stupid_asshole69 [none/use name]

  • 0 Posts
  • 34 Comments
Joined 1 month ago
cake
Cake day: March 3rd, 2025

help-circle
  • At least a couple of years ago, rd was looked down upon because users only share within the rd network so despite using torrent technology and maybe even torrent releases only subscribers get the benefits.

    If you want an off ramp from it, private trackers are easy to get into now. They want interviews where they give you the answers first and people still fail them.

    What are you torrenting and watching on?

    If you’re one of those people who just leaves their computer on at home all day you can go ahead and set up the arr stack in preparation for getting that pi5 you mentioned.

    No matter if you stick with rd or switch to something else: If you have a spare old computer lying around you can use that too. People will say “no, your power bill!” but the cost is almost always negligible and the hard drives you add for more storage will be the same power draw no matter what. For me, running twelve drives in an old gaming case with a 4th gen i5 comes out to a little under a buck more a month than my rpi3 in the same (not really, I couldn’t plug the sas expander and hba into it, but with the drives in a set of external enclosures) configuration. And the rpi was less stable. And less upgradable. And less powerful and less efficient as I started to use the cpu more.

    A free/$20 “junk” pc starts to look a hell of a lot better in the long term when it’s competing against a platform that can only be cheaper per month at idle.


  • Some third party headphones and stuff show up like this.

    Go ahead and shut down the apps you have open, restart the phone and once it finishes restarting, turn on lockdown mode, install any updates asap and then do the privacy check up.

    You want to restart to get before first unlock security back on, then turn on lockdown mode because a lot of device and inter process communication gets disabled and if the problem keeps coming back you’ll know to start looking somewhere else. You want to check for and install updates because updates contain security fixes. The privacy check up will tell you what stuff you’ve given access to various ins and outs of the phone and that may tell you something useful.










  • Please bear in mind that even if you were to figure out a process for torrenting without a vpn in a jurisdiction with a law against it that you don’t want to bear the repercussions of, you still need to seriously audit and understand your own security practices.

    Just last week, the guy who runs the website “have I been pwned”, which hosts a searchable database of credentials that have been found in data breaches, was phished and had to add the people on his mailing list to his own websites database of people who suffered from data breaches.

    This person is a security consultant to many organizations all over the world and operates one of the first resources used to figure out the breadth and depth of an individual or organizations exposure to leaks.

    There are many cases just like this ripped from the headlines example.

    If experts in the field cannot guarantee their own security, it follows that you cannot do so either and you may be well served by thinking critically about your own capacity to perform the research required to accomplish the task you’ve laid out for yourself.

    To put it more succinctly, and I have to ask that you read the following with as much kindness, understanding and warmth as possible:

    You are likely not capable of figuring this out for yourself in a way that keeps you safe from the law.

    Please be careful out there and make good decisions. Not everyone on Reddit or lemmy is an expert and many people don’t have your best interests in mind.




  • It’s funny, the thing that makes windows “easy” to use for big shops is the domain server and group policy. You start from the top and push everything down to client devices.

    Managing a Linux shop without the redhat tools is absolute hell. A decade and a half ago the usual response to a Linux user was “you’re on your own and it’s your responsibility if a software problem impacts your productivity”.

    Of course when I wax rhapsodic about how nice windows has become over the past years it’s because the ideas and capabilities of those tools for managing hundreds of users have trickled down to the individual user.

    What sucks is that the user experience of windows has shifted towards that of tablets. So you get a powerful enterprise backend with key features removed and the interface of a cell phone.

    Getting old ftw.







  • That’s probably a bad idea.

    Not only are you going from committing a crime in private to committing a crime in public, you’re putting yourself in one of the most vulnerable positions possible when it comes to computer security (every few months there are new attacks developed specifically to target users of free public wifi).

    Even if that wasnt a problem to you, businesses often have content blockers and traffic shaping to prevent you from torrenting and when they don’t you’ll be competing with everyone else actively streaming video and audio to their phones as well.

    It’s also trivial to figure out who’s torrenting on public wifi and has been for years.

    If you’re truly concerned about this new law then public wifi isn’t the solution.

    E: and if all that doesn’t convince you and you go through with it, you’ll be causing a problem that will actively make people look for you so the wifi isn’t completely jammed up.