- 6 Posts
- 8 Comments
shrewdcat@lemmy.zipto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•FBI Seizes Gaming Piracy Domains Including 'Pre-Release' Target NSW2UEnglish6·1 month agoOr usually the ones behind the problems = FBI & CIA.
shrewdcat@lemmy.zipto News@lemmy.world•Detained as an illegal immigrant – MAGA mom still has faith in Trump's mass deportation plan22·1 month agoHorrendous, not that hard to figure out. Sure wish we had a party that wasn’t controlled by oligarchs and their corporations running the show.
shrewdcat@lemmy.zipto News@lemmy.world•Detained as an illegal immigrant – MAGA mom still has faith in Trump's mass deportation plan13·1 month agoDid I say Trump was the answer? I am just saying you have to understand why the working class did what they did.
shrewdcat@lemmy.zipto News@lemmy.world•Detained as an illegal immigrant – MAGA mom still has faith in Trump's mass deportation plan37·1 month agoTrump is an evil narcissist, but I don’t fault the working class for leaving the democrats and voting for him. He was promising them (falsely) progressive ideas, like bringing jobs back, fixing the healthcare system. Of course he doesn’t really care about that or will do it, but he was the only one talking about it. It always boils down to the economy though, and Biden’s economy was horrendous, people, the working class were hurting and all Kamala gave us were platitudes, no substance, no solutions to what mattered to them.
Just a conversation opener, relax. Only one here shaking a fist in the air is you.
shrewdcat@lemmy.zipto Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•self-hosted i2p+qbittorrent beginner quickstartEnglish1·1 month agoI remember reading about I2P back in the day. I am old school. If my old memory serves me correctly, I think there are some vulnerabilities with using I2P instead of say a VPN? (Now, I am going to have to go down that rabbit hole again to refresh my memory.)
Edit to add; The list below describes some of I2P’s main disadvantages.
-
Complex configuration process: It necessitates a drawn-out installation procedure and specific browser settings.
-
Must-have logging: The I2P user interface must be logged in for users to access their material.
-
Severe vulnerabilities: Over 30,000 users were made vulnerable by a zero-day vulnerability that I2P experienced in 2014. Later, a 2017 study found that several more I2P flaws may also be exploited.
-
A much tiner user base than TOR: As a result, I2P has fewer network nodes and servers and is more open to intrusions.
-
Less anonymity when browsing indexed sites: I2P does not ensure that users’ browsing of indexed sites is completely anonymous. The use of VPN services may be able to address this issue.
There was an exploit last May, however, if one is not able to fork over money for a VPN, I2P is a good alternative for a free option.
-
I get the convenience, I really do, and works on every linux distro which is a plus, but I usually stay clear of them because of the bloat. Maybe that is a misconception on my part. I should preference that with the fact I use Arch (btw)…so AUR usually has everything I need.
If he starts talking about Epstein, how long before we find him hanging over his bathtub? “Suicide.”