This is for the Netherlands, but it’s about the anti-piracy group not allowing defeats in court on the basis of GDPR and ISP refusal get in the way of a good harassment.
And most seedboxes are unlikely to be matched to a specific identity unless the box provider cooperates, which looking at their reason for circumventing ISPs I’d guess won’t really happen unless ordered to by court.
come on now be nice. warner brothers entire business is hurting when you download that tv season instead of paying for it they might have to shelf another finished movie and claim the multi million dollar tax break again. /s
You’re right. If you can afford something you like you should steal it, it’s much better. Whenever I go into a library I just take a bag and dump all the books and take them home. Why should I put in the effort of wasting my time(meaning money I could have earned) signing a library card when I can just steal? It’s THE MOST EFFICIENT WAY. That’s how I stay RICH. I never pay. Whenever I see someone about to pay for something they want I just steal their money, why should they keep it if they’re not smart enough to not waste it? Their money is much safer with me. The apartment I’m currently living in is so cheap, because I never pay. I just changed all the locks, have triple bolts on all the doors and just stay here. It’s mine, it’s free and they can’t kick me out because I won’t let them. Why should I pay for the internet when it’s basically flowing free through these wires and air? I just take some from my neighbor. When I go to a coffee shop I just grab the first drink I see that’s on the counter. If they’re not fast enough to take their drink, I take it, it’s just sitting there, it’s free.
I’m not sure whether to agree or not, but he’s got the point in the following sense: if everyone will pirate and never donate to the creator, then the creator will get about zero returns and will likely go make a living doing something else.
So pirate + donate looks like more fair redistribution of wealth, while pirate + no pay looks like being greedy asshole same as corporations
He makes some great points and has some personal examples. He made more money by releasing the album on torrents and asking for donations compared to the normal ways of releasing your music.
I much prefer doing ocr by myself if really needed, than getting an half assed “book” full of typos and broken tables just because someone did an automated OCR but didn’t have the 5-6 hours required to manually edit to make it decent
Already be thankful that someone took the time to flip page by page in their scanner manually and upload it somewhere
I use FireFox + uBlock Origin, and never see ads. I did have to disable my other adblock/privacy extensions (DuckDuckGo Privacy Essentials, PrivacyBadger, and Ghostery) for YouTube before its anti-adblock stopped complaining, but FF+uBO seems to work just fine with default filters enabled.
The way I solved this was to leave my regular browser setup alone, make a new Firefox profile just for YouTube, install ONLY ublock origin, and create a shortcut to that profile on my desktop.
Now I only use that profile for YouTube. I haven’t seen one ad since this thing started.
Seems like the way for reddit to “solve” this is to just close bad subs.
But that’s easily exploited, if people migrate to other subs and start protesting the sub closures, those subs get worse and they need to be closed…
Oh no, reddit, did you just discover that you relied on your users to make your site good and by screwing them over you’ve made your entire business unsustainable at scale?
Also, somewhat related, is there a short snappy name for lemmy communities? Some people call them subs out of habit but I don’t wanna do that, and “communities” is four whole syllables, and ain’t nobody got time for that.
I think you’re misunderstanding reddit’s goal. Over the past year, they have been in IPO mode. They don’t care about making the site good or attracting a healthy community. They want to cash out and are burning down any structures that are providing any resistance to that.
They don’t care about making the site good or attracting a healthy community.
They never cared about the “healthy” part either, just “big”. Reddit has been a cesspool for years and years and years, largely thanks to the moderators.
Hopefully it costs them dearly. Kinda like the whole Tumblr censorship fiasco and drastic fall in value but before they sell it. Put #FuckSpez in the poor house
Because I was generally enjoying Reddit before being forced out by the API crap. I’m a creature of habit so tend to dislike change and as much as I’m generally liking Lemmy, I’m having to force myself to not check the app every time I get bored because I’ll just see the same posts 20 times in a day thanks to the relatively low level of interaction on the platform currently. Whenever I go looking for tech support online, it’s nearly always a reddit post from 2-8 years ago that has the answer but I don’t want to spend any amount of time on the site, particularly if I’m on my phone at the time since it means doing that annoying step of having to manually change “www” to “old” to make the site functional and readable. I guess I’m just feeling vengeful at yet another good (or some approximation of) thing ruined by yet another money-grubbing, power-hungry, self-important tosser.
