piracy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

Skies5394, in BitTorrent Pirates Won’t Receive ISP Warnings (It Will Be Something Worse)

This is for the Netherlands, but it’s about the anti-piracy group not allowing defeats in court on the basis of GDPR and ISP refusal get in the way of a good harassment.

Good read if you want higher blood pressure.

Apollo2323,

Most seedboxes are in Netherlands.

neshura,
@neshura@bookwormstory.social avatar

And most seedboxes are unlikely to be matched to a specific identity unless the box provider cooperates, which looking at their reason for circumventing ISPs I’d guess won’t really happen unless ordered to by court.

onlinepersona,

🤔 Why is that?

Cannacheques,

How ironic

Thorned_Rose, (edited ) in BitTorrent Pirates Won’t Receive ISP Warnings (It Will Be Something Worse)
@Thorned_Rose@kbin.social avatar

"injured rights holders"

🙄🙄🙄🙄🤮

cupcakezealot,
@cupcakezealot@lemmy.blahaj.zone avatar

come on now be nice. warner brothers entire business is hurting when you download that tv season instead of paying for it they might have to shelf another finished movie and claim the multi million dollar tax break again. /s

NocturnalEngineer,
AeroLemming,

If a rights holder claims injury, I should be allowed to make it true by stealing their car.

zwaetschgeraeuber, in Once a pirate, always a pirate

if you have enough money, pay for stuff you like.

interceder270,

Lol. You do that 🤡

seitanic,
@seitanic@lemmy.sdf.org avatar

Why should I?

mriormro,
@mriormro@lemmy.world avatar

It’s a nice way of showing the people who make the things you like support.

MashedTech,

Yes. Normally you would want more stuff you like.

interceder270,

Because they want you to be a useful idiot like them.

MashedTech, (edited )

You’re right. If you can afford something you like you should steal it, it’s much better. Whenever I go into a library I just take a bag and dump all the books and take them home. Why should I put in the effort of wasting my time(meaning money I could have earned) signing a library card when I can just steal? It’s THE MOST EFFICIENT WAY. That’s how I stay RICH. I never pay. Whenever I see someone about to pay for something they want I just steal their money, why should they keep it if they’re not smart enough to not waste it? Their money is much safer with me. The apartment I’m currently living in is so cheap, because I never pay. I just changed all the locks, have triple bolts on all the doors and just stay here. It’s mine, it’s free and they can’t kick me out because I won’t let them. Why should I pay for the internet when it’s basically flowing free through these wires and air? I just take some from my neighbor. When I go to a coffee shop I just grab the first drink I see that’s on the counter. If they’re not fast enough to take their drink, I take it, it’s just sitting there, it’s free.

seitanic,
@seitanic@lemmy.sdf.org avatar

When you steal books from a library, you’re preventing others from accessing those books. When you download a digital copy of a book, you aren’t.

Same thing with money. If you stole my money, I’d be upset, but I wouldn’t be upset if I had infinite money.

YeeterPan,

steal

Tldr~ the comment isn’t relevant as piracy isn’t stealing

sukhmel,

I’m not sure whether to agree or not, but he’s got the point in the following sense: if everyone will pirate and never donate to the creator, then the creator will get about zero returns and will likely go make a living doing something else.

So pirate + donate looks like more fair redistribution of wealth, while pirate + no pay looks like being greedy asshole same as corporations

MashedTech,

Honestly, you should go watch Benn Jordan: youtu.be/gDfNRWsMRsU?si=TWErOa6A1XxvFpJu

He makes some great points and has some personal examples. He made more money by releasing the album on torrents and asking for donations compared to the normal ways of releasing your music.

Moonrise2473, (edited ) in it sure beats having to buy it, but seriously come on...

I much prefer doing ocr by myself if really needed, than getting an half assed “book” full of typos and broken tables just because someone did an automated OCR but didn’t have the 5-6 hours required to manually edit to make it decent

Already be thankful that someone took the time to flip page by page in their scanner manually and upload it somewhere

NotBadAndYou, in Youtube has better anti-adblock now. Other than Invidious, any way around it? Purging and re-dowloading the ublock stuff didn't work

I use FireFox + uBlock Origin, and never see ads. I did have to disable my other adblock/privacy extensions (DuckDuckGo Privacy Essentials, PrivacyBadger, and Ghostery) for YouTube before its anti-adblock stopped complaining, but FF+uBO seems to work just fine with default filters enabled.

Bear_with_a_hammer,

I used AdGuard and never seen it, even when they rolled it out.

umbrella,
@umbrella@lemmy.ml avatar

these privacy extensions all overlap anyway.

capital, (edited )

Yep. 2nd part is important.

The way I solved this was to leave my regular browser setup alone, make a new Firefox profile just for YouTube, install ONLY ublock origin, and create a shortcut to that profile on my desktop.

Now I only use that profile for YouTube. I haven’t seen one ad since this thing started.

Mongostein,

I did the same for Facebook

JackGreenEarth,

Firefox has profiles?

nintendiator,

Always has been.

See about:profiles and the –profile ${directory} switch.

Krafting, (edited ) in Why is "vodafone" trying to log in to my hawke-uno account? In the past 3 days they've tried and failed 3 times already, not to mention my account has been recently disabled for inactivity
@Krafting@lemmy.world avatar

“Vodafone” is the ISP owning the IP address of the user who tried to loggin. So i’ts someone who is using vodafone as his ISP.

Excrubulent, (edited ) in Feeling the lack of moderation now Reddit?
@Excrubulent@slrpnk.net avatar

Seems like the way for reddit to “solve” this is to just close bad subs.

