• 0 Posts
  • 40 Comments
Joined 1 year ago
cake
Cake day: August 6th, 2023

help-circle
  • Cons:

    You absolutely cannot get 2FA authenticator codes from 90% of services. Many services that require a phone number even without 2FA just for “verify you’re a human” or because they want your data or to verify region use shortcode services that also will not work with ANY VOIP provider.

    You will not receive their codes. These companies vary from banking institutions to gaming companies to online shopping marketplaces and stores to a Google account (used to be you could get an automated phone call to verify an account, not anymore, must be able to receive SMS from shortcodes that are disabled for VOIP numbers to register and to recover an account) just about anyone you could end up doing business with.

    A shockingly large amount of companies demand phone numbers and send verification texts before allowing you to do business with them, to create an account, to recover an account, to delete an account, to place an order, etc.

    They really shouldn’t, it’s a bad security practice but companies love it because with a phone number they can lower support costs by just allowing people to do a self-service where they get an automated text and can unlock their locked account. They also love harvesting that data and preventing anonymization with VOIP numbers and the reduction of fraud and increase of reliable KYC that comes with requiring them.

    And they all take it as a given that EVERYONE or at least 99% have a cell plan with a non-VOIP number that works with these and the 1% who don’t they don’t care about in the developed world and are an acceptable loss.



  • If they have to have a lot of channels then $120 isn’t the worst price (I have relatives who pay twice as much as that a month for cable) though you could perhaps try and check into whether they could switch to a streaming linear TV service like DirecTV Stream with one of their lower tier packages to save some money while retaining a cable-like experience (there’s also Sling, Hulu+Live TV, YoutubeTV, FUBO, etc, many of which have packages with many of the top channels for $60-$80/month).

    Fact is to save money you need to be willing to give things up. If you’re moving from a premium cable package with a ton of channels to a few streaming services you’re going to lose things and potentially a lot of things. You’re going to lose access to live news channels, you’re going to lose access to specific programs on some networks that don’t have streaming service equivalents (I know for one older person I knew the fact they couldn’t get and watch Lifetime and Hallmark movies within any reasonable time-frame of their premier meant they were not interested in looking into streaming any further to replace their cable).

    More than that though most old people hate change, they were used to a certain way of things and they’re afraid and perhaps get confused or frustrated with this new way of doing things. It’s simply more comfortable for them to use the old satellite system they’re used to and its interface and way of changing channels than doing something new where they have to think of how to do something or get frustrated or ask for help. Which is why I do think trying a streaming cable replacement like those I mentioned might be your best bet. It would still save some money.


  • Nah the second movie was kind of awful in that it just threw that and other things out for no good reason. The original source book by Philip K Dick (“Do Androids Dream of Electric Sheep?”) is explicit that they are androids.

    In my opinion it was not a sequel in the proper sense but more something cribbing a recognizable name to sell movie tickets with vaguely related ideas, themes, setting, and Harrison Ford who will do any movie for lots of money as long as he doesn’t have to put any effort in.

    And they were kind of able to do this because Ridley Scott decided to not use the term android in the film adaptation because he wanted something different sounding and so chose the term replicant instead which doesn’t have the clear connotations that android does but Ridley Scott did pretty clearly intend for them to be androids whereas the sequel threw that and the entire context and larger meaning of the work out in favor of whatever it was they were doing.




  • The most elite trackers perhaps.

    Trackers on /r/opensignups ? Nah they open their doors to the public every now and again.

    Would not recommend it to anyone who can’t dedicate a seed box or machine uploading torrents most hours of the day every day. It’s possible to do it without those but difficult. With them it’s merely a matter of using free leech and building a buffer up as well as taking advantage of points systems to get free upload just for keeping torrents seeding even without uploading.

    If you only ever grab free leech then all you have to worry about is meeting seed time and activity requirements like logging in every 90 days.

    An old computer with an external drive. A raspberry pi, a nas that can run a BitTorrent client. Any would work if one doesn’t want to pay for a seed box. (Most trackers ban shared seed boxes though so you will have to get dedicated)


  • Take a look here for some alternatives:

    https://dessalines.github.io/essays/why_not_signal.html#good-alternatives

    • Matrix
    • XMPP
    • Briar
    • SimpleX

    Also just because there are no alternatives doesn’t mean your default position should be we just have to trust whatever exists now because it’s good enough. Or that we can’t criticize it ruthlessly, distrust it. Call it out and as a result of that build perhaps the desire for something better, a fix as it were.

