Moonrise2473

joined 2 years ago
[–] Moonrise2473@feddit.it 2 points 12 hours ago

I think 5 years ago, on Ubuntu

[–] Moonrise2473@feddit.it 1 points 16 hours ago (3 children)

64 gb of ecc ram (48gb cache used by zfs) with 2tb drives (3 of them)

[–] Moonrise2473@feddit.it 5 points 19 hours ago (5 children)

I have similar speeds on a truenas that I installed on a simple i3 8100

[–] Moonrise2473@feddit.it 6 points 19 hours ago (3 children)

One day I had a power outage and I wasn't able to mount the btrfs system disk anymore. I could mount it in another Linux but I wasn't able to boot from it anymore. I was very pissed, lost a whole day of work

[–] Moonrise2473@feddit.it 7 points 3 days ago* (last edited 3 days ago)

it is now a non issue

IMHO it's still a big issue that might lead to data loss to someone else. The Windows client should be hardcoded to refuse syncing in onedrive folder.

~~Someone should reproduce this in a VM and open a GitHub issue~~

Edit: they already know this since a couple years, and the same happens on MacOS https://github.com/nextcloud/desktop/issues/4276

[–] Moonrise2473@feddit.it 3 points 6 days ago

Illegal but tolerated: just think to all the Chinese companies thriving on Facebook ads sales

They crack down on it only when they need to punish a specific target/person

[–] Moonrise2473@feddit.it 19 points 6 days ago (1 children)

When you enter China, you have to run their application on your phone to fill the immigration form. Way more convenient compared to the paper slip, right? 😉

It's this https://apkpure.com/zhong-guo-ling-shi/com.gov.mfa

Luckily, you don't need to install full malware but only medium malware, there's a way to run it as a web app inside tencent WeChat by scanning a special qr code.

I run this stuff inside insular because tencent is tencent and even on fully patched Android 15 without any file access permission they still manage to drop fingerprinting files disguised as images in /pictures/.gs_fs0

For connecting to my servers, technically ssh on standard ports isn't blocked (otherwise it would hurt their bots, no?) but I don't want to show my server IP address, so I use a hysteria2 proxy hosted on a Oracle VM in the Japan datacenter. There are services like doggygo that rent access to those proxys for literal pennies (like $2 per month) but payment need to do with alibaba's alipay or tencent wepay which is ultra traceable (linked to Chinese id+Chinese bank account+Chinese phone number) and very stupid. Honeypot?

There are reports of evil maid attacks where a secret service agent poses as room cleaner in your hotel room and tampers with your laptop when you're away, but for normal people this seems unlikely. Keep your electronics with you at all times, always use a VPN, check hashes of executables if really need to run them (better not) and you're going to be ok

[–] Moonrise2473@feddit.it 1 points 1 week ago

This could be an option but a little cumbersome to keep updated perhaps?

Debian on auto update with minimal packages lasts for years

Another option that I'm using is this:

  1. I do a encrypted backup with Borg on a separate drive on my server
  2. On my work desktop PC, Windows, at boot it connects via ssh and syncs that Borg backups on a new HDD that I purchased and installed, one way sync, silently and without prompts (We are a small business and I am allowed to do that, if you're not allowed to do that it could be your parents PC)
  3. Success syncs are pinged to healthchecks.io which emails me if after too many days (configurable) the sync hasn't been completed
  4. Errors are also sent to healthchecks.io
  5. Company group policy settings then keeps my backup server automatically updated
[–] Moonrise2473@feddit.it 48 points 1 week ago (2 children)

Using the Yuzu case for guidance, dumping encryption keys, regardless of the source of those keys, is illegal

This is false, as the case is non existant, because it has been settled out of court. It has to be proven in court that is illegal, as there's no law that says that dumping the keys from my own hardware that i paid with my own money is illegal.

[–] Moonrise2473@feddit.it 1 points 1 week ago (2 children)

At $12/terabyte/month it seems pretty expensive for media collection (I mean: family photos are irreplaceable but generic video?)

Other options are to use "glacier" tier S3 which is cheap to rent but ultra expensive to recover (but hopefully you won't need that)

Or just put a pi+HDD hidden somewhere at work/parents and copy to that

[–] Moonrise2473@feddit.it 3 points 2 weeks ago (1 children)

Nice try, openai bot (/s)

[–] Moonrise2473@feddit.it 12 points 2 weeks ago

Raid wasn't designed for data safety but to minimize downtime. Just swap the drive an continue operating the server seamlessly. Full backups are still required as the chance of complete failure isn't zero

 

A decade ago I used BitTorrent Sync. Then it became Resilio Sync. Then with Resilio Sync 2 they nerfed the free app to a point that I just removed that from all my computers and switched to syncthing.