But that’s easily exploited, if people migrate to other subs and start protesting the sub closures, those subs get worse and they need to be closed…

Oh no, reddit, did you just discover that you relied on your users to make your site good and by screwing them over you’ve made your entire business unsustainable at scale?

Also, somewhat related, is there a short snappy name for lemmy communities? Some people call them subs out of habit but I don’t wanna do that, and “communities” is four whole syllables, and ain’t nobody got time for that.

survivalmachine,

“solve”

to make your site good

unsustainable

I think you’re misunderstanding reddit’s goal. Over the past year, they have been in IPO mode. They don’t care about making the site good or attracting a healthy community. They want to cash out and are burning down any structures that are providing any resistance to that.

Whirlybird,

They don’t care about making the site good or attracting a healthy community.

They never cared about the “healthy” part either, just “big”. Reddit has been a cesspool for years and years and years, largely thanks to the moderators.

DebatableRaccoon, (edited )

Hopefully it costs them dearly. Kinda like the whole Tumblr censorship fiasco and drastic fall in value but before they sell it. Put in the poor house

fuwa,

Why do you care how it turns out financially for reddit? The outcome I’d wish for is that more people come to lemmy

DebatableRaccoon, (edited )

Because I was generally enjoying Reddit before being forced out by the API crap. I’m a creature of habit so tend to dislike change and as much as I’m generally liking Lemmy, I’m having to force myself to not check the app every time I get bored because I’ll just see the same posts 20 times in a day thanks to the relatively low level of interaction on the platform currently. Whenever I go looking for tech support online, it’s nearly always a reddit post from 2-8 years ago that has the answer but I don’t want to spend any amount of time on the site, particularly if I’m on my phone at the time since it means doing that annoying step of having to manually change “www” to “old” to make the site functional and readable. I guess I’m just feeling vengeful at yet another good (or some approximation of) thing ruined by yet another money-grubbing, power-hungry, self-important tosser.

Though I see what you’re saying… ish. I think at this point, we aren’t going to see a massive influx of users without the death of competing platforms like Reddit since there are enough people either happy to keep taking the punches or think sunshine shines out of Spez’s asshole. Frankly, we can do without the second kind of person but the first won’t do anything without a certain amount of persuasion and I reckon the sinking of the ol’ Reddit ship would be just enough of a toe-capped-boot up the nether regions to persuade.

Edit: grammar whoopsies

Excrubulent, (edited )
@Excrubulent@slrpnk.net avatar

You’re right, they aren’t trying to make something sustainable. I guess I was giving them too much credit when I said that.

The problem they’re facing here is that if they can’t sustain even the appearance of a functioning site that investors might want to buy, then they fail at that too.

So maybe the best way to fix this is just to ride it out and not close the subs, but if they’re just full of users that have finally clocked why mods are needed and that the place sucks now, that’s also a bad look.

If the search engines start to realise that it’s a cesspit with nothing worth linking to anymore, then that really hits their metrics. I’ve just realised I really need to get onto downloading my posts and deleting them.

BurningRiver,

Maybe daddy Elon can pay another $50b to buy Reddit and run that into the ground too.

Obi,
@Obi@sopuli.xyz avatar

I’ve seen “Lemmies”, I’ve also seen “sublemmies” which brings “subs” back on the table imo. Alternatives are /c/s, commus, com’s, etc.

Excrubulent,
@Excrubulent@slrpnk.net avatar

I guess “subs” isn’t exactly a reddit specific term. I don’t even know if it started there tbh.

I’ve just realised there’s nothing wrong with taking some of the language they used, we are after all following the basic link aggregator format.

MolochAlter,

I remember “subforums” back in the day, so it definitely didn’t start with reddit.

imaqtpie,
@imaqtpie@sh.itjust.works avatar

I like communities and sublemmies.

Coms/commus sounds forced and unnecessary, doubt it’ll catch on.

As for Lemmies, I think that should be a synonym for instances/servers. So, for example, the biggest Lemmy with the most sublemmies would be lemmy.world.

And of course, the users are lemmings.

root_beer,

“Communes”, populated by “commies”?

petrescatraian,

@Obi /c/s is not long (albeit a bit complicated to write, on phone at least) and it could easily be expanded verbally, so you know that /c/s = communities.

On Friendica, everything that is not a person or a page is displayed as a group. As a Facebook alternative, it does make sense, but for you in the Lemmy world I imagine it would sound a bit bland. 😁

@Excrubulent

db0,
@db0@lemmy.dbzer0.com avatar

Coms?

Willy,

Subs still works in my mind. Subdirectories of all, or subscriptions… whichever way you want to think of it. I never really thought of subs as short for subreddits though, that was just convenient marketing based of those same terms.

anarchrist,

Yeah subs and the mods are the doms, which works for my dyslexic, kinky ass.

AceCephalon,
@AceCephalon@pawb.social avatar

I’m honestly surprised I’ve not seen anyone make that connection for a joke, thanks dyslexia, it’s pretty funny.

replicat,

Coms?

Curly722,

Well call them… Cummies

fishbone,

“Any recommendations for good cummies here?”

“I usually start my day just laying in bed and checking out new cummies”

“It’s unfortunate that niche cummies don’t always have the support needed to stick around. I’ve seen great cummies wiped away before they could really build any volume up.”

“It’s so often overlooked, but proper handling of cummies is really what keeps them enjoyable day after day.”

Yep, I see no fault with the naming scheme here. Really rolls off the tongue well too. Very palatable. Definitely not absolutely cursed.

