Skip Navigation

User banner
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)E
Posts
55
Comments
329
Joined
3 mo. ago

  • Would be nice if therapy was covered by health insurance...

    Even after - or should I say, thanks to - two years of intensive psychodynamic psychotherapy, regardless of what dreams I could've fulfilled with all that money, time and emotions, I wouldn't want my dad to be punished, which making him pay for my therapy would be. His behaviors were a product of his upbringing. And even though I'm angry at some of his behaviors, I simply cannot be mad at him. I've tried.

  • I'm just playing around with the thought of it at the moment, so don't anybody get their hopes up, but here are a question three questions.

    I have 1Gbps bandwidth and about 4TB of storage to contribute with.

    1. would people be more interested in an NSFW meme community or rather just a porn sharing one - regardless of orientation?
    2. can one person run a community alone or is it not feasible - referring to how quick one has to be to act on infractions?
    3. are there legal aspects to consider if I were to setup an NSFW community? As in, for instance, would I be liable if people posted illegal content - considering that I'm hosting?
  • Not audio, but I needed to power some fans with a 12V DC adapter

  • My library card was free of charge. (:

  • Congratulations! :D

    Not de-Google advice perse, but I recommend using a hardware key for two factor authentication: https://www.yubico.com/

    One time passwords that are received through SMS and email are interceptable. Not so much with hardware keys. Yubico also makes an authenticator app whose source code is open: https://github.com/Yubico/yubioath-flutter

  • "I know I look like one of them but I'm not. Please don't hurt me. I have erased all of my cultural, linguistic, historical and geographical identity and I fully throw myself at the mercy of the white West. Please don't hurt me."

    It's cowardly self-defense, really. No judgment, though, since I am a privileged white cisman and I will never truly know what it's like to be demonized and forced to legitimize my existence in every step I take.

  • If you want to be funny about it, you could say that I have made love to my love doll by banging it. It is of a cute design, which can make me feel that it's pretty. But that's about it. It's a cute looking tool that imitates humans, used to relieve horniness. I think that AI/LLMs are similar. Under the hood, they are nothing more than tools that index information according to any chosen predetermined algorithm and rearrange and present it in a way that gives the illusion of having genuine generative properties. Just as my love doll gives me the impression that it is cute in a human way, AI is made to respond in ways that give the impression of reciprocating love. But it isn't. I think your friend - and a lot the youth of today - just live on the dopamine kicks that the clever imitations induce.

  • XD

    All they knew is I'm playing a game boy game called Pokémon and that this is a movie of that game. So... XD

  • Noice. Flawless T480 experience with Arch Linux here. Also one of the last real modular ThinkPads - I swapped the storage, memory and WiFi card. It feels like a piece of hardware from 2026.

  • What I did, what I do and why I do it

    At the beginning of the 2000's, piracy either wasn't as prevalent as it is today or it wasn't as persecuted, or a combination thereof. Which is to say, I started with DC++, Kazaa and direct downloads. No security or privacy measures. This is also when I proudly downloaded the first Pokémon movie Pokémon: The First Movie (1998), sat down with my parents to watch it and then immediately having to explain to them why Pokémon are having sex. Suffice it to say, it was some Pokémon themed hentai.

    As my understanding of computers, networking and capitalism evolved - this being around the early 2010's - and especially as I had learned about the improved, albeit not perfect, anonymity of torrenting in a society with otherwise increasingly oppressive demeanor towards online integrity and piracy -, I decided to only pirate using torrent clients thenceforth. I also took a brief pause from piracy for about six years, as I moved to a jurisdiction whose laws and attitude towards privacy were not known to me. I was doing my Master's degree and thus couldn't spare the time and effort it would've taken to safely engage in piracy.

    As we arrive to present day - present time (any fans here?) -, nation states' attitude towards piracy - or, rather the lobbyists' relentless pursuit to reap legal fees - but really just the overall cyber climate with all the data brokers indiscriminately collecting, profiling and selling our data to the highest bidder, I simply don't dare to be on the clearnet/internet without using a VPN, an adblocker and DNS/hosts file based filtering anymore. I would argue that the risks to the integrity of the individual is great enough to warrant these countermeasures regardless of jurisdiction, but I digress. Sure, if your jurisdiction does not criminalize piracy, be my guest, torrent without a VPN.

