diyrebel

joined 1 year ago
[–] diyrebel@lemmy.dbzer0.com 2 points 1 month ago* (last edited 1 month ago)

The metadata in the headers can be avoided using Memoryhole and similar protocols which embed the headers inside the encrypted payload. The problem is again barrier to entry. Low-tech users generally can’t even handle app installs on desktops.

When you say “worry”, that’s not the right word for it. My boycott against Google is not fear-driven. I will not feed Google anything it can profit from as an ethical stance. Even if an expert linux tor user were on Google, I’m not sure we could exchange email in a way that ensures Google gets no profitable data. If we use PGP coupled with Memoryhole to strip out the headers, I’m not sure Google would accept a msg with a missing or bogus From: header. But if so, Google still possibly learns the user’s timezone. Though that may be useless if Google learns nothing else about that user. But we’re talking obscure corner cases at this point. Such an expert user would have no Google dependency anyway.

MS/google-dependent friends are generally extremely low-tech. They don’t know the difference between Firefox and the Internet. They don’t know the difference between Wi-Fi and Internet. Linux -- what’s linux? They would say. At best, they just think of it as a mysterious nerd tool to be avoided. So what can I do wholly on my end to reach them via gmail without Google getting a shred of profitable data? Nothing really. So I just don’t connect directly with a large segment of friends and family. Some of them are probably no longer reachable. Some are in touch with people who connect to me via XMPP, so sometimes info/msgs get proxied through the few XMPP users. It’s still a shitshow because Google still gets fed through that proxied inner circle of friends and family. In the past when someone needed to reach me directly, they would create a Hushmail or Protonmail mail account for that temporary purpose (like coordinating a trip somewhere). But that option is mostly dead.

I just had to reach out to plumbers for quotes. All of them are gmail-served. All I could do is refuse to share my email address and push them to use analog mechanisms. They are not hungry enough for business to alter their online workflow or create protonmail accounts.

[–] diyrebel@lemmy.dbzer0.com 2 points 1 month ago* (last edited 1 month ago) (2 children)

That’s exactly what I did with hushmail. I would tell low-tech folks to get a hushmail account then I would use hushtools.com to do all the key management, putting my key on the keyring and grabbing their key. So the other person did not need to know anything or take any special steps. That was best option of my time. But last time I checked hushmail was still entirely non-gratis.

Protonmail emerged when HM became non-gratis and messed with hushtools. But PM requires every one of their own users to do key management which creates a barrier to entry. I would have to walk a PM user through adding my key to my record in their address book and walk them through sending me their key. That effort is a show stopper for many. I might as well walk them through setting up a PGP-capable MUA. But then if they keep their gmail or MS acct the metadata still feeds those corps.

[–] diyrebel@lemmy.dbzer0.com 1 points 1 month ago* (last edited 1 month ago)

This simple answer is no doubt the most overlooked; probably as a consequence of the tyranny of convenience.. people too lazy to go to the library.

[–] diyrebel@lemmy.dbzer0.com 2 points 1 month ago (4 children)

I give out my XMPP address and offer Snikket accounts. Some go along with it and some do not. I lost touch with some friends. Some people are in contact via phone but that’s not ideal some connections are lost as phone numbers change.

I used to push some people toward Hushmail until they dropped the gratis plans. Then for a while I pressured people onto Protonmail but then distanced myself from PM when the brought in Google reCAPTCHAs and killed off Hydroxide. Tuta is a non-starter because Tuta’s variety of e2ee is incompatible with open standards, thus forcing me to periodically login to a web UI (also due to them sabotaging their Android app by way of forced obsolescence pushed in the most incompetent way).

So it’s a shitty state of affairs. 2024 and simply sending a msg to someone has become a total shitshow.

[–] diyrebel@lemmy.dbzer0.com 4 points 1 month ago* (last edited 1 month ago) (6 children)

I refuse to fund my oppressors

Bingo. I live by this philosophy.

Although more precisely: I refuse to ~~fund~~ feed my oppressors. The reason for s/fund/feed/ swap is that our oppressors profit from our data too. So e.g. I won’t even email a gmail user because my data would then feed Google (an oppressor because of how they dictate e-mail terms among other oppressions).

[–] diyrebel@lemmy.dbzer0.com 5 points 5 months ago* (last edited 5 months ago)

The others are right. Trying to stream from a torrent seems wasteful and complex.

But if you must for some strange reason, perhaps it would work to use webtor.io to produce an http-reachable audio file which could be curl/wget-fetched and piped to an audio decoder/player. I doubt you could make webtor fetch pieces linearly from the beginning. You would likely have to wait until the last piece is fetched to start streaming.

[–] diyrebel@lemmy.dbzer0.com 5 points 5 months ago

I’ve not fetched subtitles in a while but back when I did, I recall all the websites hosting them were extremely protectionist… more so than any other category of content on the web.

Of course the fix is to have torrents for the subtitle collections, perhaps by language.

[–] diyrebel@lemmy.dbzer0.com 2 points 7 months ago (1 children)

Hopefully he asks you to audit a tool you might enjoy using or contributing to.

[–] diyrebel@lemmy.dbzer0.com 1 points 7 months ago (3 children)

Sounds good.. will be interesting to see if @scratchandgame@lemmy.ml takes you up on the offer!