AceCephalon,
@AceCephalon@pawb.social avatar

Totally not completely cursed, and those example sentences absolutely didn’t make me regret being literate.

x4740N,
@x4740N@lemmy.world avatar

What the fuck

x4740N, (edited )
@x4740N@lemmy.world avatar

They are called “lemmy communities” or “communities”

“Sublemmies” is cringe and is some weird portmanteau with subreddit which is stupid because I don’t know why people are still attached the idea of subreddits since this isn’t reddit and “lemmings” which some users like to call lemmy users but I don’t agree with that either and “lemmy users” sounds like a better term to use

So many people here are trying to emulate reddit when this isn’t reddit, yes some features from reddit would be nice like a group collection of subreddits like multireddits did and post flairs but this still isn’t reddit

anamethatisnt,

I mostly call them “cees”, ex “The linux cee on .ml”

EvacuateSoul,

You’re saying it out loud? Who in the world to?

anamethatisnt,

Two gamers in one house! I might even get her to install Fedora on her next gaming PC. She’s using me as proof of concept I think…

django, (edited )
@django@discuss.tchncs.de avatar

A short name for communities would be groups. I like to call the users fedizens, as it is not specific to one software.

Excrubulent,
@Excrubulent@slrpnk.net avatar

I like “group” actually. It’s short and descriptive.

originalucifer, in OpenSubtitles.org is shutting down it's previous API. Now only authenticated access allowed.
@originalucifer@moist.catsweat.com avatar

ha, i love how their reasoning tried to not point out the obvious: money

upgrade to vip for a better user experience! (cuz we made the other one shitty on purpose cuz money)

im not faulting them for charging a price for a service, just dont blow smoke up my ass for why youre doin it.

db0,
@db0@lemmy.dbzer0.com avatar

I’m actually faulting them for trying to make money off a crowdsourced service. They didn’t write the damn subtitles.

ogeist, (edited )

This will just create new competition for them. I have been watching anime for several years and never once had to go through opensubtitles. Most releases now have the subtitles integrated so what is the value they bring to the whole thing?

Edit: I just realized I’m replying the one an only db0, you are the best, cheers!

lud,

I use it primarily because the embedded subs are often in vubsub which fucking sucks and can’t be played probably on some devices, they also don’t scale probably.

db0,
@db0@lemmy.dbzer0.com avatar

Anime is a different culture. Most non-anime stuff doesn’t have them embedded (especially the old stuff) and it’s still useful for finding subtitles for other languages

originalucifer,
@originalucifer@moist.catsweat.com avatar

i didnt know that! fuuuuuck those peoples

7u5k3n,

…make money off a crowdsourced service. They didn’t write the damn subtitles.

Ah the reddit formula

FigMcLargeHuge, (edited )

And ancestry dot com. That one still chaps my ass. My mom spent so much time in there adding in her work, and they just fucking locked it one day behind a paywall. Fuck these sites that just take the users hard work and then try and profit off it without announcing that from the get go.

db0,
@db0@lemmy.dbzer0.com avatar

Always assume that’s the ultimate goal with for-profit services.

Metal_Zealot,
@Metal_Zealot@lemmy.ml avatar

If it’s not fully for profit now, it will be later

FigMcLargeHuge,

I always assume that. My mom was getting up there in age, and just having a fun time entering in her work. She had no clue that would happen, until it did.

Kerrigor,
@Kerrigor@kbin.social avatar

Also, wrong fucking audience. The people using this are pirating.... what do they think is going to happen when they put a paywall in front 😂

Metal_Zealot,
@Metal_Zealot@lemmy.ml avatar

Textbook shooting yourself in the foot, I really don’t know what they were hoping to gain. You already had a long-lasting reputation in the online community, now you’re a fucking scab

biddy,

They weren’t gaining anything with the free service, now they might get a bit of money from it.

lud,

The uploaders often get VIP for free and what will happen is probably just good for them. Leechers aren’t the greatest for torrents nor services.

I pay for it, because it’s cheap and I might as well.

andrew, (edited )
@andrew@lemmy.stuart.fun avatar

IDK, if I was contributing subtitles for an open provider free of charge who shared them free of charge, I’d be glad my subtitles were helping people who needed them. Now that labor has been turned into capital and that rug has been pulled with no back-dated compensation or provisions for free subtitles for hard of hearing or something. It’s a shitty move across the board for everyone but the owner.

lud,

The subs are still free for casual users the ones that need to pay are power users that download through the API.

The API users won’t upload subs or anything, website users are more likely to do that.

I doubt I will switch provider because they seem to be the best by far and I download 1-2 files per movie/series automatically via Bazarr.

If anyone knows any non shit options please tell me.

vaquedoso,

I would hardly consider ‘power users’ the ones who download via the API. I used to download them via BSPlayer, where it will prompt you in a nice user friendly interface if you needed subtitles for whatever you were watching. Well, that used the old OpenSubtitles API, and now that it’s gone it’s not gonna work anymore

val, in Once a pirate, always a pirate

My coworkers were talking today about all the hoops they were going through with streaming to find the content they wanted and navigating the byzantine extra charges to share it with their family. If piracy wasn’t an option I still wouldn’t go through all that, it’s madness how much worse the paid service is to the high seas.

OsrsNeedsF2P,

Yup. My gf has Netflix but for one of our shows, the English subtitles disappeared (she’s ESL). Took like 15 minutes to figure it out, but happened again the next day. Now we pirate that show because it’s easier, even though she has it on Netflix.

sukhmel,

I wonder if you have legal access to things you’re pirating, could someone call that a theft too? 🤔

DrQuint, (edited )

Also used someone else’s Netflix to finally hit the attack on titan craze some years back.

