Mostly you have to be a very emotionally intelligent parent, not needing to understand the modern challenges but know when you need to back off, be kind, be firm or do something good, you should never need to use force if you're smart enough and always treat people like you're equal in some way.
Good to hear. It depends how deep you dive into the configuration, it can get very frustrating setting some things up. If you stick to what's popular, it should be easy.
This is my pet peeve. This is one application that should be paid for. It hugely lacks features. Non-destructive editing with gradients, adjustments, masks. Better selection tools, CMYK would be nice. But that's not the worst part, it doesn't have the entirety of Adobe Illustrator, which you can work between. Affinity has the Designer equivalent, which I use a lot.
I can assure you they're doing more than that. If you see the recapture or cloudflare verification box, you have been cross-site fingerprinted. So if you turn a VPN on and you're using the same OS and browser, they know who you are.
Why don't we have an open source anti-cheat protocol that is a demon-level service. Everyone hates kernel anti-cheat, but only because they're close source, so why don't we have one that's open source. Seems like a simple solution.
I still use VirtualBox with Windows 10 to launch all the Affinity products because GIMP is so bad. And for browser fingerprint protection, e.g. chrome (ungoogled) on windows, because no browser fakes it. Not mullvad, Tor or Brave.
Oof 😅 0.59 nanoseconds. I dang messed up. This would be a good project for students to identify the weaknesses. Like the Theprimeagen says the problem with the tutorials is they're neatly packaged, refined end products and you miss out on all the learning and debugging. You sound like you know what you're talking about and the 1-byte block size is a huge mistake. I think I'll do some more research into the different algorithms. Thanks for having a look, and weighing in.
Hey, thanks for the thoughtful breakdown. I probably should label it: warning random IT grad project. I mistakenly believed I could make something that was good, well it's a lot more difficult. You're right that this doesn’t provide the kind of plausible deniability I initially hoped for, the decoys were just a workaround, because I couldn't find the type of algorithm I wanted.
The query parameters are masked with HTTPS so you're not revealing any extra data, it would just look like any other redirect if you were packet sniffing. And when visiting the destination links, your normal OPSEC still applies, like changing your DNS, using a VPN, etc. I was just seeing if this project would find some sort of use, but I only spend two days on it and it was a fun learning experience.
XD It's at 0:55