    My current setup

    A few notes on Mullvad:

    • I am using Mullvad VPN on a router so that all my traffic is encrypted, but their desktop app is also good - better in regards to customizability -, just make sure to bind your torrent client to the network interface created by the VPN app.
    • You cannot make applications reachable from the internet (aka forward ports) with Mullvad. You can still download, but you are a passive seeder, only reachable by peers that do have port forwarding enabled. (Note: a great majority of the bigger seeders/public seeding groups use so called seeding boxes whose ports are forwarded and I seed in average 8TBs per month with steady share ratios of around 8.0, so don't let this discourage you, unless maximizing your seeding contributions is what is most important to you.)

    Paying nothing

    As others have already pointed out, double check what laws apply in your specific jurisdiction before pirating unprotected. I haven't tried it myself, except for running two of their routers to contribute bandwidth, but file sharing in the closed network i2p is supposedly popular. However, I can neither confirm nor deny this and it is a somewhat more technical approach. All your traffic is encrypted many times over and what you do inside i2p is not visible from the clearnet. https://geti2p.net/en/

  • Are you not making the next Avatar movie? I came here to help because I thought... I believed... Oh, well.

  • Well, now I just have to try it!

    I have no idea how to tell specific processes or shells to use a specific interface, while also forbidding others to use the same interface... Which is why I thought, "but I can force a container to use a specific interface! Gotcha!"

    I'm almost there, I think. I managed to get my phone and my nspawn-ed wireguard interface to shake hands. I just need to tweak the forwarding and nat-ing rules in my firewall. After I touch grass. Oh, my back...

  • Thanks! What a sweet little handbook for getting started! :D

  • Thank you for the suggestion on Podman! The thing is, since the VPN is running on one of my routers (connected to eth0), and since I want the public facing interfaces (1 and 2) not to use that router, I'm going to make use of one of those two extra interfaces anyway. Either way, good advice in adding multiple addresses to the same interface!

  • I'd absolutely do that if I didn't already have two extra physical interfaces. :)

  • Sweet! I'll start reading up on Docker, especially as it sounds like it has become an integral part of your self-hosting. :)

  • Matter of perspective. Earlier today, I told a coworker how happy I am to have been born in the late 1980's, because it spared me from the internet culture of today: shallow, exploitative, otherizing and it encourages short term dopamine kicks. It's a breeding ground for media illiteracy, bigotry, xenophobia and narrow mindedness in general - which is ironic, since it also makes the culminated knowledge of human kind easily accessible, which has the potential to open your mind if you have internet access and if you use the internet wisely. Anyway, in a way, the internet of today is a crystalization of everything that's making me have a gloomy outlook on the future and keeping me from wanting to have children.

  • Sweet!

  • Thanks for the warning!

  • Privacy @lemmy.ml

    OpenKeychain · OpenKeychain

    www.openkeychain.org
  • Animemes @ani.social

    What has this series inspired you to do?

  • Privacy @lemmy.ml

    How to contribute from home

  • Linux @programming.dev

    iptables - rules for OUTPUT chain

  • Linux @programming.dev

    Help me understand bash syntax

  • Hardware @lemmy.ml

    Tevion Notebook Kit MD85555

  • Mental Health @lemmy.world

    After a year of private psychotherapy, I'm considering taking a break.

  • Android @lemmy.world

    Don't be like me: almost bricked my daily driver. SAVED BY SAMSUNG ANDROID(?) DEVS

  • networking @sh.itjust.works

    How did my ISP identify my AP?

  • Gaming @lemmy.ml

    How do you enjoy the sound of games?

  • networking @sh.itjust.works

    How to efficiently troubleshoot your connection

  • Privacy @lemmy.ml

    Possible to avoid Google's future open source ban on Android devices?

    m.economictimes.com /news/international/us/google-cracks-down-apks-roms-and-emulators-banned-is-android-freedom-over/articleshow/124427674.cms
  • Programming @programming.dev

    My first successfull program in C