    The evidence and history clearly points towards Signal being very suspicious and likely in bed with the feds. This is not conspiracy thinking. Conspiracy thinking is thinking that the country/empire that gave away old German engima machines whose code they’d cracked to developing countries without telling them they’d cracked it in the late 40s/early 50s, that went on to establish a crypto company just to subvert its encryption. That’s done everything Snowden revealed has in fact changed suddenly for the first time in half a century for no particular reason and not to its own benefit. That’s fanciful thinking. That’s a leap of logic away from the proven trends, the pattern of behavior, and indeed the incentivizes to continue using their dominant position to maintain dominance and power. They didn’t back down on the clipper chip because they just gave up and decided to let people have privacy and rights. They gave up on it because they found better ways of achieving the same results with plausible deniability.

    Also why is everything “tankies” with you people. Privacy advocates point out the obvious and suddenly it’s a communist conspiracy. LOL


  • No.

    HDMI does have a feature called Ethernet over HDMI that in theory could allow that.

    Thing is though it’s literally never been implemented in anything. It died because cheap WiFi became common.

    For it to work you’d need both the TV and Chromecast and HDMI cable all to support it. It’s not uncommon on cables and a surprising amount of them include it in features list (probably to trick low info people).

    But I believe that’s a hardware design thing so not something even a software update could enable. It costs extra money and they’re already paying for a WiFi chip so why bother?


  • Just FYI. Comments nearly exactly like yours on Reddit were used in copyright troll lawsuits against ISPs as evidence they didn’t do enough to enforce copyright and were negligent and legally liable.

    Further when that didn’t work the copyright agency sued Reddit to try to unmask the identities of those people to bring legal proceedings against them to coerce them into testifying against their ISP at threat of being in trouble for their activities. Reddit was big enough to fight off the lawsuit luckily but be careful.




  • M-Discs had merit in the DVD era. It’s a common refrain of those who don’t know the intricacies and read a wired article years ago to claim they mean anything in the Blu-ray era. They don’t.

    Standard Blu-ray Discs have all the technologies that supposedly make m-discs so long lasting and as far as media that isn’t continuously updated and hashed from live storage medium to live storage medium (cold, archival storage unpowered) they are about as good as you’ll get.

    They are much tougher than DVDs. Of course a variety of things go into how long a disc remains readable and without damage to data including luck with regards to no impurities in the batch. Even m-disc themselves based their longest claims off storage in ideal situations like an inactive salt mine (commonly used for archives by governments). Kept out of sun, away from extreme heat (including baking in uninsulated 120 degree F heat all summer year after year), away from high humidity and away from UV exposure to the data side of the disc as well as scratches and such and they should last a quarter to half a century, some more.

    In the Blu-ray era m-discs are just an overly expensive brand.


  • Hamas is a legitimate resistance group exercising their legitimate, legal right under international law to violently resist unlawful colonization, occupation, land-theft, and genocide. They have every right to exist, they have every right to use violence against settlers who should leave and give back the stolen land.

    If you want more moderate types, know that the zionists intentionally crushed them and propped up Hamas to create just this kind of argument and by spouting it you’re carrying water for them. Only the end of the occupation and the formation of a full Palestinian state will result in the breathing room for the creation of moderate groups and opinions.



  • It should be considered illegal if it was used to harm/sexually abuse a child which in this case it was.

    Whether it should be classed as CSAM or something separate, I tend to think probably something separate as a revenge porn type law that still allows for distinguishing between this and say a girl whose uncle groomed and sexually abused her while filming it as while this is awful it can (and often does seem) be the product of foolish youth rather than the offender and those involved all being very sick, dangerous, and actually violent offending adult pedophiles victimizing children.

    Consider the following:

    1. Underage girl takes a picture of her own genitals, unfortunately classified as the unhelpful and harmful term “child porn” and she can be charged and registered as a sex offender but it’s not CSAM and -shouldn’t- be considered illegal material or a crime (though it is because the west has a vile fixation on puritanism which hurts survivors of childhood sexual trauma as well as adults).

    2. Underage girl takes a picture of her genitals and sends it to her boyfriend, again /shouldn’t/ be CSAM (unfortunately may be charged similarly), she consented and we can assume there wasn’t any unreasonable level of coercion. What it is unfortunately is bound by certain notions of puritanism that are very American.

    3. From 2, boyfriend shares it with other boys, now it’s potentially CSAM or at the least revenge porn of a child as she didn’t consent and it could be used to harm her but punishment has to be modulated with the fact the offender is likely a child himself and not fully able to comprehend his actions.

    4. Underage boy cuts out photo of underage girl he likes, only her face and head, glues it atop a picture of a naked porn actress, maybe a petite one and uses it for his own purposes in private. Not something I think should be classed as CSAM.