Though I see what you’re saying… ish. I think at this point, we aren’t going to see a massive influx of users without the death of competing platforms like Reddit since there are enough people either happy to keep taking the punches or think sunshine shines out of Spez’s asshole. Frankly, we can do without the second kind of person but the first won’t do anything without a certain amount of persuasion and I reckon the sinking of the ol’ Reddit ship would be just enough of a toe-capped-boot up the nether regions to persuade.
You’re right, they aren’t trying to make something sustainable. I guess I was giving them too much credit when I said that.
The problem they’re facing here is that if they can’t sustain even the appearance of a functioning site that investors might want to buy, then they fail at that too.
So maybe the best way to fix this is just to ride it out and not close the subs, but if they’re just full of users that have finally clocked why mods are needed and that the place sucks now, that’s also a bad look.
If the search engines start to realise that it’s a cesspit with nothing worth linking to anymore, then that really hits their metrics. I’ve just realised I really need to get onto downloading my posts and deleting them.
Coms/commus sounds forced and unnecessary, doubt it’ll catch on.
As for Lemmies, I think that should be a synonym for instances/servers. So, for example, the biggest Lemmy with the most sublemmies would be lemmy.world.
@Obi /c/s is not long (albeit a bit complicated to write, on phone at least) and it could easily be expanded verbally, so you know that /c/s = communities.
On Friendica, everything that is not a person or a page is displayed as a group. As a Facebook alternative, it does make sense, but for you in the Lemmy world I imagine it would sound a bit bland. 😁
Subs still works in my mind. Subdirectories of all, or subscriptions… whichever way you want to think of it. I never really thought of subs as short for subreddits though, that was just convenient marketing based of those same terms.
“I usually start my day just laying in bed and checking out new cummies”
“It’s unfortunate that niche cummies don’t always have the support needed to stick around. I’ve seen great cummies wiped away before they could really build any volume up.”
“It’s so often overlooked, but proper handling of cummies is really what keeps them enjoyable day after day.”
Yep, I see no fault with the naming scheme here. Really rolls off the tongue well too. Very palatable. Definitely not absolutely cursed.
They are called “lemmy communities” or “communities”
“Sublemmies” is cringe and is some weird portmanteau with subreddit which is stupid because I don’t know why people are still attached the idea of subreddits since this isn’t reddit and “lemmings” which some users like to call lemmy users but I don’t agree with that either and “lemmy users” sounds like a better term to use
So many people here are trying to emulate reddit when this isn’t reddit, yes some features from reddit would be nice like a group collection of subreddits like multireddits did and post flairs but this still isn’t reddit
This will just create new competition for them. I have been watching anime for several years and never once had to go through opensubtitles. Most releases now have the subtitles integrated so what is the value they bring to the whole thing?
Edit: I just realized I’m replying the one an only db0, you are the best, cheers!
I use it primarily because the embedded subs are often in vubsub which fucking sucks and can’t be played probably on some devices, they also don’t scale probably.
Anime is a different culture. Most non-anime stuff doesn’t have them embedded (especially the old stuff) and it’s still useful for finding subtitles for other languages
And ancestry dot com. That one still chaps my ass. My mom spent so much time in there adding in her work, and they just fucking locked it one day behind a paywall. Fuck these sites that just take the users hard work and then try and profit off it without announcing that from the get go.
I always assume that. My mom was getting up there in age, and just having a fun time entering in her work. She had no clue that would happen, until it did.
Textbook shooting yourself in the foot, I really don’t know what they were hoping to gain. You already had a long-lasting reputation in the online community, now you’re a fucking scab
IDK, if I was contributing subtitles for an open provider free of charge who shared them free of charge, I’d be glad my subtitles were helping people who needed them. Now that labor has been turned into capital and that rug has been pulled with no back-dated compensation or provisions for free subtitles for hard of hearing or something. It’s a shitty move across the board for everyone but the owner.
I would hardly consider ‘power users’ the ones who download via the API. I used to download them via BSPlayer, where it will prompt you in a nice user friendly interface if you needed subtitles for whatever you were watching. Well, that used the old OpenSubtitles API, and now that it’s gone it’s not gonna work anymore
My coworkers were talking today about all the hoops they were going through with streaming to find the content they wanted and navigating the byzantine extra charges to share it with their family. If piracy wasn’t an option I still wouldn’t go through all that, it’s madness how much worse the paid service is to the high seas.
