Should I be concerned before I share a video I downloaded from a site I needed to log in to with a username and password? Does the file I have include data that references my account? If so is there away to remove it before I share it?...
Streaming sites can embed an unhearable data stream into audio signal. It’s possible
That being said, it’s extremely improbable, given the costs to do it at scale.
If you’re part of a large company’s beta program and have access to some unreleased product, maybe worry.
If you grabbed a file from some mega host updown whatever site, don’t worry.
And if you’re still worried, take a sha256 hash and put it into google search. If you get any results that even mention your file’s title, then you’re good.
Spread-spectrum audio watermarks will survive multiple re-encodings and are extremely difficult to detect.
Iirc google widevine will embed a device code, and if a pirated copy of some content is found, they will blacklist the gpu’s device code so it can’t receive 4k content anymore. That’s video, but it’s the same idea.
I especially enjoy the lemonade subplot, which, while never directly integrating, weaves throughout, juxtaposing and accentuating the finer details of the main plotline.
I tell my laptop to put the video in the vga port. It does. That’s it. There’s nothing plugged in, but it’s there.
I plug a vga cable in. There’s video in there now. With enough paperclips, I could get it out the other end. My laptop does not care. It wiggles the electrons regardless.
I plug the other end of the cable in. The shielding was eaten by mice and two pins are dead. But alas, lo and behold, purple tho it may be - the video comes out and is displayed.
Meanwhile, hdmi protocol negotiation wants to know if you’d like to set your screen as the default sound device. Not that teams would use it anyway. Actually nevermind, the receiving end doesn’t support the correct copyright protection suite. Get fucked, no video for you.
I’m very new to home networking. I’m not new to computers (hardware or software) - but for whatever reason, anything network-related has always been an enigma to me....
Networking is super simple - or at least it started out like that. Then we ran out of numbers, and had to invent nat. Then we invented ipv6, which has lots of numbers, but is unfathomably complicated.
I recommend learning about NAT / network address translation. NAT is not a stateful firewall, but acts kinda like one.
You can understand a stateful firewall by understanding the tcp handshake. TCP is hugely important. Don’t worry about fin_wait_2 and that nonsense, just get syn/synack/ack down.
People will brush off udp because it’s easier, but it’s also important.
Once you get NAT/stateful firewalls, I would look into wireguard. That’s the protocol underneath tailscale. Know that it wraps your tcp packets in an encrypted udp datagram. Then find out how tailscale sets up your wireguard connections without port forwarding - or don’t, as webrtc-style signaling is famously impossibly complicated.
Here’s what you should do - spin up all the services you want, but put them behind an nginx reverse proxy. Then put that behind a WAF. Getting those layers aligned will teach you a huge amount of useful stuff.
In general, don’t worry about hackers unless exposing a port to the internet. Then worry. Your router’s stateful firewall will do a good job until you poke holes in it.
If you want a cool side project, listen on port 20 and dump the characters that the web scanners send to you. If they don’t send anything, send a username prompt after the tcp handshake - the robots will give you the login creds that they try against weak boxes :)
You’ll want to learn the difference between SAS and SATA connectors. You can very probably use either. 3.5 inch is the “standard” size, while 2.5 inch was more popular for laptops. However, in the interest of density, servers started accepting 2.5 inch drives to fit more drives per rack.
You can get great deals on used sas drives on ebay, but if you don’t know how to monitor s.m.a.r.t. data / rebuild a zfs array, that can be very very risky. You need to be able to survive concurrent disk failures.
Honestly your best bet is brand new western digital or seagate drives. Buy them on amazon, but double check that the seller is legit. That’s it.
I recommend 3.5s - they’ll be a little cheaper and a little more readily available. It’s also worth noting that sata drives can plug into your SAS controller, so you can use any and all 3.5” drives that you can find :)
I quite new to web development. I created a simple game which suppose to raise awareness to the RP syndrome (which I suffer from). The simple goal is to find Waldo but the twist is that there is nothing but him on the screen....
I would use z-indexes to setup the layering. Have a base layer, the “filter” layer, and then the ui on top.
Basically 3 divs, with z-index 1/2/3 respectively. Put elements on the base layer or ui layer based on if you should see them always or not.
For the filter, I would do an svg of a rectangle, big enough to cover the screen, and a hole in it. Then use js to set the svg’s position relative to the mouse.
The svg could easily be made transparent, black, or even get that fade effect around the edges.
