marxismtomorrow

joined 1 week ago
[–] marxismtomorrow@lemmy.today 2 points 6 hours ago (1 children)

Okay, universally disregarding ultra-nationalist nazi types that believe eastern europeans are subhuman heathens, which I don't consider to be worth considering.

The only real point of contention in the 'eastern european' designation amongst the czech population is those that are so incredibly racist they still don't consider romanians a civilized species and refuse to be lumped together with them in any way.

[–] marxismtomorrow@lemmy.today 1 points 6 hours ago (1 children)

Oh I see, you think musk is only a wannabe pedophile. Grok says otherwise.

[–] marxismtomorrow@lemmy.today 4 points 7 hours ago (4 children)

Czechs are pretty universally considered eastern European, so yes, absolutely. It's not about geographic position, it's about what side of the the wall they fell on. The side of the nazi appears or nazi killers.

[–] marxismtomorrow@lemmy.today 4 points 7 hours ago (3 children)

Zuckerberg and Gates own the only other mainstream social media sites. While the fediverse is neat, the entirety of all federated services, including the pretty failed launch of bluesky, is less than the userbase of just facebook, in just the Philippines.

And both of them are pedophiles, and while I don't know if Gates is a nazi, Zuckerberg absolutely is.

Also reddit, I guess, u/spez is a nazi, and reddit had the longest running clearweb jailbait site in world history so...

[–] marxismtomorrow@lemmy.today -1 points 8 hours ago

No one says it's a zero sum but you people always assume it's a shitty government without any real information to back that up besides NED-written or sponsored articles.

Like if you admit the US sucks, why believe their propaganda?

[–] marxismtomorrow@lemmy.today 1 points 8 hours ago (2 children)

Type china into a search engine. Guaranteed it returns a negative sounding article.

[–] marxismtomorrow@lemmy.today 12 points 9 hours ago (6 children)

Name one single mainstream (i.e. >10 million users) platform that isn't owned by a nazi pedophile billionaire.

[–] marxismtomorrow@lemmy.today 102 points 9 hours ago (23 children)

She's from eastern Europe in the 1970s and was a model from a young age. it would genuinely be a complete rarity if she wasn't directly a part of (either as a victim or a perpetrator) at least a few Epstein-like rings. Her intelligence community ties make that even more of a certainty.

[–] marxismtomorrow@lemmy.today 16 points 2 days ago (1 children)

Victims are always the good guys.

Iran did nothing to provoke this war, and Iran has only targeted the infrastructure that has been targeted by the US and Israel.

They have allowed the Amerisraeli Empire to dictate the legal targets of war, and the escalation path of war.

[–] marxismtomorrow@lemmy.today 28 points 2 days ago (6 children)

All things all governments release or effect, and all things produced to generate or provoke thought are propaganda.

Just this time the propaganda happens to be from the good guys in a conflict against one of the most evil empires in world history.

[–] marxismtomorrow@lemmy.today 8 points 5 days ago

I've never heard of reticulum before now, and only spent a few minutes going over their overly philosophized website, but I do have a degree in networking.

tl;dr Don't do it.

It's an amnesiac mesh network, or in an analogy, it's like if you're in a crowded room and can only see the person next to you, but you're sure someone you know is also in the room, so you pass a note to everyone next to you hoping it gets to the person you want.

This is inefficient for large scale data transfer, to say the least, but does theoretically fit their stated purpose of an anonymizing network to transmit information.

But this brings up two problems:

1.) In a normal network, even Tor or I2P, information flows along a path one hop at a time, with each hop knowing which path to send your information down next. i.e. Person A only knows Person B and sends your note to them, Person B knows lots of people but only sends your note to Person C, because Person B knows the note is intended for Person F, and that's how you get there, and so on. With this network, Person A sends a note to Person B, Person C, Person D, Person E, Person F, hoping that one of them knows how to get to Person F. Each individual contacted then goes 'Am I person F? No? Then I need to send it to every person I know, except who I just got it from.' There are rules in place, supposedly, to keep this from becoming an infinite loop, but still that's potentially 100x or a 1000x the amount of traffic for every single packet, every single part of any file sent on the network.

a 100MB file split into 10,000 packets would result in 10,000,000 or more packets being sent over the network.

This is fine, theoretically, for legitimate text communication that would never reach more than a few MB per item, but torrenting even the smallest movie would be like a tsunami every single time.

There are few rules and safeguards built in to make this slightly more efficient than the scenario and analogy I just laid out, but it's infinitely less efficient than the IP layer so you want the data kept to a minimum given the much, much higher overhead.

  1. On network torrenting might work (with the problems mentioned above), and routing through the network as that VPN solution might work (assuming the peer at the end, literally someone else's computer, allows it *3) You'd have incredibly slow speeds. Even assuming there is route caching somewhere in the documentation that I missed which would massively increase efficiency, you'd be generating a whole lot of noise and unnecessary connections with each packet sent to each peer, which would slow down the entire network you're connected to, and might crash some transport nodes if enough people have their torrent clients set up with high peer discovery numbers.

3.) this is not a private connection when you come out on the other side. Computer A <=> Reticulum Network <=> Computer B -> Internet would be the general configuration, and both computer A and computer B would have full knowledge of the contents of the information being sent, which also means Computer B's ISP has the full knowledge of the contents of the information being sent.

For torrenting, this might mean computer B learns a lesson about hosting what is essentially an exit node for anonymous networks -- i.e. their ISP shutting off their service for piracy. While this is good for you, Computer A, it's a dick move.

For more nefarious purposes Computer B would know what traffic they're exposing and could snoop on it, just not know where it's from. This is the Tor problem and there's plenty of ways to keep yourself safe from it, but it's still something to keep in mind if you do actually naughty things with your connection like the protocol authors want you to be doing. (i.e. anything illegal in a country that a state actor would actually care about). This comes down to opsec but the best solution would then be to simply never leave the reticulum network, making the 'vpn' you pointed to conceptually worthless for the network's stated purpose.

4.) I've not been able to find a single actual security audit or even a implementation project, given this is (or can be) a localized mesh network, this wouldn't be hard to do. This means no one should trust this beyond sending an anonymous love note to a nerdy colleague. Anything that might be entered into evidence in any court should stay off the platform.

view more: next ›