brownmustardminion

@brownmustardminion@lemmy.ml

This profile is from a federated server and may be incomplete. Browse more on the original instance.

brownmustardminion,

Your question is a good one. I’m not the one who downvoted you fyi. To answer your question, it is absolutely a personal anecdote based on my own experimentation. I’m sure others will add their own experiences. Based on my experiences there’s no doubt about twitch shadowbanning based on VPN use. I’ll admit I don’t have a basis for Linux and adblockers being a part of the equation, but I made it clear in my original post that those were assumptions.

To further speculate, I have an idea that the shadowban may actually be triggered by somebody using the same VPN server doing something that triggers it, affecting anybody else on that server. I can’t possibly provide evidence for that theory, but it would explain the seemingly random nature of the shadowbans.

brownmustardminion,

It’s trivial for twitch to differentiate between users who are logged in and have verified accounts. Slapping bans by IP is archaic and lazy when you have more precise metrics to go by. And at the very least, they should make you aware that you are banned before accepting your money for their services.

brownmustardminion,

I’ve only experienced a shadowban while using ubuntu. I switch between all the major operating systems on the same twitch account and with the same vpn service/servers. The bans have only been initiated while on linux, although they did follow over to the other OSes until some type of timer was passed.

This follows what some online shopping services do, which is to assign weights to certain user metrics and if a set threshold is crossed it rejects your payment or otherwise blocks you from a transaction. So VPN+MacOS might work but VPN+Linux matches some type of metric fraud systems associate with criminals.

brownmustardminion,

I’m curious to hear the opinion of those downvoting this response. It seems off brand for privacy enthusiasts to disagree with my take on IP bans.

brownmustardminion,

Think of it from the reverse direction. If you have a twitch account in good standing that’s verified with a valid email and has no violations, why all of the sudden would it make sense to apply a ban to this account? Perhaps preventing new accounts from being created on a sketchy IP could be a sensible solution, but shadowbanning an existing account makes no sense and is a lazy approach to security. In addition, fingerprinting makes it so a service can easily differentiate between users using the same IP.

brownmustardminion,

I have not. I try to avoid apps if I can.

brownmustardminion,

Got an alternative that isn’t youtube?

brownmustardminion,

Maybe I’m missing something but you can tell a compromised account from a secure account by the user behavior, no? If an account is compromised the activity will be spam/harassment, etc at which point a ban on that account would happen. And compromised accounts could be accessed from a non-vpn Ip also.

brownmustardminion,

When you detect a compromised account you could put a freeze or lock on it. If there are that many compromised logins that constant account swapping is an issue then twitch needs to overhaul their account security.

brownmustardminion,

Is it the privacy community in general or Lemmy that’s gotten infiltrated by all of these antagonistic socially inept 15 year olds recently? Never started a thread on Lemmy that’s gotten so many unsupportive and useless responses before. And I’m active on piracy subs…

brownmustardminion,

I would suggest trying wireguard first as it’s much less complex to set up. Once you have a handle on that, you might consider moving to a mesh network. I personally would love to use a mesh network, but have not been able to get it configured correctly the few times I’ve tried.

brownmustardminion,

Forwarded mail but it may be two way in the future so it would probably be smart to just go that route from the beninging.

brownmustardminion,

I ended up going with migadu. Seems great so far. Already up and running with 3 domains and dozens of aliases.

brownmustardminion,

Problem solved. The firewall was attempting to pass traffic through the default gateway. You have to create a firewall rule to allow whatever traffic you want but in the advanced settings you need to select the wireguard gateway instead.

brownmustardminion,

amazonads has already been blocked but I just blocked amazon and waiting to see if that does the trick.

brownmustardminion,

I’m using a pretty good VPN and I still get ads.

brownmustardminion,

I tried a couple but had no luck running them in VMs so I gave up.

brownmustardminion,

Yep. Also as extra protection from any phoning home to Topaz. It’s not possible run the software firewalled, since it needs to download the AI models once you try to run anything.

brownmustardminion,

I haven’t.

brownmustardminion,

It’s really that much of a hassle to fiddle with the volume sizes?

brownmustardminion,

You suggested just adding the ISOs to local-lvm. Do you think it would be feasible to simply delete the local storage completely and then extend the local-lvm after, storing the ISOs there? I know extending volumes is much simpler than shrinking. And I imagine deleting completely is also easier than shrinking?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • InstantRegret
  • magazineikmin
  • thenastyranch
  • modclub
  • everett
  • rosin
  • Youngstown
  • slotface
  • ethstaker
  • mdbf
  • kavyap
  • osvaldo12
  • DreamBathrooms
  • anitta
  • Durango
  • ngwrru68w68
  • tester
  • khanakhh
  • love
  • tacticalgear
  • cubers
  • GTA5RPClips
  • Leos
  • normalnudes
  • provamag3
  • cisconetworking
  • JUstTest
  • All magazines