    5. Underage boy uses AI to do the same as above but more believably, again I think it’s kind of creepy but if he keeps it to himself and doesn’t show anyone or spread it around it’s just youthful weirdness though really he probably shouldn’t have easy access to those tools.

    6. Underage boy uses AI to do same as 4-5 but this time he spread it around, defaming the girl, she/her friends find out, people say mean things about her, she has to go to school with a bunch of people who are looking and pleasuring themselves to fake but realistic images of herself against her consent which is violating and makes one feel unsafe. Worse probably being bullied for it, mean things, called the s-word, etc.

    Kids are weird and do dumb things though unfortunately boys especially in our culture have a propensity to do things that hurt girls far more than the inverse to the point it’s not even really worth talking about girls being creepy or sexually abusive towards peer-aged boys in adolescence and young adulthood. To address this though you need to address patriarchy and misogyny on a cultural level, teach boys empathy and respect for girls and women and frankly do away with all this abusive pornography that’s super prevalent and popular which encourages and perpetuates abusive actions and mentalities towards women and girls, this will never happen in the US however because it’s structurally opposed to being able to do such a thing. Also couldn’t hurt to peel back the stigma and shame around sexuality and nudity in the US which stems from its reactionary Christian culture but again I don’t think that will ever happen in the US as it exists, not this century anyways.

    Obviously not getting into adults here as that doesn’t need to be discussed, it’s wrong plain and simple.

    Bottom line I think is companies need to be strongly compelled to quickly remove revenge-porn type stuff (regardless of the age of the victim though children can’t deal with this kind of thing as well as adults so the risk of suicide or other self-harm is much higher so it should be treated as higher priority) which this definitely is. It’s abusive and unacceptable and they should fear the credit card companies coming down on them hard and destroying them if they don’t aggressively remove it and ban it and report those sharing it. It should be driven off the clear-web once reported, there should be an image-hash data-set like that used for CSAM (but separate) for such things and major services should use it to stop the spread.


  • So first it’s client-side scanning for CSAM. Not without some nobility. But the problem is once you wedge open that door it’s technically possible to do it for other things and so you become compelled to.

    It’ll move from just CSAM to stopping and tracking “propaganda” as deemed by them which will be narrow-ish at first (anything pro-Russia, RT links, etc) but gradually expand over time to anything outside the mainstream branded as extremist (and guess what, privacy advocates will definitely fall within that label). And once that’s in place the private stake-holders, copyright holders will come knocking, they’ll say rightly so “hey you have the capability right now, we demand you implement client-side scanning to detect copyright violations” and then that will be ordered by a court, further enshrined by a law and oh look now you can no longer send political thought that the ruling regime disagrees with, can no longer surf the high seas, and so on and so forth. Congratulations and please enjoy living in the “garden” of Europe.



  • China: has like 300 nuclear weapons, none of them stationed outside their country. Has no forward military bases from which to stage or launch attacks, has limited forward radar visibility of incoming attacks. Has a couple SSBM subs which likely operate entirely in the south China sea from which it can launch. Wants to expand to 1000 by 2030.

    Russia: Has over 4000 warheads, most aging. Has no meaningful forward military bases outside their country for staging attacks on the west. Has no meaningful forward radar visibility of incoming attacks from beyond its borders. Has a few SSBM subs from which it can launch.

    US: Has over 4000 warheads, many aging. Has many hidden, classified, constantly operating SSBM submarines which regularly intentionally cruise to the north Atlantic (near Russia), the south Pacific (near China), and a variety of other locations. Has ground-launched missiles, an air delivery system. Has world class sonar (included super-sensitive listening stations bolted to the bedrock of the east and west coasts) and aggressive drone campaigns to hunt and constantly track Chinese and Russian missile subs to allow them a first kill. Has forward warning radar systems positioned thousands of miles from its borders in northern Canada, in Europe, in the Pacific on island chains. In addition has a massive, the most massive spy satellite network in operation constantly watching other powers in incredible detail. Has a space force dedicated to among other things sabotaging Chinese and Russian space assets with kill switches or remote disable explosives which could be used in aggression to blind their enemy first. Of all major world powers will have the most warning and most time to react decisively in case of a full scale launch and attempted sneak first strike on them by either Russia or China. Stations nuclear weapons with allies in “sharing” agreements where the US has final say on their use and launch in countries from the UK to mainland Europe near Russia to Turkey, is considering such an agreement with South Korea right on China’s border.

    But tell me again how the US is backed into a corner in this situation and has no choice but to build more warheads and pour hundreds of billions that could feed, cloth, shelter, and provide healthcare to its people into new delivery systems which will fatten and enrich defense contractors to the tune of hundreds of billions of overage costs if not trillions for systems that may or may not even work thanks to contractor greed and sloppiness.