Recent comments

iop23up wrote (edited )

they want to deny scraping of their data. It is not their data. It's the posters data. What about copyrights by the user. This ai thing would fall down very quickly if you have to create/generate your data by yourself by hiring some volunteers on salary. But what they are now doing in twitter is that these data geerators have to pay money for distributing their data. Quite weird. What is needed is a form of copyright which extend its power to segmented/parameterised usage or maybe allow/disallow training usage. Should be easy to verifiy if you can reprodue the original to a limit which indicates that you had this training data. What do thing you will find in some stable diffusion models if you prompt the right parameters. No surprise to find these things there. The consequence of this would be that these datascraper//trainers need to have look to secure that they haven't been trained on copyright material. This discussin is not new. How much parts does make an original and are they consists of parts that are so small that they are "trivial" information and is the amorphed amount of these parts copyright free and become copyrightwith an instruction how to put these parts together in a/the right way? There has been some apps which tries to circumvent the copyright by fractionize the data to "trivial" parts, if iirc correctly the judges don't saw it that way. The difference here is that the instructions will biuld/reconstruct only one output and not variotions of the data like the ai models.

The i2p model does not help to much against this stealing of data i thing. It just make it slower, but it will make the scraper to run nodes,which is good for i2p :). The anonymity of i2p gains some id mixing as you can't really build one id like with an registered user.

My hope is that the people a tired to jump from one to another, but i don't think they in a state that let them recognize the importants of this cooperation fights for their data and access and a huge necessity to have a non big money/data alternative. Which they have to pay/contribute the development/maintainance for.

I don't know if these tech provide the same features as these big cooperation solutions, but i don't think that should be the goal either. The niche is that people need something they scan rely to if they are abandon some service. The question is always how to connect again. That's the niche i think of. Something like: Twitter has deleted my post, but it is still on i2p-x (or bitmassage,i2pemail fed, etc.), here is the link, should be ok as long as 2+ nodes are running... or: Here the link to my always up linklist on i2p-x (i know youc can do this right now by own http server/railroad), here you can find my other locations.

What about something that allows to have a universial post. Using images? If i post i would generate a jpg. It puts metadata from the post like postnumber, reference, keys, hashs into the metadata of the image. The image itsself would be a screenshot of the post(maybe watermarked). The raw post data will be put into the image as stego encrypted or not. This could be useful for reposting etc. and is not format specific. The user will generate it by posting/sharing and stores/send it anywhere for linking/reference. This method will produce bigger post size for sure, but could be acceptable if to find it at all is more important. And you can read the post with every image viewer and do not need to touch any forum/messageservice/app to read it.

1

Rambler wrote

Luckily, faraday bags are (still) legal and easy to make, and cheap to buy if you want one. I've got some name-brand faraday bag that was $25 or so, which works well in all tests I've done. In a pinch can make one with similar effectiveness that may be a bit gaudy to look at, but hey, function over fashion! https://www.instructables.com/EASIEST-FARADAY-PHONE-POUCH/

I'm able to disable the camera and mic on my Pixel 7 w/ GrapheneOS via software, but unsure how well it actually 'works'. I know that when I open an app that requires either, I get warnings that the mic is disabled (As if, I open the phone app) or whatever, which I can toggle back on, if I need to.

France really has gone above and beyond as of late to prove that they hate your privacy.

2

Rambler wrote

This is what the type of people who left Twitter want, though. They want a circle-jerk where everyone says the same things and no one deviates from the talking points that they've deemed acceptable.

I don't agree with it, but it's what these people wanted.

3

z3d OP wrote

With most of the soldiers in the war zone, around 10,000 reservists protecting the capital, and very little resistance to the Wagner convoy en route to Moscow, Prigozhin could have made things very ugly for Putin, though it's unlikely he would have captured Moscow for very long, and more than likely that his forces would ultimately have been annihilated.

The more interesting question is why Putin decided to grant him and his forces amnesty. Some suggest Prigozhin retains significant kompromat on Putin and the ruling elite, others suggest that the hero status of Wagner, portrayed in the Russian media until recently, kept him safe.

Whatever the reason for the stay of execution, Prigozhin's days are likely numbered. When he's been totally erased from the collective consciousness of mother Russia, he may just receive a visit from Mr. Novichok or Dr. Polonium.

2

righttoprivacy wrote

Personal belief: strategic false flag. I feel it highly unlikely they truly ever planned to "take over Russia". That is most laughable to hear some people believe this - if I'm wrong, howso? I'd like to know what others think.

IMO Putin likely wanted to move his chess pieces into position, while creating confusion.

1

z3d wrote

Reply to comment by kitz in email exchange in I2P by kitz

Which part of "it should be considered defunct, there are no active developers" don't you understand? It's dead, Jim!

1

kitz OP wrote (edited )

Reply to comment by z3d in email exchange in I2P by kitz

i2pbote should be considered defunct. No active developers and a huge chunk of less than ideal legacy code.

The fact that there is a problem with the site is quite obvious. I have seen some recent changes from the team in their forks. It looks like the project has some kind of support. Why don't they merge them into the main repository? Perhaps this activity will revive the community.

So what about this point?

1

Rambler wrote (edited )

Reply to comment by z3d in email exchange in I2P by kitz

In my (limited) experience using i2pmail.org as a clearnet relay, I find that an expected email may not hit my @mail.i2p inbox until some hours later. I'm not certain if this delay is caused from the clearnet to I2P path or within the I2P network itself.

Still a very suitable and beneficial service, of course. But something to consider for time sensitive emails, as using that email address for something you may need a password reset on or email based auth-code that expires after XX minutes, you may find yourself in between a rock and a hard place.


EDIT: Disregard the above about it not being suitable for time-senstive emails. I just did a test, and received my clearnet email to my I2P inbox in about 5 minutes. In the past, it had taken hours, but in hindsight, the webmail inbox may have been cached or it could have just been a one-off fluke. ¯\_ (ツ)_/¯?

2

z3d wrote (edited )

Reply to comment by kitz in email exchange in I2P by kitz

Note that some mail servers or services may not play nice with i2pmail.org.

Can you tell me more about this point? Or where I can read about it?

It's really hit and miss, no golden rule. For the most part, things work fine, though if a service or remote mail server has i2pmail.org in their blacklist, then you might experience issues. Some services appear to treat i2pmail.org as they would a throwaway e-mail host.

3

Qball wrote

You have the correct idea. Previously I used XFS. Shure for torrent storage I use loop with btrfs. For USB fat32... for old hardware and OS'es. I forgot what Hammer (Dragon Fly bsd) is used for or if I ever use it (I gave up on DragonFly because of ransom crap attention). Just make sure you have hardware disk encryption (all motherboard manufacturers have it but don't give it with default BIOS) to prevent watermarking.

2