Yup. My gf has Netflix but for one of our shows, the English subtitles disappeared (she’s ESL). Took like 15 minutes to figure it out, but happened again the next day. Now we pirate that show because it’s easier, even though she has it on Netflix.
Also used someone else’s Netflix to finally hit the attack on titan craze some years back.
No english subs. Have to read the local language. Whatever. The names were not accurately translated. Whatever. I could look past that since they were consistent within the subs as presented.
Season 2 - all the names changed from season 1. Even something as simple as changing a K to a C is too much and unacceptable, but the fuckers were straight up changing the name of the militaty units and shit. I had no idea who was who.
20 minutes later, I’m watching the HorribleSubs version with the worldwide-accepted English names and I never watched anime on Netflix. Piracy is a service problem.
Currently BiglyBt supports I2P and it has been that way for quite some time.
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
Tor is about privacy (and is prone to being compromised but…). So long as the exit nodes are in “friendly” countries and are run by trustworthy individuals (…), you are “safe”. And that is why it is popular among journalists. The downside being that a lot of heinous shit is done on Tor and those exit nodes are potentially liable for them.
I2P is about avoiding censorship. Everyone is an exit node and cops kicking down doors doesn’t significantly hurt the network.
But… I would very much NOT use that for torrenting. Because the endpoints can still be detected and recorded. And “I wasn’t downloading that Tay Swizzle concert, I was just letting potentially thousands of other people use my computer to download it… Why did you suddenly start laughing and talking about The Pirate Bay?”.
And that also ignores the “darker” parts of the dark web. Where, rather than getting a letter from the MPAA you get a visit from Chris Hansen.
It is not true that every node is an exit node in I2P. The I2P protocol does not officially have exit nodes—all I2P communication terminates at some node within the I2P network, encrypted end-to-end. It is possible to run a local proxy server and make it accessible to other users as an I2P service, creating an “exit node” of sorts, but this is something that must be set up deliberately; it’s not the default or recommended configuration. Users would need to select a specific I2P proxy service (exit node) to forward non-I2P traffic through and configure their browser (or other network-based programs) to use it.
Maybe I am missing something but that just feels like you are arguing semantics.
Traffic exits the sub-WAN from basically any of the computers/nodes in it. So it might not be a Tor Exit Node ™ but it still has all the dangers of it.
First, let’s start with the basics. An exit node is a node which interfaces between the encrypted network (I2P or Tor) and the regular Internet. A user attempting to access a regular Internet site over I2P or Tor would route their traffic through the encrypted network to an exit node, which then sends the request over the Internet without the I2P/Tor encryption. Responses follow the reverse path back to the user. Nodes which only establish encrypted connections to other I2P or Tor nodes, including ones used for internal (onion) routing, are not exit nodes.
Both I2P and Tor support the creation of services hosted directly through the encrypted network. In Tor these are referred to as onion services and are accessed through .onion hostnames. In I2P these internal services (.i2p or *.b32) are the only kind of service the protocol directly supports—though you can configure a specific I2P service linked to a HTTP/HTTPS proxy to handle non-I2P URLs in the client configuration. There are only a few such proxy services as this is not how I2P is primarily intended to be used.
Tor, by contrast, has built-in support for exit nodes. Routing traffic anonymously from Tor users to the Internet is the original model for the Tor network; onion services were added later. There is no need to choose an exit node in Tor—the system maintains a list and picks one automatically. Becoming a Tor exit node is a simple matter of enabling an option in the settings, whereas in I2P you would need to manually configure a proxy server, inform others about it, and have them adjust their proxy configuration to use it.
If you set up an I2P node and do not go out of your way to expose a HTTP/HTTPS proxy as an I2P service then no traffic from the I2P network can be routed to non-I2P destinations via your node. This is equivalent to running a Tor internal, non-exit node, possibly hosting one or more onion services.
Fair enough. Then you have the exact same risks as far as torrenting (the point of this thread) are confirmed. But still increased risks as far as csam.
What “increased risks as far as csam”? You’re not hosting any yourself, encrypted or otherwise. You have no access to any data being routed through your node, as it’s encrypted end-to-end and your node is not one of the endpoints. If someone did use I2P or Tor to access CSAM and your node was randomly selected as one of the intermediate onion routers there is no reason for you to have any greater liability for it than any of the ISPs who are also carrying the same traffic without being able to inspect the contents. (Which would be equally true for CSAM shared over HTTPS—I2P & Tor grant anonymity but any standard password-protected web server with TLS would obscure the content itself from prying eyes.)