No english subs. Have to read the local language. Whatever. The names were not accurately translated. Whatever. I could look past that since they were consistent within the subs as presented.

Season 2 - all the names changed from season 1. Even something as simple as changing a K to a C is too much and unacceptable, but the fuckers were straight up changing the name of the militaty units and shit. I had no idea who was who.

20 minutes later, I’m watching the HorribleSubs version with the worldwide-accepted English names and I never watched anime on Netflix. Piracy is a service problem.

Damage,

I have Netflix and Amazon and I still pirate a bunch of stuff, sometimes I even forget to check if something is available there before torrenting it

interceder270,

That’s what they get for being too stupid to use free streaming services.

A fool and their money are soon parted.

It’s easier to fool someone than to convince them they’d been fooled.

supervent, in PSA: Don't torrent over TOR

For bittorrent and p2p it is better to use i2p, tor only to surf the internet.

atlasraven31,

Mind giving a little info about i2p for the clueless?

CAVOK,

There’s an i2p community here on lemmy. Click my username for a link.

ReversalHatchery, (edited )

It is a different anonymity network, which works differently in many aspects.

I2P and Tor comparison: geti2p.net/en/comparison/tor
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): geti2p.net/en/docs/applications/bittorrent

Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.

Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.

NuXCOM_90Percent,

Near as I can tell:

Tor is about privacy (and is prone to being compromised but…). So long as the exit nodes are in “friendly” countries and are run by trustworthy individuals (…), you are “safe”. And that is why it is popular among journalists. The downside being that a lot of heinous shit is done on Tor and those exit nodes are potentially liable for them.

I2P is about avoiding censorship. Everyone is an exit node and cops kicking down doors doesn’t significantly hurt the network.

But… I would very much NOT use that for torrenting. Because the endpoints can still be detected and recorded. And “I wasn’t downloading that Tay Swizzle concert, I was just letting potentially thousands of other people use my computer to download it… Why did you suddenly start laughing and talking about The Pirate Bay?”.

And that also ignores the “darker” parts of the dark web. Where, rather than getting a letter from the MPAA you get a visit from Chris Hansen.

WarmApplePieShrek,

I2P doesn’t really have exit nodes. You can only browse within the I2P network.

ninchuka,

Out proxies are a thing

supervent,

On i2p everyone is a node but not everyone is an outproxy to the clearnet, you have to enable it manually.

nybble41,

It is not true that every node is an exit node in I2P. The I2P protocol does not officially have exit nodes—all I2P communication terminates at some node within the I2P network, encrypted end-to-end. It is possible to run a local proxy server and make it accessible to other users as an I2P service, creating an “exit node” of sorts, but this is something that must be set up deliberately; it’s not the default or recommended configuration. Users would need to select a specific I2P proxy service (exit node) to forward non-I2P traffic through and configure their browser (or other network-based programs) to use it.

NuXCOM_90Percent,

Maybe I am missing something but that just feels like you are arguing semantics.

Traffic exits the sub-WAN from basically any of the computers/nodes in it. So it might not be a Tor Exit Node ™ but it still has all the dangers of it.

nybble41, (edited )

No, that’s not how I2P works.

First, let’s start with the basics. An exit node is a node which interfaces between the encrypted network (I2P or Tor) and the regular Internet. A user attempting to access a regular Internet site over I2P or Tor would route their traffic through the encrypted network to an exit node, which then sends the request over the Internet without the I2P/Tor encryption. Responses follow the reverse path back to the user. Nodes which only establish encrypted connections to other I2P or Tor nodes, including ones used for internal (onion) routing, are not exit nodes.

Both I2P and Tor support the creation of services hosted directly through the encrypted network. In Tor these are referred to as onion services and are accessed through .onion hostnames. In I2P these internal services (.i2p or *.b32) are the only kind of service the protocol directly supports—though you can configure a specific I2P service linked to a HTTP/HTTPS proxy to handle non-I2P URLs in the client configuration. There are only a few such proxy services as this is not how I2P is primarily intended to be used.

Tor, by contrast, has built-in support for exit nodes. Routing traffic anonymously from Tor users to the Internet is the original model for the Tor network; onion services were added later. There is no need to choose an exit node in Tor—the system maintains a list and picks one automatically. Becoming a Tor exit node is a simple matter of enabling an option in the settings, whereas in I2P you would need to manually configure a proxy server, inform others about it, and have them adjust their proxy configuration to use it.

If you set up an I2P node and do not go out of your way to expose a HTTP/HTTPS proxy as an I2P service then no traffic from the I2P network can be routed to non-I2P destinations via your node. This is equivalent to running a Tor internal, non-exit node, possibly hosting one or more onion services.

NuXCOM_90Percent,

Fair enough. Then you have the exact same risks as far as torrenting (the point of this thread) are confirmed. But still increased risks as far as csam.

nybble41,

What “increased risks as far as csam”? You’re not hosting any yourself, encrypted or otherwise. You have no access to any data being routed through your node, as it’s encrypted end-to-end and your node is not one of the endpoints. If someone did use I2P or Tor to access CSAM and your node was randomly selected as one of the intermediate onion routers there is no reason for you to have any greater liability for it than any of the ISPs who are also carrying the same traffic without being able to inspect the contents. (Which would be equally true for CSAM shared over HTTPS—I2P & Tor grant anonymity but any standard password-protected web server with TLS would obscure the content itself from prying eyes.)

