According to you, only a half dozen of people are not idiots on this world, correct?
why would everyone, or even just I as a kind of technically adept person, use steganography daily? what problem does it solve?
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
According to you, only a half dozen of people are not idiots on this world, correct?
why would everyone, or even just I as a kind of technically adept person, use steganography daily? what problem does it solve?
but also because reading the policy doesn’t help much when there are no options (brands) that are acceptable
put it on a damn VLAN with no access to the internet. maybe through a whitelisting proxy. otherwise you won’t know if it just evades your measures by using some encrypted tunnel or anything
wow, this has blown up!
some additional clarification:
I2P is not universally supported by any bittorrent clients, because a bittorrent client needs specific knowledge about how to connect to the I2P network through an I2P router (by using the “SAM” protocol).
the java based biglybt bittortent client has pretty good support as I hear, it supports I2P-specific DHT and Peer Exchange. DHT is used for peer discovery without a tracker, Peer Exchange is another tech that helps with finding more peers.
qbittorrent (and a few others that use the libtorrent programming library) has got support for I2P around a year ago, but its experimental so far I think, or at least it hasn’t been tested that much.
these bt clients don’t (yet) support DHT and PeX for I2P torrents. the functionality is missing from libtorrent and its single dev is very busy already.
if you are interested about the technical aspects, here are some more words about using bittorrent with I2P from a developer perspective: https://geti2p.net/en/docs/applications/bittorrent
I don’t think this is anime, it’s cartoony to me. not sure if this makes it any better to you.
though true that piracy is not an open source project, but something broader, maybe a lifestyle or mindset, so it’s a little unusual that the mascot is for that
I2P is not an alternative to bittorrent, but to IP networks. Essentially I2P is an overlay over the IP-based Internet.
bittorrent can work through I2P just like it can over IP or Tor.
What was that, punk??
AMATEURS!
2532, 19.7 TB
that’s good to be aware of, thanks
I thought you were thinking an AI based code generator klike copilot) does it, when you said the IDE does it.
username checks out /s
not the IDE, its the compiler. this is also not some AI shit, in many cases (not all) the compiler can actually figure out how to do this, because it’s not hard, it would just be a lot of boilerplate if written manually.
There isnt much to discuss
oh I think there is!
you know what is tiring for fucks sake? that you are parroting your opinion basically, without pointing to any evidence. I don’t know this service, but do you call them rapists because they are known for doing that, or because they didn’t block users that were accused of rape?
I don’t approve of rape and fascism either. but you know, private services don’t make a difference between anyone. why? because they can’t make sure the accusations are true. if they can by looking at your data, they are not a private service.
would you ban encryption because rapists use it too? encrypted services, like proton and matrix? signal? do you think they are guilty of allowing to conduct rape in secret?
even if it turns out the maintainers are rapist fascist fucks themselves, the previous paragraph stands, and I’m interested in your responses.
they couldn’t finish the message. maybe they were hit by the bus that was late
since this is most likely not a very popular add-on, any browser with it would stand out considerably more relative to not having it.
websites cannot look at the list of your addons. they have to detect the presence of each, which is mostly possible when the addon makes changes to the page content, or replaces browser APIs in certain ways.
Typically its common for browsers that want to reduce fingerprinting (tor, mullvad etc) recommend not installing new addons as then you stand out from crowd.
because if an addon does something that a website can detect, that’ll make you stand out
I wanted to ask you how does such an extension make your browser more fingerprintable.
I’m still interested in an answer, but after looking at the code there’s a (actually not so) surprising turn: this thing sinply cannot live without remotely loaded google fonts (at addon startup) for some fucking reason.
that technically shouldn’t make you more fingerprintable, but the extension makes sure google is notified that you opened your browser.
yeah, they have other undiscovered vulnerabilities
no, I won’t pay for data mining services
Seems strange that the dev seems to be keeping quiet on this, no?
the issue was just posted 7 hours ago. maybe they just haven’t seen it yet.
someone in issue #573 asked if the dpapi file is really needed, and by looking at the manual installation instructions, yes, because that contains all the code.
the developer loads custom code into the spotify process by using such an “override” dll file. it works because spotify is voluntarily loading a dll with this name, and if there’s such a file in the directory besides the .exe file, it’ll take precedence over the original file installed in the system.
the trojan warning is probably triggered because this technique is often used by malware to change the behaviour of your programs, but as with most technologies, it has good uses too
did you want to link #573 ? you only linked the issues list
legal streams already do
discord and google docs. say no more