That was a bit sarcastic, but my Linux servers are indeed disconnected. I’d create my personal mirror (preferably on BSD and update from there). Now that the cat is out of the bag though, I feel stupid. Really, for CUPS??? Are you kidding me???
That was a bit sarcastic, but my Linux servers are indeed disconnected. I’d create my personal mirror (preferably on BSD and update from there). Now that the cat is out of the bag though, I feel stupid. Really, for CUPS??? Are you kidding me???
Wtf??? “All GNU/Linux”??? This guy made me think Linus personally had to descend to Kernel-land and fix perhaps the most horrendous memory bug in existence. But no, surely CUPS IS ON EVERY MACHINE, RIGHT???
Fuck you to whoever blew this out of proportion.
Eww no. Gives me plenty of trouble on RedHat already
You’ll have to desolder the WiFi card inside. Check teardowns of TVs from now when deciding to buy a new one
It’s a bit difficult, you’ll need be good with your solder.
Deblobbed wife, happy life
You have an amazing wife. Now install Gentoo on her device
Which distro does she have installed?
I’m heading over to Odyssey/Peertube the second they tell me to sign in to watch videos.
Oh well. Thanks for correcting me. I guess they’re trying to play hard
TBH unless this is a coordinated effort against Invidious and other apps or should affect a lot of other things too. Or does this change not affect embedded media in pages?
Thank you
They’re locking down on IPs which consume traffic like a bot/ alternate distribution platforms like Invidious instances. AFAIK the softwares itself isn’t blocked. Please try and correct everyone you see on this forum who says otherwise
To be safe: paper wallets.
The rest: YMMV
10/10 that poor bloke from Intel who copy-pasted code without understanding it (and got an earful for it) had buffer overflow bugs in his bit of plagiarized oeuvre
I’m switching off my internet until this gets fixed holy shit
That’s exactly what I do
That is indeed a disadvantage of PGP. Unfortunately, it is the most portable method of encryption text at rest at the moment. The moment somebody manages to figure out a way to use the Diffie-Hellman algorithm in a portable manner, I’m sure a lot of people will consider that a viable alternative. Till then, learn about disk encryption to keep your keys safe
I2p states on there website that it has potentially serious weaknesses.
The only relevant pages I found are I2P’s threat model and the comparison between I2P and TOR:
Please cite your sources so everyone can understand the reasoning for your claims of I2P being weaker than TOR.
Oh, and A LOT of the attacks mentioned in the page on threat models is/was possible on TOR. The I2P project follows TOR carefully and implements some of their features/mitigations too.
If we’re talking specifically about brute-force DDOS, BOTH TOR and I2P faced these issues. The good thing about I2P is that it is more decentralized than TOR which can sometimes make it easier to mitigate.
Your points about I2P’s directory (not sure what you mean by DNS here) can be lumped together with your complaints about usability. This DOES NOT make TOR inherently more private, secure and anonymous than I2P, it just means that somebody on Windows can download the TBB and start browsing (in albeit a not-very-secure way). Unless you missed the news, I2P now has a slick Windows installer so people don’t have to fiddle too much with it.
You’re going to have to give me evidence for me to believe that using I2P makes a substantial dent in your available bandwidth. Yes you’re a router in the network but it doesn’t mean that you’re passing through traffic at GB/s speeds.
i2p is somehow a replacement for Tor
I never said that. Again, I’m not comparing I2P and TOR based on their usability (which has changed in the recent years), I’m comparing them in terms of anonymity on the wider internet when browsing using either protocol. Both TOR and I2P are great projects, the problem is that TOR is significantly more centralized.
However, if you are in a critical situation use Tor not i2p as today it is the best for bypassing censorship while still trying to stay safe.
Cite your sources for this. This is mere conjecture unless you have proof of metadata leakage on I2P but not on TOR/actual people getting caught using I2P but being safe on TOR. I’m sure the I2P Devs would be very interested too. If you’re in restrictive regimes like Iran and China where TOR/I2P traffic is flagged - use a bridge or a VPN disguised as HTTPS traffic and hope for the best (it’s a perpetual cat and mouse game).
Again, please cite your sources when making claims about technical shortcomings of I2P
Is there a problem though? Yes they does should be concentrating on the language they need to speak when in said country, but it a very good idea to have some grasp of English when you go abroad, just in case you cannot grasp communication from the other party. You don’t want to be stuck in Germany speaking just Vietnamese