NuXCOM_90Percent,

You are still possessing csam while being used as a node to transit it.

A compromised (or even honey pot) node can show all the people who were “just holding it for a friend”. And ignoring that ISPs have historically cooperated in investigations, they also have many more lawyers.

So regardless of your ethical/moral concerns over facilitating the transit of csam, you are opening yourself up to being caught in a semi-tech savvy investigation.

Natanael,

This is not how the law is applied to packet switching.

If it was store and forward then maybe just maybe law enforcement would care, but anybody smart enough to set up an I2P node to research it and who tried to track where packets from from would first see the packets originate from their own local node at 127.0.0.1, then in the I2P console they could see that packet came in via an active half-tunnel from their own end interfacing with the endpoint node of the other side’s half-tunnel, and they would know that node has no idea what it’s sending (just like their ISP)

NuXCOM_90Percent,
  1. You are assuming good faith on behalf of law enforcement
  2. You are assuming any investigation would go beyond the equivalent of "Well, we see these twenty peers in the download queue. Look up to see if we can send a DMCA"
  3. You are assuming “I was just trying to help people share material they don;t want law enforcement to know about. How was I supposed to know it was csam? I am the real victim here” will work, at all.
Natanael,

1: then they would go after literally anybody running a node

2: their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.

3: by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.

NuXCOM_90Percent,

then they would go after literally anybody running a node

ACAB? Also, I’ll get back to this

their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.

And only people with similar politics to you will ever gain that understanding? Again, more on this

by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.

And countries around the world are increasingly pushing legislature to make “anonymization” and “encryption” tools illegal (or at least require backdoors).

Which gets back to the politics aspect. Even among those of us who care about personal security (which, again, has nothing to do with torrenting but here we are), the likelihood of others to use it for nefarious and evil purposes is a problem. I’ve taught a few journalist friends how to use tor but I personally do not because that, and tools like i2p, tend to also be used for csam and I have pretty strong morals and ethics about not facilitating the dissemination of that.

And, as we remember once or twice a year, there are “hacktivist” groups out there who like to have a field day. And compromising tools used for the distribution of csam is something that many groups do.

But also? Those piece of shit cops and governments trying to get their fascism on? It is a lot easier to push for “extreme measures” when it is going up against pedophiles and child abuse. We saw similar with how the US (and other western nations) cracked down on immigration under the guise of “stopping the Muslims from doing another 9-11”. And we are likely to see similar come out of the Israel/Palestine war.

MAYBE you get a really good lawyer so that you can get off on… Maybe you get a really good lawyer who cites the proper legal precedents AND a judge AND a jury who actually care about that. You have still had your reputation ruined for “being a pedophile” and laws are already being pushed to make using any of these tools illegal to begin with. And The People will generally support it because CSAM.

And getting back to “an IP address isn’t enough”: Yes, some judges have decided that. Was it Avatar that was the big case people like to cite? Been a minute. But that doesn’t stop other judges who just don’t give a shit about precedent still providing the subpoenas. And considering that getting the equivalent of a peer list requires “understanding the i2p network statistics console”: There are likely to be additional “fingerprints” involved. I’ve not spend much time looking at said console so am assuming there is nothing as stupid as a mac address, but it becomes a lot harder to say “Old Lady Withers across the street was using my wifi”.


Just because people are stupid and this is the inevitable drive by from the peanut gallery:

No, I am not saying that everyone who uses tor or i2p or whatever are pedophiles. What I am saying is that those are tools that are pretty notorious for being used to distribute and share csam. And while some people are okay with “Oh yeah, my private browsing of this website helped to mask child porn but I personally didn’t look at or share any”, I am not.

Natanael, (edited )

Your scenario would specifically require the cops to ask their techs for a detailed report and then deliberately lie about it’s conclusions to attack completely random people, and just FYI the last few rounds of this happened when public WiFi was new and the cops kept losing so badly in courts that this doesn’t really happen much anymore. You don’t even need a great lawyer, just an average one who can find the precedence.

There’s no “additional fingerprints” of relevance binding any node in a tunnel to the communications in the tunnel. It uses PFS and multiple layers of encryption (tunnels within tunnels). They need to run a debugger against their node to have any chance to really argue that a specific packet came from a specific node, which also would ironically simultaneously prove that node didn’t actually know and was just a blind relay (just like how mailmen aren’t liable for content of packages they deliver).

Your argument is literally being used to argue that nobody should have privacy because those who don’t break laws don’t need it, yet you yourself are arguing for why we still need privacy if we haven’t broken laws. The collateral damage when such tools aren’t available is so much greater than when privacy tools are available. One of the greatest successes of Signal is how its popularity makes each of its users part of a “haystack” (large anonymity set) and targeting individual users just for using it is infeasible, protecting endless numbers of minorities and other at-risk individuals.

In addition, it’s extremely rare that mass surveillance like spying on network traffic leads to prosecutions. It’s usually infiltration that works, so you running an I2P node will make zero difference.

Referable2424,

I2P is a P2P darknet. on tor the network is run by volenteers (~6000 nodes) while on I2P everyone on the nerwork is a node, and their are no built in exit nodes (in i2p their called outproxies). the official I2P router has a built in torrent client as well. like torrents the more people on i2p the faster the network, while the opposite is true for tor.

alvvayson,

Indeed.

Torrenting over I2P is the future. No need for VPN and no dependency on donated bandwidth like with Tor.

The technology needs a bit of refinement and it seems they are struggling to attract and maintain good developers.

In my opinion, the fundamental protocols of I2P need a revamp to make torrenting faster and more efficient.