You are still possessing csam while being used as a node to transit it.
A compromised (or even honey pot) node can show all the people who were “just holding it for a friend”. And ignoring that ISPs have historically cooperated in investigations, they also have many more lawyers.
So regardless of your ethical/moral concerns over facilitating the transit of csam, you are opening yourself up to being caught in a semi-tech savvy investigation.
This is not how the law is applied to packet switching.
If it was store and forward then maybe just maybe law enforcement would care, but anybody smart enough to set up an I2P node to research it and who tried to track where packets from from would first see the packets originate from their own local node at 127.0.0.1, then in the I2P console they could see that packet came in via an active half-tunnel from their own end interfacing with the endpoint node of the other side’s half-tunnel, and they would know that node has no idea what it’s sending (just like their ISP)
You are assuming good faith on behalf of law enforcement
You are assuming any investigation would go beyond the equivalent of "Well, we see these twenty peers in the download queue. Look up to see if we can send a DMCA"
You are assuming “I was just trying to help people share material they don;t want law enforcement to know about. How was I supposed to know it was csam? I am the real victim here” will work, at all.
1: then they would go after literally anybody running a node
2: their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.
3: by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.
then they would go after literally anybody running a node
ACAB? Also, I’ll get back to this
their client will not see peers on another IP. It will just see their own I2P node. Any I2P aware software will also not have any IP addresses as peers, only I2P specific internal addresses. They will not even be able to associate an incoming connection to any one node without understanding the I2P network statistics console.
And only people with similar politics to you will ever gain that understanding? Again, more on this
by this argument all anonymization tools should be illegal, Signal too, etc, and nobody should help anybody maintain privacy. In the real world there’s plenty of reasons why anonymization tools are necessary. And there will be literally zero evidence tying you to a crime. Preexisting legal precedence says an IP address alone is not enough.
And countries around the world are increasingly pushing legislature to make “anonymization” and “encryption” tools illegal (or at least require backdoors).
Which gets back to the politics aspect. Even among those of us who care about personal security (which, again, has nothing to do with torrenting but here we are), the likelihood of others to use it for nefarious and evil purposes is a problem. I’ve taught a few journalist friends how to use tor but I personally do not because that, and tools like i2p, tend to also be used for csam and I have pretty strong morals and ethics about not facilitating the dissemination of that.
And, as we remember once or twice a year, there are “hacktivist” groups out there who like to have a field day. And compromising tools used for the distribution of csam is something that many groups do.
But also? Those piece of shit cops and governments trying to get their fascism on? It is a lot easier to push for “extreme measures” when it is going up against pedophiles and child abuse. We saw similar with how the US (and other western nations) cracked down on immigration under the guise of “stopping the Muslims from doing another 9-11”. And we are likely to see similar come out of the Israel/Palestine war.
MAYBE you get a really good lawyer so that you can get off on… Maybe you get a really good lawyer who cites the proper legal precedents AND a judge AND a jury who actually care about that. You have still had your reputation ruined for “being a pedophile” and laws are already being pushed to make using any of these tools illegal to begin with. And The People will generally support it because CSAM.
And getting back to “an IP address isn’t enough”: Yes, some judges have decided that. Was it Avatar that was the big case people like to cite? Been a minute. But that doesn’t stop other judges who just don’t give a shit about precedent still providing the subpoenas. And considering that getting the equivalent of a peer list requires “understanding the i2p network statistics console”: There are likely to be additional “fingerprints” involved. I’ve not spend much time looking at said console so am assuming there is nothing as stupid as a mac address, but it becomes a lot harder to say “Old Lady Withers across the street was using my wifi”.
Just because people are stupid and this is the inevitable drive by from the peanut gallery:
No, I am not saying that everyone who uses tor or i2p or whatever are pedophiles. What I am saying is that those are tools that are pretty notorious for being used to distribute and share csam. And while some people are okay with “Oh yeah, my private browsing of this website helped to mask child porn but I personally didn’t look at or share any”, I am not.
Your scenario would specifically require the cops to ask their techs for a detailed report and then deliberately lie about it’s conclusions to attack completely random people, and just FYI the last few rounds of this happened when public WiFi was new and the cops kept losing so badly in courts that this doesn’t really happen much anymore. You don’t even need a great lawyer, just an average one who can find the precedence.
