Recent comments

riddler wrote

This is more about charging higher prices to selected markets than increasing availability. Build products and sell them for what the market will bear. Stupid restrictions like region locking only make consumers bitter.

I've got a friend waiting on me to build a gaming PC for him for the past two months. Graphics cards are running 2-5x the prices they were running in late October. Ironically, the prices are still going higher. What was $180 in October became $450 in January. Now the same card is running in the $650 range. That is assuming I'm willing to deal with a sketchy third party seller. I'm sure there are many other people also putting off purchases because of the insane pricing. This is also likely cutting into the rest of the market (cases, power supplies, software, retailers, etc).

Allegedly the same problems with video card production are impacting automotive production as well. Globalism really is starting to look like third world for the entire world. We can't keep power or water on. We can't make computer components. All because of some flu that mainly affects old people in assisted living facilities.

2

overvalley OP wrote

There's an example and description at Mullvad for the two-hop connection: http://xcln5hkbriyklr6n.onion/en/help/wireguard-and-mullvad-vpn/ [Forgive the onion link, but search "wireguard-and-mullvad-vpn" for clearnet]

"Each WireGuard server is connected to all the other WireGuard servers through WireGuard tunnels."

The user gets confirmation that their target website sees the IP of the second node, but what does the ISP see? Aren't they routing to the first node (at least physically), and is it masked as the second node? Does the tunnel between nodes become redundant as the user connection tunnels through the entry node to the exit node?

Nodes/servers
Is it wrong to use "nodes" in this scenario

1

smartypants wrote

I tested it with 20 far-right domains and ZERO were blocked.

THANKS! I completed my tests.

Quad9 does not censor on behalf of ADL, JIDF, nor SPLC yet.

The sites it blocks that they claim they block are truly scam domains that phish from your retarded older relatives.

In case a public DNS blocks, you can use some others as fallbacks :

  • 8.8.4.4 < google fast fast fast, but spys and logs you for making money
  • 64.6.64.6 < verisign open
  • 208.67.222.222 < OpenDNS
  • 9.9.9.9 < Quad9 public DNS in europe

One of those on occasion blocked a famous far-right site that agitated the (((ADL)) but it was not permanent.

Quad9 is far too far from me to use it in all my routers and machines, but I will use it as a secondary and parallel search. I measure everything in my life in fractions of milliseconds and though I also have many of my own DNS servers, and caching, I do not live in Switzerland, though I love visiting it often.

1

smartypants wrote

I have mixed feelings on this type of mix. (no pun intended)

mainly, as a big fan, and a person that toured a little on road with Green Day in 1994... they year they got famous... I tend to only like punkier stuff, but my brain also likes novelty in general.

As for trance,goa,shoegazer,dub step,dream pop,house,acid trance,hard style trance, bubble,Darkpsy, and fast electronica... all have their place in moderation.

1

smartypants wrote

Good for you!

Alternatives to Cloudflare DDoS protection:

BitMitigate (one time banned a domain, but bans far less than CloudFlare)
Digital ocean
Imperva Incapsula
Dynu Dynamic DNS
ClouDNS.net
Neustar SiteProtect
JavaPipe
ArvanCloud
CloudLayar

Cloudflare censor bans sites with no warning, (23 hours sometimes).

Cloudflare also demands no private jevascript cryptography of payloads, and all traffic must be in clear and use an evil CLOUDFLARE SSL KEY on your behalf!!

Its true! NOt one actual private person to person message was ever sent on voat.co in history, because voat.co used Cloudflare and thus, ceded all actual true https ability and cloudflare stores and copies all traffic for feds, as Cloudflare often revealed.

3

smartypants wrote (edited )

Thank you for posting this story!

It has immense interest to me, from my ancient career of exploiting these chips and other related chips via renting scanning electron microscopes and peeling off obfuscation grid atop the good parts, and also "runtime glitching" (voltage, temp, amperage, clock jitter) to glean internal keys of production runs.

Not for fraud, but for selling crypto services... I was a white hat and part of a team of guys... or at least I mostly a white hat, but not a gray hat, nor black hat.

2

SmokeyMeadow wrote

Blacks can use the internet, they just need an app to connect them to whatever service they're using. Typing in www addresses is like the digital equivalent of a restaurant dress code.

1

RandomlyGeneratedUsername OP wrote (edited )

Funding can influence a project pretty significantly. Even mastodons like Linus Torvalds had to obey politics. Tor Project has been subjected by the diversity politics pretty quickly. You would expect more independence from rebellious cryptopunks.

2

Wahaha wrote

If you put effort in you can also make Chrome privacy friendly (ungoogled-chromium), but I thought the point of this list should be to find stuff you don't have to expend such effort.

Searx has pretty good results.

Also, these things are just what leaked about DDG. Who knows what else there is we don't know about.

2

bransonmagee wrote

It looks like the passports would actually report vaccine status, so getting a new passport now wouldn't help, because other countries could still bar you entry if you don't have proof that you're vaccinated.

They aren't planning to deny people new passports, just that without a vaccination you're not getting that special stamp that lets you travel most places.

The UK will not be requiring vaccines domestically, but the rest of the the world might require it if you want to visit.

2