Recent comments

Wahaha OP wrote

Reply to comment by txt in Pattern Recognition by Wahaha

I'm confused, where do you see any anti-Semitism? Where is the hostility to, prejudice, or discrimination against Jews in the video? The video isn't hostile nor prejudiced, it's just a compilation of data points. How exactly are Jews being discriminated here?

−1

txt wrote (edited )

100% original content with no antisemitism whatsoever. 10/10 definitely not racist garbage. Music was very good and not ripped straight from youtube.

3

Rambler wrote (edited )

For those curious: https://en.wikipedia.org/wiki/Warrant_canary and /w/warrant_canary

Good question, and it wasn't created with any sort of legal consultation to be fair.

I guess January's notice my have different phrasing that that goes along the lines of, "Be aware of any prolonged period of no updates to this notice" or something. The goal is to update it monthly however. I guess one could be placed under legal order to continue to update it, I'm not certain as I've yet to see a case where that has been required.

I'm not going to be at the keyboard at the strike of midnight at the beginning of every new month, however, if (for example) it's January 4th and I've:

  • Been active on the site still
  • Haven't updated it yet.

Then there is the possibility it slipped my mind ( I have a reminder set, though ) or, y'know. It's working as intended and not updated on purpose.

With that said I want everyone to understand what is even available if a request was made, which is shockingly little. Can't share what we don't know. One of the benefits of the end-user accessing this site through the various network is this:

  • Tor traffic looks like localhost traffic. (Same local IP for everyone)
  • Lokinet traffic looks like localhost traffic (Different local IP as Tor, but still local and the same for everyone)
  • I2P traffic is all logged as the IP address from the I2P router that the HTTP tunnel is created on, regardless of user, the IP is the same. I'm not going to pretend like I know enough about the network to tell you how I can not determine the difference between I2PUser_A and I2PUser_B, but like the above networks, I can't tell the difference between them as far as logs go.
  • Yggdrasil is a bit different and not necessarily as anonymous as the above methods however you should be able to browse with different Yggdrasil IPs as set by the end-user.
  • The clearnet is obviously the least private of all the above and I encourage use of the alternative networks where able.

The inability to diffrentiate between User_A and User_B while using the anonymity networks is one of the reasons why I've stated that in the event of severe abuse stemming from any particular network, I'll close access to that network (temporarily) to prevent it.

If anyone is concerned about their privacy, my suggestions are to:

  • Use a unique username that isn't used elsewhere.
  • Use a unique password that isn't used elsewhere. That's just always good practice regardless of what you're doing or what you're signing up for.
  • Don't use an email address, because you don't have to and I don't want to send you email anyway.
  • Assess your OPSec needs and if you know you're doing stuff outside of the eye of the law then do all of the above and also don't post stuff that would make it easier to pinpoint you. Basically, don't copy/paste content you posted under a different alias elsewhere, I'd refrain from mentioning things that can pinpoint you to any specific geographical location, etc.

IF YOU EVER FEEL LIKE YOUR OPSEC HAS BEEN COMPROMISED OR YOU NEED OR WANT TO START FRESH

  • Click your name in the top right corner.
  • Go to "My Account"
  • Click, "Delete This Account"

That will delete all your posts, submissions, votes, everything. We do run backups of this site and without giving away too much because it's really not the public's business, in a matter of a short period any available backup that had any of that information stored will be overwritten a newer backup, one that doesn't contain that info. Backups are for when I inevitably mess something up by mistake and need to recover from it without much (hopefully) data loss.

2

Wingless wrote (edited )

The notion that Facebook can make a public campaign against your phone being allowed to check with you before handing out information about what you're doing ... it's mind-boggling. But Apple is no defender of privacy itself, no matter what their marketing: https://sneak.berlin/20201112/your-computer-isnt-yours/ And eventually, once enough people realize that ... they'll stop trying to pretend, even with things like fighting Facebook.

2

Wahaha wrote

The simpler sales pitch is that vim can do everything you can and cannot imagine. Just do a search for what you want to accomplish and find out how it is done.

First time users should just go through vimtutor, which will start vim with a document that shows you all the basic functionality and let's you do all these things, so you can build muscle memory.

As for the things vim can do that you cannot even imagine: you can type stuff in vim, let's say text_A, then undo this and write something else, let's say text_B. If you now decide text_A is really where it's at, in normal editors you're fucked, but vim can actually get it back: with this plugin

2

Rambler OP wrote

Sheesh, please bin the Nazis and racists into their own category, instead of "Adult/NSFW." Nazis are real boner-killers.

Ha, yeah... I wasn't quite for sure where to put them. But I figured labeling them NSFW was appropriate other than adding them under personal sites or services.

2

not_bob wrote

Reply to comment by Rambler in A IRC chat room on Tor by piamie

Would it be possible to require a time delay for upvotes and posts for new accounts? Even an hour or two would be enough to make it a pain to do this sort of thing.

2