@zaknenou@lemmy.dbzer0.com
@zaknenou@lemmy.dbzer0.com avatar

zaknenou

@zaknenou@lemmy.dbzer0.com

This profile is from a federated server and may be incomplete. Browse more on the original instance.

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

Yu-Gi-Oh used to be popular with Hamashi

Proton VPN on Linux looks very different from Windows. How do you select one of their P2P options for faster torrenting?

Pretty much what the title says. I noticed that ProtonVPN Linux has an EXTREMELY limited interface compared to their program on Windows. I also do not appear to have the option to bind qBittorrent to ProtonVPN the same way that I did with MullvadVPN. Has anybody experienced ProtonVPN on Linux and successfully used it for...

zaknenou, (edited )
@zaknenou@lemmy.dbzer0.com avatar

surprisingly, I’m sure getintopc’s mods are same as the notorious oceanofgames yet it is considerably a more reputable site. Although I have to say it is mentioned on the megathread with the unsafe sites as one of the ones Particularly avoided by the pirate community.

If you already downloaded the file then scan with Kaspersky or Malwarebytes as they are imo the most reputable AVs in the industry nowadays (the free tier of Kaspersky is more than enough). Alternatively I think you can copy the download URL and patse it on virustotal and get the file scanned (no need to actually upload I think).

[discussion]: regarding the best OS for a pirate

This post started out as a question, but throughout two days of googling it became this compilation of links. I will tell you everything worth mention that I found, share my plan with you, and expect some critics (for the infos of course, please not for the silly hyperactivity of my ADHD brain over such a trivial matter 🥲)....

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

bro this is depressing. I think CLI projects are less likely to receive donations for some reason and more in danger

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

I need to pirate their service somehow (Kagi)

What happened to the PC games (or what happened to consoles)?

I got out of video game piracy for a while, but I’m coming back. One thing I have been absolutely SHOCKED by is how finding PC game torrents is actually kind of difficult from my normal sources. Now it’d be one thing if I just wasn’t seeing games, but for some reason Playstation and Switch have far more uploaders and...

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

Check this out this short by a game developer if you want to feel old… Now this is surprising

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

this bothered me for a long time about youtube links. thanks for the incredible infographic

zaknenou, (edited )
@zaknenou@lemmy.dbzer0.com avatar

I were about to loose my mind if no one shared the same opinion at this point

the more glad I’m that the original Moderator of PiratedGames went to Lemmy

Is it so? I thought it is the same mod team there from before the protest/migration.

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

and mods deleting anything new there

Pirated video games SOURCE CODE

So there are multiple sites&groups that pirate video games especially on PC. I was wondering if there are places on the internet where you find source code for games especially the highly modifiable ones like Half Life 2/Portal and Skyrim. Or groups that crack into the source code of games (or even software in general), not only...

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

Thank you! extremely helpful answer

zaknenou, (edited )
@zaknenou@lemmy.dbzer0.com avatar

Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can’t read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can’t figure out how to unlock it and decrypt the data)?

zaknenou, (edited )
@zaknenou@lemmy.dbzer0.com avatar

this is very detailed answer thank you. however I face an ambiguity regarding this:

This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).

How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

so you can encrypt a message with my public key but you cannot decrypt it afterward ??

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

The situation is just an example, I’m not actually planning a revolution. just for demonstration purpose

zaknenou, (edited )
@zaknenou@lemmy.dbzer0.com avatar

I’m satisfied with the answers and insights I got so far. But if you may add I’d be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don’t know anything. I know quite well about Prime number and theorems about them on math, but not their applications

zaknenou,
@zaknenou@lemmy.dbzer0.com avatar

Either way I have enough retro games to last me a lifetime.

same tbh, there is a reason !patientgamers is up in the lemmy explorer

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #