Recent comments

smartypants wrote (edited )

The data caps are unlimited (well over 8 Terabytes a month)... if you cancel your Comcast residential account, wait a week, then open a new BUSINESS COMCAST account using a different phone number, email, and slight spelling difference for name, for only about double the price.

BUSINESS comcast will repair your line in under 3 hours! Always! Business comcast will send a tech to your house even at 9pm!!! Business comcast is astounding.

UNLIMITED!!!!! and all ports open , even port 25, though normally an email server on comcast cable would be ignored by recipient servers.

UNLIMITED for about 100 bucks a month, just buy your own cable modem like a SB6190 modem

2

spc50 wrote

Totally... It's a man-in-the-middle.

I wouldn't care if 70% of the net went through CF. It is just another honeypot / slave plantation for the lazy, those in over their heads, those without funding to do this or that tech wizbang.

Slaves need to revolt.

3

spc50 wrote (edited )

Another day and more known but unfixed security issues.

Funny that it is in Android, which Google owns.

The same Google dumping sh%t on open source the other day and talking about making themselves a gateway for open source published projects that are core.

Got news you wealthy tards in Mountain View --- worry about how badly your code sucks and how lousy your company has become as citizens.

Censor this you big dummies.

As for TikTok BOOM. Worst app. When you have 15 second attention span and endlessly swiping. Yeah, that might be good approach for your masturbation fodder but it isn't smart for hours a day, for a developing young person's brain, etc.

Nevermind the obvious spying and leaking - which is all the tech tards know how to do. The all knowing fake godplex is what is all about. They are in cahoots. Companies not on the team get blacklisted and downed - i.e. Parler.

1

smartypants OP wrote (edited )

1

J0yI9YUX41Wx wrote

Yeah, could be an outage. Amazon is comfortable saying "you broke our Terms of Service" (i.e. "we don't like you"). So in the absence of such an email, I'm inclined to believe this is technical issues.

1

spc50 wrote

This has been a 'feature' in Firefox and likely other browsers.

I would test but I am lazy right now and I disable and mutate browsers to pretend they could be privacy adhering (in reality they are lying, cheating, c*nts who report to everyone whatever).

Chromium just recently cleaned up their version of this stupidity:

https://www.theregister.com/2021/02/04/chromium_dns_traffic_drop/

Chromium cleans up its act – and daily DNS root server queries drop by 60 billion That’s a 41 per cent traffic relief for all concerned Simon Sharwood, APAC Editor Thu 4 Feb 2021 // 08:01 UTC The Google-sponsored Chromium project has cleaned up its act, and the result is a marked decline in queries to DNS root servers.

As The Register reported in August 2020, Chromium-based browsers generate a lot of DNS traffic as they try to determine if input into their omnibox is a domain name or a search query.

Verisign engineers Matthew Thomas and Duane Wessels examined the resulting traffic and reached the conclusion that it accounted for up to 60 billion DNS queries every day.

Wessels has since penned a new post that went unreported when it appeared on January 7 – the day after the US Capitol riot – but was today resurfaced by APNIC, the Regional Internet Registry for the Asia-Pacific region.

In the post he says the Chromium team redesigned its code to stop junk DNS requests, and released the update in Chromium 87.

2

spc50 wrote (edited )

COV FEFE is interesting..

COV = COVID

FEFE = Yellow

What country is know as yellow? China.

COVID IS CHINA.

The Teflon Donald dropped COFEFE way back in 2017? This was another bat signal. He for some reason dropped random crumbs and wouldn't outright drop info. Proof enough in my little brain that the deep state is that real and dangerous.

2

spc50 wrote (edited )

F-off to reddit and other control NAZIS (as opposed to my kosher friends - at least the genuine ones of faith).

This gatewaying of all information and only calling something valid when it is admitted by a head of pyramid is tired.

This is why people sit on 0 day exploits for years and drop things strategically. Because too many people out there in power positions are abusive and in denial that their sh!t stinks.

Brave is an ugly baby.

I went back and found I tagged Brave leaking to plain DNS back on February 6th. Was new to me. Working on other stuff involving Tor and had just spun up Brave to check it out. Wondered why strange stuff in my DNS logs (you log your DNS lookups, don't you? You should).

Now who can point me to all the bundled Brave releases? Cause they are all fronted to feed you latest one. I want to selectively install and test and see how many releases they've been outing .onion addresses and putting normies at risk.

2

Rambler wrote (edited )

I didn't know Gab was using Cloudflare, but there it is: https://intodns.com/gab.com

edit: https://tv.gab.com/ works and so does https://dissenter.com/ . Might not be a Cloudflare issue, might just be regular ol' maintenance or outage. Cloudflare had a large outage last night that impacted most North American customers from what I understand so it's not like they're prone to breaking.

2

spc50 wrote

Just look at that.

It's Black History month yo'!

Give the downtrodden man of better suntan a whole month.

Give him the whitest and coldest month.

Feb-uuuurrrrr-y

Have a coke and a smile.

2

spc50 wrote

That deep V chill is just the lady VEEPEE spreading her tunnel of doom. Heels up is from Cana-duh anyways. Icy broad.

1

spc50 wrote (edited )

It's more secure than Brave :) Just look at how Brave has been leaking addresses to regular DNS for how long? (who can feed me a URL with their old releases so I can test?)

Seriously you should be running Tor browser with javascript off. JS is a nuisance and privacy sewer and by design. Javascript creator should be charged with crimes against humanity.

Oh isn't that fellow the lad behind Brave?

2

riddler wrote

This is more about charging higher prices to selected markets than increasing availability. Build products and sell them for what the market will bear. Stupid restrictions like region locking only make consumers bitter.

I've got a friend waiting on me to build a gaming PC for him for the past two months. Graphics cards are running 2-5x the prices they were running in late October. Ironically, the prices are still going higher. What was $180 in October became $450 in January. Now the same card is running in the $650 range. That is assuming I'm willing to deal with a sketchy third party seller. I'm sure there are many other people also putting off purchases because of the insane pricing. This is also likely cutting into the rest of the market (cases, power supplies, software, retailers, etc).

Allegedly the same problems with video card production are impacting automotive production as well. Globalism really is starting to look like third world for the entire world. We can't keep power or water on. We can't make computer components. All because of some flu that mainly affects old people in assisted living facilities.

2

overvalley OP wrote

There's an example and description at Mullvad for the two-hop connection: http://xcln5hkbriyklr6n.onion/en/help/wireguard-and-mullvad-vpn/ [Forgive the onion link, but search "wireguard-and-mullvad-vpn" for clearnet]

"Each WireGuard server is connected to all the other WireGuard servers through WireGuard tunnels."

The user gets confirmation that their target website sees the IP of the second node, but what does the ISP see? Aren't they routing to the first node (at least physically), and is it masked as the second node? Does the tunnel between nodes become redundant as the user connection tunnels through the entry node to the exit node?

Nodes/servers
Is it wrong to use "nodes" in this scenario

1

smartypants wrote

I tested it with 20 far-right domains and ZERO were blocked.

THANKS! I completed my tests.

Quad9 does not censor on behalf of ADL, JIDF, nor SPLC yet.

The sites it blocks that they claim they block are truly scam domains that phish from your retarded older relatives.

In case a public DNS blocks, you can use some others as fallbacks :

  • 8.8.4.4 < google fast fast fast, but spys and logs you for making money
  • 64.6.64.6 < verisign open
  • 208.67.222.222 < OpenDNS
  • 9.9.9.9 < Quad9 public DNS in europe

One of those on occasion blocked a famous far-right site that agitated the (((ADL)) but it was not permanent.

Quad9 is far too far from me to use it in all my routers and machines, but I will use it as a secondary and parallel search. I measure everything in my life in fractions of milliseconds and though I also have many of my own DNS servers, and caching, I do not live in Switzerland, though I love visiting it often.

1

smartypants wrote

I have mixed feelings on this type of mix. (no pun intended)

mainly, as a big fan, and a person that toured a little on road with Green Day in 1994... they year they got famous... I tend to only like punkier stuff, but my brain also likes novelty in general.

As for trance,goa,shoegazer,dub step,dream pop,house,acid trance,hard style trance, bubble,Darkpsy, and fast electronica... all have their place in moderation.

1

smartypants wrote

Good for you!

Alternatives to Cloudflare DDoS protection:

BitMitigate (one time banned a domain, but bans far less than CloudFlare)
Digital ocean
Imperva Incapsula
Dynu Dynamic DNS
ClouDNS.net
Neustar SiteProtect
JavaPipe
ArvanCloud
CloudLayar

Cloudflare censor bans sites with no warning, (23 hours sometimes).

Cloudflare also demands no private jevascript cryptography of payloads, and all traffic must be in clear and use an evil CLOUDFLARE SSL KEY on your behalf!!

Its true! NOt one actual private person to person message was ever sent on voat.co in history, because voat.co used Cloudflare and thus, ceded all actual true https ability and cloudflare stores and copies all traffic for feds, as Cloudflare often revealed.

3

smartypants wrote (edited )

Thank you for posting this story!

It has immense interest to me, from my ancient career of exploiting these chips and other related chips via renting scanning electron microscopes and peeling off obfuscation grid atop the good parts, and also "runtime glitching" (voltage, temp, amperage, clock jitter) to glean internal keys of production runs.

Not for fraud, but for selling crypto services... I was a white hat and part of a team of guys... or at least I mostly a white hat, but not a gray hat, nor black hat.

2