind). And these things are all easily verifiable from your browser. Without an adblocker, go browse the internet and keep track of how many 1x1 tracking pixels get dropped on you. Checkout what’s in your cookie store and what’s sitting in
sessionStorage
andlocalStorage
.So, I think groups like r/privacy focus a lot on sci-fi inspired dystopia, when instead they could be focused on more real world dystopia.
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•VPN recommendations, Summer 20251·1 day agoThat’s a valid reason. AirVPN is slower than Mullvad or PIA. AirVPN does fit some use cases better, like multi-port forwarding, but that’s not going to be what everybody is doing. PIA does offer port forwarding but only single port for single instance. To do multiple, you’d have to have multiple sessions running which doesn’t really work well from one machine.
So, if speed is your only criteria, don’t use AirVPN. Better options exist.
You might try Vortex through lutris: https://lutris.net/games/vortex-mod-manager/
I’m not sure why one of those is flagged. From what I can see its just the obnoxiously written
write_file.content
one-liners and lots of regex/sed, but nothing looks wrong with what its doing.
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•VPN recommendations, Summer 202512·2 days agoGDPR is not relevant to state monitoring. Article 23 provides the provisions to explicitly restrict data protection rights for the purpose of eavesdropping, detection, crime prevention, etc. Its wildly open ended to the point that it makes no difference in choosing a VPN: https://gdpr-info.eu/art-23-gdpr/
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•VPN recommendations, Summer 202522·2 days agoIf you aren’t concerned with flashy setups, AirVPN might be something to check into. In terms of cost, 3 months of AirVPN cost roughly about the same as 1 month of PIA.
That mouse is probably using like 0.5W of power, that’s way too much. Throw it away and keybind everything.
Mordikan@kbin.earthto Linux@lemmy.ml•I'm getting "Error setting installer parameters" while attempting to set up a new VM in Virtual Machine Manager [SOLVED]1·4 days agoMight check the file permissions then. Who owns the file? Does VMM have read permissions to the file? UUID 1000 is root, so it sounds like VMM is being run as your user, but the ISO is owned by root. You could try chown’ing that file to your user.
I never really got their marketing campaign: https://www.youtube.com/watch?v=JNsKvZo6MDs
Yeah, if the student devices are locked down its done so per policy. Creating VMs which allow students to bypass that policy is going to potentially get you into trouble with administration. IT could maybe setup those students with Citrix Workspaces or something similar they support to achieve that without having to throw student restrictions out the window.
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Has anyone pirated their internet?25·9 days agoSo, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.
To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone’s house. We’d also build cantennas from junk laying around. Those were interesting days.
Mordikan@kbin.earthto Selfhosted@lemmy.world•What is a self-hosted small LLM actually good for (<= 3B)1·9 days agoSorry, I was trying to find parts for my daughter’s machine while doing this (cheap Minecraft build). I corrected my comment.
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Please help debug fitgirl repacks not decompressing with wine sys WoW643·10 days agoIf its compression related, have you checked your caching on that system?
You might try (as root - not sudo) to toggle swap off/on:
swapoff -a && swapon -a
Then just before running the installer (again as root - not sudo):echo 3 > /proc/sys/vm/drop_caches
Mordikan@kbin.earthto Selfhosted@lemmy.world•What is a self-hosted small LLM actually good for (<= 3B)113·10 days agoI’ve used smollm2:135m for projects in DBeaver building larger queries. The box it runs on is Intel HD 530 graphics with an old i5-6500T processor. Doesn’t seem to really stress the CPU.
UPDATE: I apologize to the downvoter for not masochistically wanting to build a 1000 line bulk insert statement by hand.
Mordikan@kbin.earthto politics @lemmy.world•What the 3.5% Rule Tells Us About Protest Success2·10 days agoThat article is probably not the best way to support that idea though. It mentions “when 3.5% of its population actively mobilized against it” but doesn’t explain what “actively mobilized” even means. It talks about how effective non-violence has been in other countries but then caveats that to being when an independent judiciary was present. It even uses Kilmar Abrego Garcia to support that idea, but fails to mention that a lower court’s decision was ignored and the only reason the SC was involved was because the administration said it didn’t have to listen to them.
Obstruction is good, but ultimately if you are not at risk of losing anything by that obstruction, it likely isn’t an effective way to accomplish anything. That’s even if you could consider it obstruction. If you are permitted to have a rally then you are not obstructing anything. You’re just having a good time. Municipalities don’t approve permits that obstruct, its the whole reason for permits.
Mordikan@kbin.earthto Selfhosted@lemmy.world•Access homeserver through VPN + route traffic with mullvad?2·10 days agoTailscale has the funnel command which exposes services like how you describe, but that’s off the table.
Not quite sure I understand your layout, but if these are separate VPNs, you could run one from the server with a port forward (guessing that’s not through Mullvad as they don’t offer forwards any longer - to my knowledge) and then setup the general VPN on your router perhaps so you don’t have to change ip routes for the whole network. You would still probably need to setup an ip route specific to the server VPN traffic on the router at that point, but that would probably be less work.
If this all being done from the same device then you would need to separate them out by IP routes.
Mordikan@kbin.earthto politics @lemmy.world•What the 3.5% Rule Tells Us About Protest Success51·10 days agoI don’t think its a matter of violence vs non-violence. Even in the samples provided by the article, its a matter of willingness to commit what would otherwise be criminal acts. Ghandi was successful not because of the Salt March but because they created the Declaration of Sovereignty and Self-rule and refused to pay taxes until negotiations were made.
I remember Penn and Teller did an episode that touched on this on a show they had. The big take away was there is a difference between doing good and doing something that makes you feel good. What’s accomplished by a sit-in on a courthouse lawn on the weekend that you filed and received a permit to do from the city? People like to compare stuff like that to the 1960s civil rights movement, but here’s the thing: Rosa Parks not giving up her seat wasn’t a social faux pas, it was a criminal act in Alabama.
Mordikan@kbin.earthto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•What do you use for your YouTube Music client?2·10 days agoI don’t think you’ll get all of these points with the same tool. You can login to your account and use recommendations with Revanced YT Music, but not download. Freetube can’t do #1 but can import your sub list and download. yt-dlp can’t do #1 but can download (mpv could be used as the player technically). Invidious can’t do #1 but can the others, but Youtube updated their API recently which largely breaks Invidious. Terminal players like youtube-viewer, ytfzf, yewtube, etc can’t do #1 but usually the others.
You could try using Open WebUI (https://docs.openwebui.com/) and setup ollama with smollm2:135m (https://ollama.com/library/smollm2) on the backend. Then you’d just have to pass the equation with step-by-step mentioned.