There’s no “additional fingerprints” of relevance binding any node in a tunnel to the communications in the tunnel. It uses PFS and multiple layers of encryption (tunnels within tunnels). They need to run a debugger against their node to have any chance to really argue that a specific packet came from a specific node, which also would ironically simultaneously prove that node didn’t actually know and was just a blind relay (just like how mailmen aren’t liable for content of packages they deliver).
Your argument is literally being used to argue that nobody should have privacy because those who don’t break laws don’t need it, yet you yourself are arguing for why we still need privacy if we haven’t broken laws. The collateral damage when such tools aren’t available is so much greater than when privacy tools are available. One of the greatest successes of Signal is how its popularity makes each of its users part of a “haystack” (large anonymity set) and targeting individual users just for using it is infeasible, protecting endless numbers of minorities and other at-risk individuals.
In addition, it’s extremely rare that mass surveillance like spying on network traffic leads to prosecutions. It’s usually infiltration that works, so you running an I2P node will make zero difference.
I2P is a P2P darknet. on tor the network is run by volenteers (~6000 nodes) while on I2P everyone on the nerwork is a node, and their are no built in exit nodes (in i2p their called outproxies). the official I2P router has a built in torrent client as well. like torrents the more people on i2p the faster the network, while the opposite is true for tor.
OK, so, I attempted to bring some clarity to this discussion that seems like it’s all over the place in terms of methodology and difficulty. Here is a breakdown as well as some instructions that should hopefully help OP out.
Running VPN on Router (suggested by ruplicant):
Veracity: Valid. Running a VPN on the router secures all devices on the network.
Complexity: High for a beginner. Requires a compatible router and understanding of router firmware.
Suitability for Beginners: Not ideal due to the technical complexity.
Setting Up Media Server on Raspberry Pi (suggested by ruplicant):
Veracity: Valid. Raspberry Pi can effectively run media servers like Plex or Jellyfin.
Complexity: Moderate. It requires some technical know-how for setup and maintenance.
Suitability for Beginners: Moderate. Good for those with some technical background.
Standard Computer Setup with Torrent Client and VLC (suggested by send_me_your_ink):
Veracity: Valid. This is a common method for downloading and viewing content.
Complexity: Low. Easy to set up and use.
Suitability for Beginners: High. Straightforward and less technically demanding.
Using Plex Over Jellyfin (suggested by Reverendender):
Veracity: Subjective. Both are valid, but Plex is often seen as more user-friendly.
Complexity: Low for Plex, moderate for Jellyfin.
Suitability for Beginners: Plex is more suitable due to its ease of use.
Based on this analysis, for a beginner user, the most straightforward and effective approach would be to use a standard computer setup with a VPN, a torrent client, and VLC media player for streaming. This setup minimizes technical complexity while providing a good balance of privacy and ease of use.
Step-by-Step Instructions for Beginners:
1. Set Up a VPN on Your Computer:
Choose a reputable VPN service (like Mullvad or ProtonVPN).
Download and install the VPN software on your computer.
Follow the software’s instructions to connect to a VPN server.
2. Install a Torrent Client:
Download a user-friendly torrent client (e.g., qBittorrent, uTorrent).
Install the torrent client on your computer.
Configure the settings for privacy (like enabling a kill switch, if available).
3. Download and Install VLC Media Player:
Download VLC from its official website.
Install VLC, following the setup wizard.
4. Download Content:
Use the torrent client to find and download content.
Ensure your VPN is active whenever you are downloading.
5. Stream Content to Your TV:
If your TV supports casting (like with Chromecast), use VLC’s streaming feature to cast content to your TV.
Alternatively, connect your computer to the TV via HDMI for direct playback.
6. Practice Good Security Habits:
Always keep your VPN active when downloading or streaming content.
Regularly update your software (VPN, torrent client, VLC) for security.
OK, I haven’t used Ubuntu in 10 years, and never setup a VPN on it, but here’s what I got:
Certainly! Below is a step-by-step guide to installing and configuring Mullvad VPN on Ubuntu. Mullvad is a VPN service that helps maintain your online privacy and security.
Prerequisites
An active Mullvad VPN account
A computer running Ubuntu
Step-by-Step Installation and Configuration
Step 1: Download Mullvad VPN
Open a web browser and go to the Mullvad VPN website (mullvad.net).