Yesterday I was watching my server struggling when syncthing was doing the periodic scan of a directory with hundreds of thousands of files and then i thought, "maybe Resilio Sync uses less resources or doesn't waste time reindexing a static directory for the nth time"

I went to see their website and now with the new version 3, all the features are back. The business plan now is to sell the app to enterprises at unaffordable prices rather to persuade consumers to pay a subscription to self host their syncing server

I wanted to try it but now they say docker version is discontinued, need to install the package to bare metal. Ugh... So I desisted and decided to stay with syncthing

Now with the news of the impending discontinuation of syncthing android app, everything changes. Without Android support, syncthing is no more irreplaceable for me.

So, has anyone tried Resilio Sync 3? Is it good?

 

Intro: Webtoon is an app/website where (mostly Korean) comics are released in short episodes. Those episodes aren't released all at once but usually once a week, you have a free unlock a day and if you want you can have more by either watching an ad or by paying with coins, that are paid with real money. With the smallest purchase ($6), an episode can be unlocked with 3 coins (¢35) up to 7 (¢80). You can also skip the wait by paying with coins. I used it for years and I was ok by watching the ads at the end of each episode. It limited myself to one a day, otherwise I would scroll for hours. But, at the end of June 2024, they did the IPO, so that means ✨enshittification✨

So the guide on how to push away users to piracy:

  1. Have a scary reminder at the beginning of every episode that says that piracy is illegal. (I can't screenshot that without a rooted phone, it's blocked). This helps the user to have a daily notification that yes, this content is also available somewhere else and you're not bound to artificial limits.

  2. Put the last three episodes of a series started 3-4 years ago in perpetual paywall. No more "just wait one week to get the new episode". You want to see how that 200 episodes story that you're reading almost every day for 3 years ends? LOL pay $6 to buy a coins package!

  3. Now that the user is pissed that they can't know how the story ends, they'll just search it on the illegal sites, since over the past years they had to skip through 200 reminders that yes, this story is also available over there.

 

And it failed spectacularly.

We only needed a simple form, but we wanted to be fancy, so we used "nextcloud forms".

The docker image automatically updated the install to nextcloud 30, but the forms app requires nextcloud 29 or lower. No warning whatsoever. It's an official app, couldn't they wait that it was ready for NC 30 before launching it? The newsletter boasts "NC hub 9 is the best thing after sliced bread" yet i don't see any difference both in visual or performance compared to NC hub 2

Conclusion: we made our business to rely on nextcloud forms as a signup form, but the only reason we were using it was disabled who knows how many weeks ago.

 

Many users bought Resident evil for iOS because it was working offline. Perfect for long trips. But a new update adds a mandatory DRM online check at start-up.

I wrote bought, but actually the word is rented. One day Capcom stops updating the games (and this is 100% guaranteed) and a few years later the "owner" gets "This app needs to be updated to run on this iPhone"

Meanwhile, people who pirated a cracked ipa, don't get any issue in playing the game offline. DRM exclusively hurts the paying customers.

721
submitted 3 months ago* (last edited 3 months ago) by Moonrise2473@feddit.it to c/piracy@lemmy.dbzer0.com
 

One day many years ago I had too many drinks and being stupid and naive and I bought adobe cs5. I still use it on the same computer I installed it a decade ago. Activated and installed only once. Today they revoked the access to it. Clicking the link they say "revoked because purchased from an untrustworthy reseller"

Yeah... untrustworthy reseller, look at the invoice and see who sold&shipped that physical copy...

sold by adobe themselves

Contacted support, they said that they won't do anything about it because it's EOL.

Moral of the story: don't do like me. If buying isn’t owning, piracy isn’t stealing. Never give your money to Adobe.

 

TL;DR: for a whole decade YouTube allowed a copyright troll to claim all the rights on a recording of a washing machine end cycle chime

The account of the copyright troll is still standing and it's not permanently banned

IMHO in this case YouTube should permanently ban at the first offense any copyright troll that maliciously claim as their property something that's in the public domain

Also: if it wasn't that it affected a big streamer with lots of followers, YouTube would have ignored the problem

 

I've enough.

Last year the automatic updater was rebooting windows without any warning after the uac prompt. The problem continued for months before being fixed

This year I got an update a week. Very annoying to get the same "why u no reboot? I need updates" question every single time I turn on my PC.

Today when updating it kills explorer.exe without any confirmation and doesn't bring it back to life.

I don't think that their paid enterprise customers are doing the ~~beta~~ alpha testers like this. Is it really necessary to push nightlies to end users? It can't be tested casually for a couple of days then pushed?