It will take a few years before we solve these problems.

Staccato,

I2P is still around? I remember experimenting with it a decade ago. Sounds like it’s still a slow experience.

ninchuka,

It’s not super fast but it’s more then usable, you just need to get lucky with fast routers in your tunnels

Reverendender, (edited ) in want to get started but finding the technical side really overwhelming

OK, so, I attempted to bring some clarity to this discussion that seems like it’s all over the place in terms of methodology and difficulty. Here is a breakdown as well as some instructions that should hopefully help OP out.

  1. Running VPN on Router (suggested by ruplicant):

    • Veracity: Valid. Running a VPN on the router secures all devices on the network.
    • Complexity: High for a beginner. Requires a compatible router and understanding of router firmware.
    • Suitability for Beginners: Not ideal due to the technical complexity.
  2. Setting Up Media Server on Raspberry Pi (suggested by ruplicant):

    • Veracity: Valid. Raspberry Pi can effectively run media servers like Plex or Jellyfin.
    • Complexity: Moderate. It requires some technical know-how for setup and maintenance.
    • Suitability for Beginners: Moderate. Good for those with some technical background.
  3. Standard Computer Setup with Torrent Client and VLC (suggested by send_me_your_ink):

    • Veracity: Valid. This is a common method for downloading and viewing content.
    • Complexity: Low. Easy to set up and use.
    • Suitability for Beginners: High. Straightforward and less technically demanding.
  4. Using Plex Over Jellyfin (suggested by Reverendender):

    • Veracity: Subjective. Both are valid, but Plex is often seen as more user-friendly.
    • Complexity: Low for Plex, moderate for Jellyfin.
    • Suitability for Beginners: Plex is more suitable due to its ease of use.

Based on this analysis, for a beginner user, the most straightforward and effective approach would be to use a standard computer setup with a VPN, a torrent client, and VLC media player for streaming. This setup minimizes technical complexity while providing a good balance of privacy and ease of use.

Step-by-Step Instructions for Beginners:

1. Set Up a VPN on Your Computer:

  • Choose a reputable VPN service (like Mullvad or ProtonVPN).
  • Download and install the VPN software on your computer.
  • Follow the software’s instructions to connect to a VPN server.

2. Install a Torrent Client:

  • Download a user-friendly torrent client (e.g., qBittorrent, uTorrent).
  • Install the torrent client on your computer.
  • Configure the settings for privacy (like enabling a kill switch, if available).

3. Download and Install VLC Media Player:

  • Download VLC from its official website.
  • Install VLC, following the setup wizard.

4. Download Content:

  • Use the torrent client to find and download content.
  • Ensure your VPN is active whenever you are downloading.

5. Stream Content to Your TV:

  • If your TV supports casting (like with Chromecast), use VLC’s streaming feature to cast content to your TV.
  • Alternatively, connect your computer to the TV via HDMI for direct playback.

6. Practice Good Security Habits:

  • Always keep your VPN active when downloading or streaming content.
  • Regularly update your software (VPN, torrent client, VLC) for security.

7. Optional: Explore Advanced Configurations Later:

  • As you become more comfortable, you might explore setting up a media server like Plex for a more integrated experience.
Nugget,

Great post, thanks for the effort!

Reverendender,

Maybe we can put together a wiki or something. No idea who the mods are though.

funkless_eck,

thank you for this. my bed time now but I’ll dig into this over thr next couple of days

Reverendender,

Anytime! On step 3 you can also just install plex or jellyfin on your computer instead of VLC. Easier IMHO

funkless_eck, (edited )

unfortunately I am now still stuck on step 1, (installing mullvad) see my issues here:

sh.itjust.works/comment/7983968

Reverendender,

OK, I haven’t used Ubuntu in 10 years, and never setup a VPN on it, but here’s what I got:

Certainly! Below is a step-by-step guide to installing and configuring Mullvad VPN on Ubuntu. Mullvad is a VPN service that helps maintain your online privacy and security.

Prerequisites

  • An active Mullvad VPN account
  • A computer running Ubuntu

Step-by-Step Installation and Configuration

Step 1: Download Mullvad VPN

  1. Open a web browser and go to the Mullvad VPN website (mullvad.net).
  2. Navigate to the download section.
  3. Select the Linux version and download the .deb file appropriate for Ubuntu.

Step 2: Install Mullvad VPN

  1. Open the terminal (Ctrl + Alt + T).

  2. Navigate to the directory where the downloaded .deb file is located. For example, if it’s in the Downloads folder, use cd ~/Downloads.

  3. Install the package using the following command:```

    <span style="color:#323232;">sudo dpkg -i [MullvadVPN-File].deb
    </span>

    
    Replace `[MullvadVPN-File]` with the name of the file you downloaded.
    
    

Step 3: Resolve Dependencies

  1. If the installation reports missing dependencies, fix it by running:```

    <span style="color:#323232;">sudo apt-get install -f
    </span>

    
    

Step 4: Launch Mullvad VPN

  1. You can start Mullvad VPN from the terminal by typing mullvad-vpn or find it in the applications menu and launch it from there.

Step 5: Log In

  1. Once Mullvad VPN is open, log in using your account number provided by Mullvad.

Step 6: Connect to a Server

  1. Select a country or server you want to connect to.
  2. Click on the “Secure my connection” button to establish a VPN connection.

Step 7: Verify Connection (Optional)

  1. To ensure that the VPN is working, you can visit a website like https://ipleak.net and check if your IP address and location have changed.

