• 0 Posts
  • 49 Comments
Joined 19 days ago
cake
Cake day: February 5th, 2025

help-circle

  • Love Rossman and his analogies. lol

    If you agree with Louis but don’t know how to setup something as complicated as pfBlocker-NG, you can try other DNS (DoH/3) based adblocking which IMO is just as effective;

    Light + TIF                     https://sky.rethinkdns.com/1:AAkACAQA
    Normal + TIF                https://sky.rethinkdns.com/1:AAkACAgA
    Pro + TIF                 https://sky.rethinkdns.com/1:AAoACBAA
    Pro plus + TIF               https://sky.rethinkdns.com/1:AAoACAgA
    Ultimate + TIF              https://sky.rethinkdns.com/1:gAgACABA
    
    Light + TIF                 https://dns.dnswarden.com/00000000000000000000048  
    Normal + TIF                 https://dns.dnswarden.com/00000000000000000000028  
    Pro + TIF                 https://dns.dnswarden.com/00000000000000000000018  
    Pro plus + TIF               https://dns.dnswarden.com/0000000000000000000000o  
    Ultimate + TIF              https://dns.dnswarden.com/0000000000000000000000804  
    
    Light                https://freedns.controld.com/x-hagezi-light
    Normal                https://freedns.controld.com/x-hagezi-normal
    Pro                https://freedns.controld.com/x-hagezi-pro  
    Pro plus                https://freedns.controld.com/x-hagezi-proplus  
    Ultimate                https://freedns.controld.com/x-hagezi-ultimate
    TIF                https://freedns.controld.com/x-hagezi-tif
    

    Not sure how to use dnscrypt-proxy to set up DoH/3 resolution? Check out the only software I’ve ever recommended anyone ever pay for: YogaDNS

    Swapping DoH/3 providers is as simple as adding them, and setting a routing rule. Hell, your router may even be DoH/3 compatible and you’ll be able to set this network wide.

    Test it out.






  • Depends on how many torrents you have. You have a set number of global peers. So if all of those peer slots are occupied by leechers, then you won’t have any room to download anything. A way around this is torrent priorities.

    Setting seeding torrents to low priority will ensure that any new torrents imported at normal priority will download without an issue. You can even set seeding torrents to high priority to ensure that they’ll always seed, even if it means taking priority over your downloads.



  • Xanza@lemm.eetoLinux@lemmy.ml"SO proof" distro
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 days ago

    Use btrfs snapshots. Bring the PC to a state that you like, make a snapshot. Then on shutdown set the profile to reload to the specific snapshot.

    Any issues? Just restart. Might take a minute, but it ensures the exact same environment every time.











  • Most Android versions have this now. Became popular as soon as SCOTUS ruled that police can compel you to unlock your device via biometrics. Enable it. If you think you may be arrested, simply restart your phone and now they need a court order to unlock your phone which means they have to convince a judge with probable cause.


  • Practically speaking, there’s a huge difference.

    RCS/iMessage are great. They’re a huge upgrade over SMS, however, the E2E statements they make aren’t really verifiable to the degree necessary to call them secure. They also require hardware compatibility, software compatibility, environment compatibility (root breaks RCS) as well as network compatibility so the pool of devices that work both ways with RCS is still pretty small. It’s frankly a mess. Default settings for most RCS/iMessage applications will attempt to send via E2E protocols and if it fails, it defaults back to sending SMS. So now your super secret content was just sent basically over cleartext if the protocol send fails. lol

    Realistically speaking, he’s right. There’s no difference. People don’t casually message information which is important enough to require perfect forward secrecy. So at the end of the day choose which works best for you and if you do dumb shit like sending credit card and social security numbers over clearnet, then prepare to have your anus widened.

    I personally prefer running an MTProto proxy on top of Telegram. I control the proxy, so I can view where the network traffic is going in transit for the most part. Is MTProto perfect? No. But it’s vastly improved since previous independent audits and it’s “good enough.”

    If critically sensitive information has to touch a device with internet access then you need a mature security protocol like PGP or some other shared key cryptography so you can verifiably ensure you’re talking to whom you’re supposed to be talking to. If that’s something you’re interested in, give Keybase a try. It’s a really great platform built around a really great technology (PGP). The mobile application comes with a chat option that uses your PGP key to symmetrically encrypt your chat messages using Scrypt (with PBKDF2) making it significantly more secure than any other option mentioned here.