pwalker

joined 1 year ago
MODERATOR OF
[–] pwalker@discuss.tchncs.de 3 points 3 months ago

At least link the full article and not just the headline... smh. Here is also the follow-up article with comments from Firefox's CTO. https://www.heise.de/en/news/Firefox-defends-itself-Everything-done-right-just-poorly-communicated-9802546.html

[–] pwalker@discuss.tchncs.de 7 points 3 months ago (1 children)

Honestly mentioning Enchrochat together with other mainstream message clients is kind of misleading. The Enchrochat message client was also E2EE. However Enchrochat was also a company that sold their own mobile phones with a prorietary OS on it together with own sim cards and only those phones were able to connect to each other. And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs. At that point there was no western government that didn't want to help seizing their infrastructure and taking over their update services for example.

The bigger problem however for the general public is that certain politicians want to break encryption all together by forcing companies to implement backdoors on client side. This has been an ongoing discussion for 2 years in EU parliament and it has to stop: https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control

[–] pwalker@discuss.tchncs.de 2 points 3 months ago* (last edited 3 months ago)

I guess with some imagination you could say the muzzle does indeed look dog like but the rest? I mean even if you morph some reptiles into humans you'd get such kind of muzzle. It's not really that "distict" imo, but I get why some would say otherwise.

"Kobolds were first described as hairless humanoids with small horns by Gygax in the Monster Manual (1977)"

https://en.wikipedia.org/wiki/Kobold_%28Dungeons_%26_Dragons%29?wprov=sfla1

[–] pwalker@discuss.tchncs.de 11 points 3 months ago (3 children)

Found a really good source including a picture of the first edition. It looks like that they were mentioned indeed in the 2nd edition to be more dog like in a sense of voice "yappin like a dog" and smelling like damp dog. Their visuals however were not really dog like. So I assume it was maybe both a mistranlation and an over interpretation of some texts from 2nd edition or just pure free choice from the author of this anime. https://www.belloflostsouls.net/2022/01/dd-monster-spotlight-kobolds.html

[–] pwalker@discuss.tchncs.de 3 points 3 months ago

Well just recently researchers discovered a campaign installing backdoors on iPhones using a chain of several 0-day expoits or in this case using also 0-click exploits, where no interaction from a user is needed. However those attack chain are so advanced that practically normal law enforcement would never be able to do it. But theoretically yes some well equiped state actors are able to infect you without noticing. If you are really intrested to see how advanced these attack are search for "project triangulation" or watch the recording from last years chaos computer conference: https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=373

[–] pwalker@discuss.tchncs.de 2 points 3 months ago

thank you for stepping up, I tried to connect with @Alchemy@lemmy.world earlier this year to talk about community topics but I think they are inactive

[–] pwalker@discuss.tchncs.de 1 points 3 months ago* (last edited 3 months ago)

definitely Progressivist is the most active mod and I agree. There is no rule yet but maybe you'll get into trouble with instance admins posting 100s of picture at once. I think with some common sense you should be fine. Maybe just post your top 10 pictures or strecht it over a period of time so that we get a picture from you each day/week for example

[–] pwalker@discuss.tchncs.de 1 points 4 months ago

165166320 here

[–] pwalker@discuss.tchncs.de 4 points 6 months ago

Found another article analysing this incident and how unlikey it is that the car wash itself caused the screen brick and that Tesla screens generally can run somtimes into those errors and resetting it ususally worked in other Teslas: https://cleantechnica.com/2024/04/18/whats-going-on-with-the-tesla-cybertruck-that-wouldnt-work-after-a-car-wash/

[–] pwalker@discuss.tchncs.de 2 points 7 months ago

I'm not aware there is such a list. Logically it's mostly small countries where they speak their own languages where no big corporations that produce ads have any interest in. You probably will find some comment like mine where they mention certain countries but this can always change any day. Sometime there is a single advetiser in a country but even then you will see their ad much less frequently than the common US/English based ads.

I can recommend you the Nord Vpn Firefox addon which allows you to only use vpn for certain domains which would be anything with *.twitch.tv

[–] pwalker@discuss.tchncs.de 21 points 7 months ago* (last edited 7 months ago) (4 children)

Same as on other platforms twitch ads are location based or in this case ip geo location. They are notoriously fighting ad blockers and have long been opting into ad stream injection which is why most common ad blocking techniques won't work. Basically after all the custom script solutions, like vaft script, started failing l started testing around with VPN taking advantage of the location based aspect of ads. Basically there are countries where noone is paying for running ads. E.g. Czech republic. So basically the most secure way to block ads on twitch is Vpn to certain countries. However I noticed that you need to use IPs from that country for about a day. It seems they are caching your Ip for some but after that you wont get any ads. You can read about all known ad solutioms of twitch here: https://github.com/pixeltris/TwitchAdSolutions

Also this does not work with the twitch mobile app and neither with the mobile version of twitch in a mobile browser. However it does work when switching to the desktop version in your mobile browser. So desktop version while using vpn on your phone should work. At least when I tested it last.

 

I normally don't use Firefox very often but wanted to give it a try again. My usual default browser would be Vivaldi (which is unfortunately Chrome based). Anyway I usually have turned on my NordVPN system wide (Windows 10 Edu V. 22H2), which works fine on Vivaldi. I turns out it does have a weird side effect on Firefox. The DNS resolution for "google.com" just doesn't work anymore. Any http request runs into a timeout. Strangely it works on any other google domain like google.de or google.org, also I couldn't find any other domain to reproduce this behavior. Now this wouldn't be such a big deal if google's reCaptcha wouldn't also be used by a lot of webpages and the api is hosted on google.com so basically the reCaptcha box just never appears and I'm stuck on those pages.

I tested it with v. 123.0 (64-bit), in private mode, in safe mode, FF portable 115.8.0 ESR and it is all the same strange behavior.

NordVPN also does have a FireFox Extension and using this extension everything works again.

Also tested it with the FF MacOS version and NordVPN client, here it works.

I can't really explain this behavior other than some weird Firefox behavior together with NordVPN or some interaction with the Windows 10 vpn layer.

Can someone confirm this behavior on Windows? I assume other VPN providers like Mozilla VPN don't have this?

[Update]: Forgive me it was late yesterday. I still can't explain the behavior exactly but for sure the reason is the split tunneling feature of NordVPN. I had it enabled as I only wanted certain apps to go through the VPN and Firefox wasn't on that list. So actually the NordVPN client should have treated FF routed through my default system connection and FF should just not have been routed through the VPN. Now it is more likely that it is some split tunneling bug that for whatever reason the google.com requests are treated differently by NordVPN/FF and are kind of blocked on my side or wrongly routed and never reach the google server.

[Update2]: As @LucidBoi@lemmy.world noted in the comments, the problem is not only related to Firefox and therefore wrong in this community. It actually also works on other browsers as well. It seems to be a problem of the windows NordVPN client and/or Windows 10. As soon as you use the split tunneling feature and exclude a browser from it, suddenly google.com doesn't work anymore. Very strange, but that's it. Actually for Firefox you should just use the NordVPN add-on anyway as it gives you a lot of flexibility to use split tunneling per domain, which actually works also for google.com then.

144
submitted 9 months ago* (last edited 9 months ago) by pwalker@discuss.tchncs.de to c/pics@lemmy.world
 
view more: next ›