Navigate to the download section.
Select the Linux version and download the .deb file appropriate for Ubuntu.
Step 2: Install Mullvad VPN
Open the terminal (Ctrl + Alt + T).
Navigate to the directory where the downloaded .deb file is located. For example, if it’s in the Downloads folder, use cd ~/Downloads.
Install the package using the following command:```
You can start Mullvad VPN from the terminal by typing mullvad-vpn or find it in the applications menu and launch it from there.
Step 5: Log In
Once Mullvad VPN is open, log in using your account number provided by Mullvad.
Step 6: Connect to a Server
Select a country or server you want to connect to.
Click on the “Secure my connection” button to establish a VPN connection.
Step 7: Verify Connection (Optional)
To ensure that the VPN is working, you can visit a website like https://ipleak.net and check if your IP address and location have changed.
Step 8: Configure Settings (Optional)
You can configure additional settings like auto-connect on startup, enable/disable the kill switch, and select specific protocols as per your preference.
Tips
Keep your Mullvad VPN application updated for the latest features and security updates.
If you experience any issues, restarting the Mullvad VPN service or your computer might help.
Troubleshooting
If you encounter problems during installation or connection, refer to the official Mullvad VPN support page or community forums for assistance.
Yes, there are several VPNs that are known for being user-friendly and relatively easy to set up and install on Ubuntu. Here are some popular options:
ExpressVPN: Known for its high speeds and easy-to-use interface, ExpressVPN offers a native application for Ubuntu. The installation process is straightforward, and they provide detailed guides on their website.
NordVPN: NordVPN also offers a native Linux app with a simple setup process. It’s known for strong security features and a large server network.
CyberGhost: While CyberGhost doesn’t have a native Linux app, it provides detailed setup guides for using it on Ubuntu via OpenVPN or other protocols. This makes it relatively easy to install and configure.
Private Internet Access (PIA): PIA offers a Linux app with a simple interface and easy setup. It’s known for its strong commitment to privacy.
Surfshark: Surfshark has a native application for Linux that is straightforward to install and use. They offer good speeds and an unlimited number of simultaneous connections.
General Steps for Installing a VPN on Ubuntu:
Sign Up for a VPN Service: Choose a VPN provider and sign up for their service.
Download the VPN Client: Visit the VPN’s website and download the Linux client or setup files. Some VPNs offer .deb files that make installation easier on Ubuntu.
Install the VPN Client: You can typically install the .deb file using Ubuntu’s Software Center or via the command line with sudo dpkg -i [downloaded-file-name].deb.
Launch and Configure the VPN: After installation, open the VPN application, log in with your credentials, and configure the settings as needed.
Connect to a Server: Choose a server location and connect to start using the VPN service.
Tips:
Always check if your chosen VPN supports Ubuntu specifically to ensure compatibility.
Look for VPNs that offer dedicated Linux support or detailed setup guides.
Ensure the VPN service has a good privacy policy and strong security features.
Each VPN provider will have specific instructions for installation and setup, so it’s a good idea to refer to the documentation provided on their official website.
Forgive my ignorance, but doesn’t the mullvad need to run through gluetun, or at least in its own docker container to be secure?
Or to put it another way, whats the benefit/cost of installing it via dpkg as opposed to running it in a container, as opposed to running it in in gluetun (in a container)?
i thought everything was supposed to run in a container if it’s touching the web
Your question touches on some advanced concepts in networking and system security, specifically around the use of VPNs and Docker containers. Let’s break down the differences and implications of running Mullvad VPN through various methods:
Mullvad via DPKG Installation (Direct Install on OS):
Benefits:
Simplicity: Easy to set up for beginners.
System-wide VPN Coverage: All internet traffic from your computer is routed through the VPN, enhancing privacy and security.
Costs:
Less Flexibility: Harder to isolate specific applications or services.
Potential for IP Leaks: If the VPN disconnects, your real IP address might be exposed unless the VPN client has a kill switch.
Mullvad in a Docker Container:
Benefits:
Isolation: The VPN connection is isolated to the container, enhancing security for containerized applications.
Flexibility: Different containers can use different network settings, allowing for complex configurations.
Costs:
Complexity: Requires understanding of Docker and networking.
Limited Scope: Only affects network traffic from services running within the container.
