of my brother before he lived alone in a cabin
of my brother before he lived alone in a cabin
Minimum requirements to run hello world
in Java
I nnn every day!
I meant to, but was rudely interrupted by a skeleton swordsman this morning.
My client is configured to reject all non-encrypted peer connections. It sacrifices some potential seeds but is worth the added defense in depth if ever my VPN fails catastrophically. Openvpn client to an obscure VPN service. All media gets passed through clamAV before being accessed.
While on the hunt for treasure, my browser is configured to send DNS traffic over Tor. All web pages only get to load HTML and images, and they (torrent sites) remain perfectly functional without anything else. DDG search with the old tricks ‘1080p’, ‘full’, ‘HEVC’, ‘x264/x265’, ‘ep0_/se0_’, ‘.mkv’ and so on.
I rotate my treasure chests between ships.
Horses were domesticated some 6000 years ago. I feel so old!
The approach once worked, but that was back before browsers began including the likes of things like advertiser IDs and other extremely high entropy attributes that no average person would ever think to disable. Contemporary hide-in-the-crowd strategies are mostly curated within efforts like Tor browser where everyone is encouraged to use the exact same configuration. But then it’s still a numbers problem. If only two attendees decide to hide their faces with party masks to a soiree of 100 people, one (large scale observer) only need check the guest list and use process of elimination to determine the identities of the 2% “hidden” attendees.
Somebody can, and probably will, come along and refute this assessment. I am not entirely convinced myself that it is a losing strategy yet. I’m open to hear opposing takes.
Privacy Badger: IIRC Privacy Badger operates by logging third party domains connections on a per-site bases, and only begins to actively block connections once a domain seen across multiple visits fits the profile of a likely tracker.
Nvrmnd, they’ve changed how PB works and it is now closer to a list-based tracker blocker (enumerate badness):
So they’ve since corrected one of the core issues with PB. Still it is weak. To see why, please glance through The Six Dumbest Ideas in Computer Security.
uBlock Origin in advanced mode, with default-deny rules (only allow assets by exception) is going to be much stronger at blocking crap.
Personally, I use uMatrix with pretty much all asset classes blocked by default. I never see popups. I never see banners begging “please allow our cookies, pleeeeaaase!”.
Wow that’s a lot of effort compared to just blocking CSS and javascript with something like uMatrix.
There, I saved everyone a click. Now thank me for my service.
In addition to the code being freely available, as others have pointed out, the developer has attended some number of software conferences at which his knowledge of this subject matter and this project makes itself evident.
What I like is that JShelter doesn’t try to “hide in the crowd” with its spoofed attributes which is IMO a failing strategy as the crowd increasingly becomes atomized by adtech.
Maybe he just doesn’t want to run DRM in his browser.
Maybe he wanted use a a least-friction streaming option.
Maybe he doesn’t want the NFL to correlate and data broker his viewing activity.
Maybe he has some ethical qualm with the NFL or their streaming infrastructure choice.
Maybe “It’s Free, it’s for Me” was meant as in liberty and not price.
If the stereotype is to be believed, why is this, do you think? Why would Linux and open source software attract such a disproportionately high number of transfrem individuals?
And would it be causative or is it or non-causative?
I usually use
dd status=progress conv=sync,noerror bs=64k if=/path/to/source/drive of=/path/to/destination/drive
Take a reading of the drive health first with something like smartctl and if it has a lot of failing attributes, consider lowering the block size to something rather smaller like bs=512.
Edit: To elaborate, using the sync and noerror arguments will instruct dd to ignore errors and continue in the event of read failures, while allocating zeroes to the remainder of the block space. Which is also why smaller block sizes are better for potentially failing drives. The copy will take longer, but a single error won’t take large swaths of data with it.
Just last week I did a drive clone for somebody who’s disk reported a total runtime of over 9 years. The SMART stats only reported one pending sector and long spin up time but it was making noises that said otherwise.
The clone completed with only three I/O errors.
Stripping out the audio tracks for languages I don’t speak reduces the file size a little.
ffmpeg
That’s good. It should serve as a reminder that you need to abandon a dinosaur push media. It’s a subtle way to punish normies who haven’t caught on yet.