Step 8: Configure Settings (Optional)

  1. You can configure additional settings like auto-connect on startup, enable/disable the kill switch, and select specific protocols as per your preference.

Tips

  • Keep your Mullvad VPN application updated for the latest features and security updates.
  • If you experience any issues, restarting the Mullvad VPN service or your computer might help.

Troubleshooting

  • If you encounter problems during installation or connection, refer to the official Mullvad VPN support page or community forums for assistance.

Yes, there are several VPNs that are known for being user-friendly and relatively easy to set up and install on Ubuntu. Here are some popular options:

  1. ExpressVPN: Known for its high speeds and easy-to-use interface, ExpressVPN offers a native application for Ubuntu. The installation process is straightforward, and they provide detailed guides on their website.
  2. NordVPN: NordVPN also offers a native Linux app with a simple setup process. It’s known for strong security features and a large server network.
  3. CyberGhost: While CyberGhost doesn’t have a native Linux app, it provides detailed setup guides for using it on Ubuntu via OpenVPN or other protocols. This makes it relatively easy to install and configure.
  4. Private Internet Access (PIA): PIA offers a Linux app with a simple interface and easy setup. It’s known for its strong commitment to privacy.
  5. Surfshark: Surfshark has a native application for Linux that is straightforward to install and use. They offer good speeds and an unlimited number of simultaneous connections.

General Steps for Installing a VPN on Ubuntu:

  1. Sign Up for a VPN Service: Choose a VPN provider and sign up for their service.
  2. Download the VPN Client: Visit the VPN’s website and download the Linux client or setup files. Some VPNs offer .deb files that make installation easier on Ubuntu.
  3. Install the VPN Client: You can typically install the .deb file using Ubuntu’s Software Center or via the command line with sudo dpkg -i [downloaded-file-name].deb.
  4. Launch and Configure the VPN: After installation, open the VPN application, log in with your credentials, and configure the settings as needed.
  5. Connect to a Server: Choose a server location and connect to start using the VPN service.

Tips:

  • Always check if your chosen VPN supports Ubuntu specifically to ensure compatibility.
  • Look for VPNs that offer dedicated Linux support or detailed setup guides.
  • Ensure the VPN service has a good privacy policy and strong security features.

Each VPN provider will have specific instructions for installation and setup, so it’s a good idea to refer to the documentation provided on their official website.

funkless_eck, (edited )

Forgive my ignorance, but doesn’t the mullvad need to run through gluetun, or at least in its own docker container to be secure?

Or to put it another way, whats the benefit/cost of installing it via dpkg as opposed to running it in a container, as opposed to running it in in gluetun (in a container)?

i thought everything was supposed to run in a container if it’s touching the web

Reverendender,

Your question touches on some advanced concepts in networking and system security, specifically around the use of VPNs and Docker containers. Let’s break down the differences and implications of running Mullvad VPN through various methods:

  1. Mullvad via DPKG Installation (Direct Install on OS):

    • Benefits:
      • Simplicity: Easy to set up for beginners.
      • System-wide VPN Coverage: All internet traffic from your computer is routed through the VPN, enhancing privacy and security.
    • Costs:
      • Less Flexibility: Harder to isolate specific applications or services.
      • Potential for IP Leaks: If the VPN disconnects, your real IP address might be exposed unless the VPN client has a kill switch.
  2. Mullvad in a Docker Container:

    • Benefits:
      • Isolation: The VPN connection is isolated to the container, enhancing security for containerized applications.
      • Flexibility: Different containers can use different network settings, allowing for complex configurations.
    • Costs:
      • Complexity: Requires understanding of Docker and networking.
      • Limited Scope: Only affects network traffic from services running within the container.
  3. Mullvad with Gluetun (VPN in a Container):

    • Benefits:
      • Enhanced Security and Isolation: Gluetun provides a VPN client in a Docker container, offering both the security benefits of a VPN and the isolation of Docker.
      • Flexibility and Control: Allows for selective routing of traffic through the VPN.
    • Costs:
      • Increased Complexity: Requires more technical know-how to set up and manage.
      • Specific to Containerized Services: Only affects traffic from applications running in Docker.

In essence, the choice depends on your technical expertise, specific needs, and the level of security and flexibility you desire:

  • For Beginners: Direct installation of Mullvad (via DPKG) is straightforward and provides system-wide VPN coverage, suitable for everyday use.
  • For Advanced Users with Specific Needs: Running Mullvad in a Docker container or with Gluetun offers more control and isolation, which is beneficial for complex setups, such as when running multiple services with different networking requirements.

The idea that “everything touching the web should run in a container” is more of a best practice in professional IT environments, especially for server deployments, rather than a strict rule for personal use. It offers advantages in security and manageability but comes with a learning curve and complexity that might not be necessary for simpler or personal setups.

funkless_eck,

Thank you - that is helpful.

So the Gluetun part is really only for if I want to get into my jellyfin when away from home?

BuddyTheBeefalo,

deleted_by_author

  • Loading...
  • Reverendender,

    I do not think so, (or else that is not a factor on a mac?). I run private internet Explorer (which I am dropping in favor of proton when my subscription runs out) and I have never done any kind of configuration like that on it, and have literally never had a problem.

    BuddyTheBeefalo, (edited )

    deleted_by_author

  • Loading...
  • Reverendender,

    Technically correct on the internet is the best kind of correct

    MomoTimeToDie,

    Download a user-friendly torrent client (e.g., qBittorrent, uTorrent).

    Isn’t uTorrent, like, malware or something?

    modifier,

    This was it. This was the comment I needed to remove all excuses and get me going. I have officially raised sail.

    Thank you.

    Reverendender,
    modifier,

    It’s only 4 days later and I just built my first Raspberry Pi server for either Plex or Jellyfin.

    Reverendender,

    Holy shit! And?!

    modifier,

    Well, I’ve got an ISP with no data caps, two layers of VPN, and 8tb to fill. I don’t know what I didn’t do this sooner, but it’s been a good weekend so far.

    Reverendender,

    Older movies, and especially older series are often very difficult to find in my experience. I just filed my 8TB and moved to a 16.

    _number8_, in How does Usenet content not immediately get DMCA'd into oblivion?

    why is the DMCA the one fucking law that actually gets enforced at a high rate when there are literally billions of things more important that we could spend money on

    Whirlybird,

    Because it’s simple. The company that owns the content does a DMCA claim and they either remove it or get sued. Removing it is simple and largely automated.

    Supermariofan67,

    It’s civil lawsuits by corporations, not state prosecution

    grue, (edited )

    Because violating the DMCA is copyright infringement, and § 501 (b) of the Copyright Act gives copyright holders a private right of action to file a civil lawsuit to enforce it. Copyright holders tend to be motivated in a way that the State very often isn’t.

    bhamlin, in Why are so many people downloading the movie Paul all of a sudden?

    Nice try, Paul’s producers.

    Caligvla, in FearNoPeer (A private tracker) is open for signups
    @Caligvla@lemmy.dbzer0.com avatar

    https://files.catbox.moe/khvlhr.png

    That has to be weirdest rule I’ve ever seen in a private tracker. Do they think they’re fooling anyone?

    Apollo2323,

    Lol wtf thats a red flag.

    Caligvla,
    @Caligvla@lemmy.dbzer0.com avatar

    It’s very weird indeed. Seems to be a new tracker, most uploads are recent. Don’t know what to make of it.

    GlitzyArmrest,
    @GlitzyArmrest@lemmy.world avatar

    It’s definitely new, look at how close the total users and active users are. Seems pretty shady.

    doppelgangmember,

    Honey here! Getcha honey!

    Definitely no honey pots here, just honey!

    tigerjerusalem,

    Well if I bought then it’s mine and I can do whatever I want with it. So that’s inside “legal rights”, right? Right?

    FutileRecipe,

    “There are no seeding rules…if you fall below a 0.5 ratio, your downloads will be disabled.”

    That there sounds like a seeding rule.

    dRLY,
    @dRLY@lemmy.ml avatar

    Maybe what they meant was that there isn’t a rule about needing to seed individual torrents to a certain point? Seeing how they also mention “maintain a global”, which is pretty normal for lots of private trackers. But that is my guess, even though it still counts as a “seeding rule.”

    weirdo_from_space,

    What they mean is that there are no hit and run rules. Other private trackers tend to expect you to side a certain amount of time during a given time frame.

    weirdo_from_space,

    It’s supposed to be a legal safeguard. Strictly speaking you are only downloading torrent files from the actual site so it’s not possible to violate this rule.

    snrkl, in Visits to piracy websites have increased 12% in the past four years

    gamesradar.com/gabe-newell-piracy-issue-service-n…

    As Gabe Newell said: “Piracy isn’t a pricing issue, its a service issue”

    As my friend said: "every time a plastic video disc says " operation not permitted " a torrent is born…

    As I say: “People will pay when it’s easy, more reliable and more convenient.” As a software product manager, I forbid my product from ever wasting developer cycles with copy protection… It’s expensive to deliver, annoying to real customers and doesn’t make us any more money…

    saintshenanigans,

    I don’t disagree with anything but I feel like GabeN said that before streaming and subscriptions took over.

    Photoshop is an incredibly easy to use and powerful tool for creators - I’d be happy to drop like $200 on, for example, the 2024 version. I’m not happy to spend $10 or $30+ a month for life to use it, especially when they lock you in to a year subscription and charge you a fee if you cancel early so you literally can’t just sub only the month when you need it, it’s the whole year, period. I’ll just pirate or use photopea or whatever.

    Similar for streaming. Netflix gave us the option to pay for more screens to watch on. Now suddenly it matters whose house it’s in?? All while you’re constantly removing value from the platform and you cancel anything decent if the production value is too high? Fuck you man I’m not paying like $30 monthly for that.

    jmankman,

    I think not getting what you paid for is a pretty big service problem idk man

    snrkl,

    Please do keep voting with your wallet - its one of the few remaining ways to express our discontent!) That being said, I feel like both of those examples are where the service provided by adobe and then Netflix are terrible.

    Adobe is making you buy a whole year and Netflix is hassling you for “letting your pensioner mum watch your account”… To me, both of those are examples of bad service (coupled with cost).

    For me, a counter example for me is amazon.com: I hate what they’re doing to the retail landscape but find it hard to resist, as I find them SOOO convenient, and their customer service (for now) is absolutely stunning!!! Now if their prices were too high, I’d personally probably pay for that convenience a bit. (Where there model breaks for me completely is warranty major purchases: I’ve had warranty denied by manufacturers for items purchased through non approved amazon resellers. So now, for me, anything over $100 and I’m looking for direct purchase from the manufacturer as a preference. )

    Deello,

    As a user of software, I salute you.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • piracy@lemmy.dbzer0.com
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 4096 bytes) in /var/www/kbin/kbin/vendor/symfony/var-dumper/Caster/ReflectionCaster.php on line 413

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 32768 bytes) in /var/www/kbin/kbin/vendor/symfony/error-handler/Resources/assets/css/exception.css on line 1