I disabled the updates check and will update the nextcloud desktop client manually every 5 years if I can remember. Added an exception to Winget so it doesn't update it. I lost my patience.

 

It's a 8th gen Intel laptop CPU with 64 GB of ddr4

Definitely a bargain!

 

I want to try bitmagnet on the dev server at work (yes, we have permission to use it for personal reasons as long it's legal) but for obvious reasons it must be tunneled through a VPN.

Bitmagnet it's a local search engine that discovers content via DHT. It just asks peers for content, then when you come back the following month it should have found many interesting stuff

Problem is that from a network point of view it looks I want to download every single torrent ever made so I wouldn't want to have my workplace ip address associated with that.

Because the network traffic is minimal and for this content I don't care if the provider does data mining, I would like to use a free VPN with gluetun.

But I can't find a free one that works. From the officially supported only windscribe and proton have a free offer, but windscribe free doesn't have OpenVPN or wireguard, while proton VPN free blocks me immediately as soon as the program talks with other peers, even if I don't actually download anything.

So back to the question, which free VPNs are working with gluetun, someone has experience with that?

 

AAAD it's a freemium sideloaded app that allows you to install unofficial apps for Android auto.

At startup it sends some device identifier to his server and checks if you have a license, otherwise goes in trial mode where you can try one app every month.

It doesn't ask any additional permission. No storage, no phone/IMEI and no location. If you uninstall it, somehow it knows you previously downloaded it.

Tried to reset the advertising id, no change

My questions:

  1. How the hell the app is able to fingerprint the user like that, persisting uninstalls?

  2. How to reset the counter?

 
 

I am running this docker image: https://github.com/nextcloud/docker with a cloudflare tunnel, meaning the webserver would see all the traffic coming from a single ip in 172.16.0.0/12 .

The documentation says:

The apache image will replace the remote addr (IP address visible to Nextcloud) with the IP address from X-Real-IP if the request is coming from a proxy in 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16 by default

So I thought that this is a not a problem, as other docker images can also automagically figure out the real IP address from traffic coming from cloudflare tunnels.

In the beginning it worked fine, then it was SLOW. Like 2 full minutes to load new feeds on news, waiting ages to complete a sync, and so on. I rebooted the server on those instances, and then it worked fine for a day.

So because at the time i was running it on unraid, i blamed the lag on that OS + my weird array of HDDs with decades of usage on them. Migrated to debian on a nvme array and... same lag!

Wasted hours trying to use caddy+fpm instead of apache and it's the same, worked fine for a day, then it was slow again.

Then I wondered: what if the program is "smart" and throttles it by itself without any warning to the admin if it thinks that an ip address is sending too many requests?

Modified the docker compose like this:

  nextcloud:
    image: nextcloud

became

  nextcloud:
    build: .

and I created a Dockerfile with

FROM nextcloud
RUN apt update -y && apt upgrade -y
RUN apt install -y libbz2-dev
RUN docker-php-ext-install bz2
RUN a2enmod rewrite remoteip
COPY remoteip.conf /etc/apache2/conf-enabled/remoteip.conf

with this as the content of remoteip.conf

RemoteIPHeader CF-Connecting-IP
RemoteIPTrustedProxy 10.0.0.0/8
RemoteIPTrustedProxy 172.16.0.0/12
RemoteIPTrustedProxy 192.168.0.0/16
RemoteIPTrustedProxy 173.245.48.0/20
RemoteIPTrustedProxy 103.21.244.0/22
RemoteIPTrustedProxy 103.22.200.0/22
RemoteIPTrustedProxy 103.31.4.0/22
RemoteIPTrustedProxy 141.101.64.0/18
RemoteIPTrustedProxy 108.162.192.0/18
RemoteIPTrustedProxy 190.93.240.0/20
RemoteIPTrustedProxy 188.114.96.0/20
RemoteIPTrustedProxy 197.234.240.0/22
RemoteIPTrustedProxy 198.41.128.0/17
RemoteIPTrustedProxy 162.158.0.0/15
RemoteIPTrustedProxy 104.16.0.0/12
RemoteIPTrustedProxy 172.64.0.0/13
RemoteIPTrustedProxy 131.0.72.0/22
RemoteIPTrustedProxy 2400:cb00::/32
RemoteIPTrustedProxy 2606:4700::/32
RemoteIPTrustedProxy 2803:f800::/32
RemoteIPTrustedProxy 2405:b500::/32
RemoteIPTrustedProxy 2405:8100::/32
RemoteIPTrustedProxy 2a06:98c0::/29
RemoteIPTrustedProxy 2c0f:f248::/32

and now because nextcloud is seeing all the different ip addresses it doesn't throttle the connections anymore!

view more: next ›