Mullvad with Gluetun (VPN in a Container):
Benefits:
Enhanced Security and Isolation: Gluetun provides a VPN client in a Docker container, offering both the security benefits of a VPN and the isolation of Docker.
Flexibility and Control: Allows for selective routing of traffic through the VPN.
Costs:
Increased Complexity: Requires more technical know-how to set up and manage.
Specific to Containerized Services: Only affects traffic from applications running in Docker.
In essence, the choice depends on your technical expertise, specific needs, and the level of security and flexibility you desire:
For Beginners: Direct installation of Mullvad (via DPKG) is straightforward and provides system-wide VPN coverage, suitable for everyday use.
For Advanced Users with Specific Needs: Running Mullvad in a Docker container or with Gluetun offers more control and isolation, which is beneficial for complex setups, such as when running multiple services with different networking requirements.
The idea that “everything touching the web should run in a container” is more of a best practice in professional IT environments, especially for server deployments, rather than a strict rule for personal use. It offers advantages in security and manageability but comes with a learning curve and complexity that might not be necessary for simpler or personal setups.
I do not think so, (or else that is not a factor on a mac?). I run private internet Explorer (which I am dropping in favor of proton when my subscription runs out) and I have never done any kind of configuration like that on it, and have literally never had a problem.
Well, I’ve got an ISP with no data caps, two layers of VPN, and 8tb to fill. I don’t know what I didn’t do this sooner, but it’s been a good weekend so far.
why is the DMCA the one fucking law that actually gets enforced at a high rate when there are literally billions of things more important that we could spend money on
Because it’s simple. The company that owns the content does a DMCA claim and they either remove it or get sued. Removing it is simple and largely automated.
Because violating the DMCA is copyright infringement, and § 501 (b) of the Copyright Act gives copyright holders a private right of action to file a civil lawsuit to enforce it. Copyright holders tend to be motivated in a way that the State very often isn’t.
Maybe what they meant was that there isn’t a rule about needing to seed individual torrents to a certain point? Seeing how they also mention “maintain a global”, which is pretty normal for lots of private trackers. But that is my guess, even though it still counts as a “seeding rule.”
What they mean is that there are no hit and run rules. Other private trackers tend to expect you to side a certain amount of time during a given time frame.
It’s supposed to be a legal safeguard. Strictly speaking you are only downloading torrent files from the actual site so it’s not possible to violate this rule.
As Gabe Newell said: “Piracy isn’t a pricing issue, its a service issue”
As my friend said: "every time a plastic video disc says " operation not permitted " a torrent is born…
As I say: “People will pay when it’s easy, more reliable and more convenient.” As a software product manager, I forbid my product from ever wasting developer cycles with copy protection… It’s expensive to deliver, annoying to real customers and doesn’t make us any more money…
I don’t disagree with anything but I feel like GabeN said that before streaming and subscriptions took over.
Photoshop is an incredibly easy to use and powerful tool for creators - I’d be happy to drop like $200 on, for example, the 2024 version. I’m not happy to spend $10 or $30+ a month for life to use it, especially when they lock you in to a year subscription and charge you a fee if you cancel early so you literally can’t just sub only the month when you need it, it’s the whole year, period. I’ll just pirate or use photopea or whatever.
Similar for streaming. Netflix gave us the option to pay for more screens to watch on. Now suddenly it matters whose house it’s in?? All while you’re constantly removing value from the platform and you cancel anything decent if the production value is too high? Fuck you man I’m not paying like $30 monthly for that.
Please do keep voting with your wallet - its one of the few remaining ways to express our discontent!) That being said, I feel like both of those examples are where the service provided by adobe and then Netflix are terrible.
Adobe is making you buy a whole year and Netflix is hassling you for “letting your pensioner mum watch your account”… To me, both of those are examples of bad service (coupled with cost).
For me, a counter example for me is amazon.com: I hate what they’re doing to the retail landscape but find it hard to resist, as I find them SOOO convenient, and their customer service (for now) is absolutely stunning!!! Now if their prices were too high, I’d personally probably pay for that convenience a bit. (Where there model breaks for me completely is warranty major purchases: I’ve had warranty denied by manufacturers for items purchased through non approved amazon resellers. So now, for me, anything over $100 and I’m looking for direct purchase from the manufacturer as a preference. )
piracy
Top
This magazine is from a federated server and may be incomplete. Browse more on the original instance.