• 0 Posts
  • 87 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle

  • What are you even on about? One person could conceivably add CSAM to a torrent that you eventually download, and you could find yourself subject to a criminal investigation.

    I’ve gone my entire adult life downloading copyrighted material without using a VPN

    “I’ve been fucking multiple partners weekly my entire adult life. without protection, and I haven’t gotten AIDS yet.” <— That’s you. That’s what you sound like.

    You are giving your ISP every thing that a rightsholder needs to harass you, with your understanding that laws and corporate policies currently protect you from that harassment. But you ignore that those policies can be changed, and those changes can apply to data you’ve previously given to your ISP. When rightsholders start arguing “think of the children” and pointing at such torrents, that’s the kind of thing that gets laws and policies changed.

    Why give them the information in the first place? Why not keep that information away from your ISP? Why trust them to do the right thing when you can easily deny them the ability to do wrong?


  • That level of paranoia is a waste of energy.

    I know I am paranoid, but am I paranoid enough?

    Identifying and evaluating vulnerabilities is a critical component of any security plan. In a good one, any vulnerabilities will be well outside the scope of feasibility.

    Why would some Hollywood studio plant CSAM in a torrent?

    To cast FUD on piracy in general. To inextricably link “pirate” with “pedophile” in the mind of the general public. To convince the general public to treat copyright infringement as criminal rather than a civil matter.

    That would implicate them as well.

    They hire or extort someone to initially seed from some third world ISPs, and the swarm takes over from there. It never gets traced back to them.

    It would cost them far more in legal fees to come after me than to just leave it alone.

    You aren’t the objective, just the means. The purpose is to make piracy a truly objectionable practice in the eyes of the public.

    None of this is a likely threat, but is any of it completely outside the realm of feasibility?


  • You don’t have any justification to be that condescending. Your security practices are reliant on the law, and the law is not a factor under your direct control. It has changed without your input before, and it will change without your input in the future. Meanwhile, your ISP is building a record of your non-compliance that it can provide to rightsholders just as soon as it likes.

    Good security practice minimizes reliance on factors outside your control. You can’t control whether your ISP has your personally identifiable information, but you can deny them knowledge of your data transfers. You can’t control whether a VPN has knowledge of your data transfers, but you can deny them knowledge of your PII.

    Also it definitely would cost them if they told me “we have not responded to this notice from the rightsholder” and then turned around and did exactly that. That would be a flat out lie to their client.

    As of the time of their letter, they had not responded to that notice. They could respond tomorrow without ever having lied to you. You would not have grounds to sue.

    Just out of curiosity, will your Canadian ISP and your (current) Canadian laws protect you when a rightsholder portrays you as a pedophile instead of a pirate? If they anonymously publish a torrent containing their movie and some hidden CSAM, are you fucked?



  • On the public wifi, the operator of that wifi can see any data you pass through their network. They can likely see what sites you visit, but probably can’t see what data you send to and from those sites, due to encryption. Unless they have an account with you, or you provide your information in clearext, they can link your data to your devices, but not to you directly, at least not from your use of the AP. They can potentially link your data to your image on their cameras, and thus your identity.

    Your ISP has the same access to your data, but they also have a payment account linked to you, and they regularly cooperate with rights holders and law enforcement.

    A VPN can do the same thing as an ISP: they know what sites you visit, but probably don’t know what data you are sending and receiving, and they can link it to your payment account. However, they generally do not cooperate with rights holders, and may or may not cooperate with law enforcement in their jurisdiction. While you are using a VPN, your ISP knows you are using them, but doesn’t know what you are sending back and forth, due to encryption.

    If you want to remain as anonymous as possible, use a burner device with no accounts on public wifi.

    If you want to avoid harassment by rights holders while you engage in piracy, a VPN is sufficient.





  • Long shot, but does anyone know of any mapping app where you can easily project a bearing/azimuth line, or a point a given bearing and distance from another point?

    The only app I’ve found so far that can come close to what I need is Backcountry Navigator, which has a terrible UI. Everything else seems to be focused entirely on GPS navigation from where you are now to a known destination; I have yet to find one that allows even basic triangulation, to be able to identify the location of an observed object.



  • Rivalarrival@lemmy.todaytoLinux@lemmy.mlThe Best way to switch to Linux is to NOT
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    5
    ·
    edit-2
    27 days ago

    Fuck all that.

    Install Linux, any flavor. Install virtualbox, and set up a Windows VM. Go ahead and install any of your windows bullshit on that VM. That’s your crutch, your failsafe: a windows instance that you don’t have to leave Linux to access.

    Save snapshots before and after any changes, so if/when it goes to shit, you can roll it back to where it was still working.


  • The purpose of sex should be defined by the participants, not by third parties. Government (public, third party) interest in the private act should be limited to protecting the participants from fraud, undue influence, unexpected diseases, unexpected pregnancies, violence… Basically, so long as everyone involved in the act is aware and freely agrees to the purpose, the actual purpose is functionally irrelevant.

    Sex work is work.

    I can see regulations against establishing an employer/employee working relationship, and instead mandating a private contractor relationship: an employee can disciplined or fired for failure to perform, or for refusing to serve the employer’s customers; a contractor can pick and choose their own clients.

    The right of assembly; the freedom of association should broadly protect mutually consensual activities.