To know what I am talking about, let me give you an example. I have this friend who went crazy over the vaccine issue. She’s done so much research into it that I feel like I can’t talk to her about her vaccine skepticism. Whenever I start to talk about something, she would drown me with a ton of articles and youtube videos...
This is exceptionally well stated. I saw my parents, myself, and every reddit/lemmy/twitter thread I’ve ever read, in your description.
So much online conversation isn’t conversation at all; it’s posturing; saying something completely irrelevant that attempts to paint the “opponent” into an indefensible corner. The best response, then, also doesn’t respond, and does the same - end result being two people just saying stuff at each other.
We need not wait for marginalized groups to be impacted to decry T1 ISP censorship. Ban whatever speech you want; the method of enforcement should be to arrest the perpetrators - not stop the sale of paper, the delivery of mail, or blocklist class A ip ranges.
On a more philosophical level, this is the question of “kindergarten policy” - do we punish those who crayon on the walls, or do we take away everybody’s crayons. To punish the ability to do wrong, or the act of doing wrong. Like most philosophical questions, there’s no good answer to this.
Microsoft is bringing popular programming language Python to Excel. A public preview of the feature is available today, allowing Excel users to manipulate and analyze data from Python....
The same question was archived on r/trackers. Would like to get notified when a compatible tracker is available for testing, it’s not even clear if there is an implementation just yet....
I can’t speak to current state; but with any luck we are approaching / entering the post-tracker era. DHT handles the actual “tracking”, and other components are (very slowly) coming out to handle search and reputation.
DEF CON Infosec super-band the Cult of the Dead Cow has released Veilid (pronounced vay-lid), an open source project applications can use to connect up clients and transfer information in a peer-to-peer decentralized manner....
Nostr has some very solid ideas; but imo all their reasons for using websockets were solved with http/2 - which would have also provided a crud and mime-type model, that they have since had to reinvent. Nostr has a ton of potential though, despite that.
Last Chance to fix eIDAS: Secret EU law threatens Internet security — Mozilla (last-chance-for-eidas.org)
Sharing files from authenticated sites
Should I be concerned before I share a video I downloaded from a site I needed to log in to with a username and password? Does the file I have include data that references my account? If so is there away to remove it before I share it?...
Strap in baby (startrek.website)
*Permanently deleted* (i.ibb.co)
New to home networking - Security advice?
I’m very new to home networking. I’m not new to computers (hardware or software) - but for whatever reason, anything network-related has always been an enigma to me....
deleted_by_author
How safe it is to use I2P for torrenting? (geti2p.net)
ich🎆iel (discuss.tchncs.de) German
Adding "flashlight effect" but with white "darkness"
I quite new to web development. I created a simple game which suppose to raise awareness to the RP syndrome (which I suffer from). The simple goal is to find Waldo but the twist is that there is nothing but him on the screen....
What a time to be alive (feddit.de)
Is it really too much to ask? (startrek.website)
New stroganoff research just dropped (sopuli.xyz)
Your Brain Is Not an Onion With a Tiny Reptile Inside (journals.sagepub.com)
It's an experience (lemmy.zip)
F*cking guy... (ttrpg.network)
Please discuss. (lemmy.ml)
The loss of certainty in one's one abilities and the lack of trust in institutions
To know what I am talking about, let me give you an example. I have this friend who went crazy over the vaccine issue. She’s done so much research into it that I feel like I can’t talk to her about her vaccine skepticism. Whenever I start to talk about something, she would drown me with a ton of articles and youtube videos...
ISPs Should Not Police Online Speech—No Matter How Awful It Is. (www.eff.org)
Microsoft is bringing Python to Excel (www.theverge.com)
Microsoft is bringing popular programming language Python to Excel. A public preview of the feature is available today, allowing Excel users to manipulate and analyze data from Python....
Is there any Bittorrent V2 tracker? (www.bittorrent.org)
The same question was archived on r/trackers. Would like to get notified when a compatible tracker is available for testing, it’s not even clear if there is an implementation just yet....
Veilid: A secure peer-to-peer network for apps that flips off the surveillance economy, created by Cult of the Dead Cow [DEFCON_31] (www.theregister.com)
DEF CON Infosec super-band the Cult of the Dead Cow has released Veilid (pronounced vay-lid), an open source project applications can use to connect up clients and transfer information in a peer-to-peer decentralized manner....
Come on down! (lemmy.ca)
[Solved] Creating identical keyfiles returns different hashes?
Solved, see below....