[–] diyrebel@lemmy.dbzer0.com 2 points 7 months ago* (last edited 7 months ago) (1 children)

lemmy.ml (formerly dev.lemmy.ml) was centralized by Cloudflare (after the renaming iirc). It was an embarrassment that the flagship instance was so antithetical to Fedi philosophy. Perhaps due to that well-placed criticism, lemmy.ml eventually dropped CF. But lemmy.ml is still today centralized by disproportionate size. There is also copious political baggage with those admins which has helped drive people off (thus beneficial shrinkage) but which ultimately enabled/led lemmy.world to become the biggest most centralized instance (which is centralized by both factors: Cloudflare and disproportionate size).

In the big scheme of things, AFAICT beehaw is federated and reachable from other Fedi-principles-respecting instances. I can reach it from other non-walled-garden instances I listed. Grouping beehaw with the walled garden instances is a weird place to draw a line. I’ve only heard about beehaw defederating from instances that are antithetical to the fediverse spirit. But I only know w.r.t the big instances.. feel free to point out counter examples. There probably wouldn’t be much chatter about defederation from small instances.

[–] diyrebel@lemmy.dbzer0.com 1 points 7 months ago* (last edited 7 months ago)

The biggest problem is self-contradiction. These two statements are incompatible:

  • “This [auditing] is NOT the most important benefit.”
  • “‘open source’ is good, firstly, because it permits auditing the source code”
[–] diyrebel@lemmy.dbzer0.com 1 points 7 months ago* (last edited 7 months ago) (6 children)

@loudWaterHombre@lemmy.dbzer0.com or @loudWaterEnjoyer@lemmy.dbzer0.com can audit for you.

Seriously, that’s what you’re missing. Bob the non-coder can trust Microsoft not to plant spyware in MS products, or Bob can trust some portion of the public (limited to ~8 billion people) to audit the code. It’s easier to trust the public than it is to trust a corporation. It’s not just about quantity of eyes, but having eyes that are more aligned with your interests.

 

Filled out the reg. form, filled out the CAPTCHA, and hit the “sign up” button which then turns into a spinner. The spinner never stops. Confirmation email never arrives.

Lemmy devs: please give output rather than just spinners. We have no way to know what is going on or how long it takes to process a registration form. We should receive error messages rather than a forever loop.

 

I click LOGIN, enter my username, tab over to the password field and as I’m entering the password the username clears. So then i have to go back to the username field and re-enter it.

It’s as if the page is still loading but as a final action in the loading process it clears the form. I’m not a javascript expert but it feels like excessive use of js for something that should simply be html.

#LemmyBug

 

Is this a good neutral place to spotlight poor moderation?

For example, my post to !asklemmy@lemmy.ml asked what is a decent client for Debian was removed (per rule #3). While at the same time this “What's the best Android/iPhone app for Lemmy?” is not only not removed, it was actually started by the moderator themself, and stickied. So this is a case of a moderator /above the law/ breaking their own rules which they selectively enforce.

In principle there should be a record of this sort of conduct so users know which moderators to avoid (thus which communities to avoid).

 

cross-posted from: https://lemmy.dbzer0.com/post/1491194

I would love if just once an admin of a fedi host under DDoS attack would have the integrity to say:

“We are under attack. But we will not surrender to Cloudflare & let that privacy-abusing tech giant get a front-row view of all your traffic while centralizing our decentralized community. We apologize for the downtime while we work on solving this problem in a way that uncompromisingly respects your privacy and does not harm your own security more than the attack itself.”

This is inspired by the recent move of #LemmyWorld joining Cloudflare’s walled garden to thwart a DDoS atk.

So of course the natural order of this thread is to discuss various Cloudflare-free solutions. Such as:

  1. Establish an onion site & redirect all Tor traffic toward the onion site. 1.1. Suggest that users try the onion site when the clearnet is down— and use it as an opportunity to give much needed growth to the Tor network.
  2. Establish 3+ clearnet hosts evenly spaced geographically on VPSs. 2.1. Configure DNS to load-balance the clearnet traffic.
  3. Set up tar-pitting to affect dodgy-appearing traffic. (yes I am doing some serious hand-waving here on this one… someone plz pin down the details of how to do this)
  4. You already know the IPs your users use (per fedi protocols), so why not use that info to configure the firewall during attacks? (can this be done without extra logging, just using pre-existing metadata?)
  5. Disable all avatar & graphics. Make the site text-only when a load threshold is exceeded. Graphic images are what accounts for all the heavy-lifting and they are the least important content. (do fedi servers tend to support this or is hacking needed?)
  6. Temporarily defederate from all nodes to focus just on local users being able to access local content. (not sure if this makes sense)
  7. Take the web client offline and direct users to use a 3rd party app during attacks, assuming this significantly lightens the workload.
  8. Find another non-Cloudflared fedi instance that has a smaller population than your own node but which has the resources for growth, open registration, similar philosophies, and suggest to your users that they migrate to it. Most fedi admins have figured out how to operate without Cloudflare, so promote them.

^ This numbering does /not/ imply a sequence of steps. It’s just to give references to use in replies. Not all these moves are necessarily taken together.

What other incident response actions do not depend on Cloudflare?

view more: next ›