andscape

joined 2 years ago
[–] [email protected] 1 points 1 month ago

Die Linke is the most leftwing party in the current and upcoming governments. Though, because of how right-shifted the overton window is in this country, that doesn't mean they're radicals. Their policies are still basically just social democracy. They're also basically the party of east German cities. The east German countryside votes for the AfD.

And the Greens in Germany are a center-right party, further right thank the SPD. They're very militaristic, extremely pro-Israel, in favor of repressing democratic protests at home... They're not that far from the label of "eco-fascist", except in practice without the "eco" part. Still, they get a lot of votes from well-meaning moderates who don't look to hard (or at all) at what the party stands for or dies and just vote for them because of the vibes.

[–] [email protected] 12 points 1 month ago (4 children)

Die Linke are nowhere close to tankies, what are you even talking about. They are a center left party.

[–] [email protected] 3 points 1 month ago

Yeah I guess Obscura does obfuscation between the client and entry node, which is where it matters

[–] [email protected] 1 points 1 month ago

Understood, thanks. Seems like most people are doing it this way, keeping the app installed. Do you have to restore a backup when you re-log in? I'm always losing messages when that happens

[–] [email protected] 9 points 1 month ago (2 children)

Mullvad already has that. It's called "WireGuard Obfuscation" in the settings. Obscura just seems to have a different implementation based on similar principles.

[–] [email protected] 1 points 2 months ago

Ah got it, thanks. It's not an ideal setup tbh, it'd be great to be able to delete the WhatsApp app from my phone, but better than nothing...

[–] [email protected] 1 points 2 months ago (2 children)

Thanks, but I mean how did you set up the external client for it? Did you have a spare phone to use, or did you set up an Android VM?

[–] [email protected] 1 points 2 months ago (4 children)

Good to know, thank you. How did you set up the whatsapp bridge?

[–] [email protected] 1 points 2 months ago (2 children)

Thanks for the report. Do you use the whatsapp bridge? If so, how did you set it up? Emulator?

[–] [email protected] 1 points 2 months ago (10 children)

When I was looking into matrix bridges I heard a bunch of stories about people getting their accounts blocked after using them through the bridges. Is this still an issue?

[–] [email protected] 3 points 5 months ago

Look at the very least you should write in the blogpost clearly which parts are generated by LLMs, so your readers can decide whether to trust them.

[–] [email protected] 4 points 5 months ago (3 children)

Idk man, it seems pretty irresponsible to me to write a blogpost with stuff that you got from ChatGPT without understanding it. People will assume that if you wrote a blogpost on this then you know what you're doing. ChatGPT gets stuff wrong all the time, and we're talking about firewall configuration here. If it misconfigured some stuff it could leave you and your readers vulnerable to all kinds of shit.

In this case it seems to me that (luckily) there's just a bunch of redundant routing, but the next time it could be leaking your and your readers' torrent traffic out of the VPN tunnel, leaving you vulnerable to legal repercussions for piracy.

Please don't authoritatively post stuff that you got from the automatic bullshit generator without understanding it.

 

I'm setting up a self-hosted stack with a bunch of services running on a home device. I'm also tunneling all the traffic through a VPS in order to expose the services without exposing my home IP or opening ports on my local network. Currently all my traffic is HTTP, and its path looks like this:

  • Caddy proxy on remote VPS (HTTPS, :80 & :443)
  • Wireguard tunnel
  • Caddy proxy in Docker on homeserver (HTTP, :80)
  • app containers in separate isolated subnets, shared with Caddy

I want to set up qBittorrent and other torrent apps, and I want all their traffic to pass through the proxies. Proxying traffic to the WebUI is easy, there's plenty of tutorials; what I'm struggling with is proxying the torrent leeching and seeding traffic, which is the most important part since I live in a country that's not cool with piracy.

Unless I'm misunderstanding, BitTorrent traffic is TCP or UDP, so I'd need Caddy to act as a Layer 4 proxy. There's a community-maintained plugin that should support this. How would I configure it though? Do I need both instances to listen on a new port? Or can I open a new port on the VPS only, and forward traffic to the homeserver Caddy over the same port as the HTTP traffic (:80)? Are there nuances in proxying TCP traffic that I should be aware of?

 

I'm involved with an org that needs to set up a public wishlist for supplies for a project. The rough requirements are as follows:

  • Public webpage with a static URL
  • Can be easily edited by non-technical people
  • Editing requires authentication
  • Avoiding corporate services, especially avoiding tracking of both users and admins
  • As cheap as reasonably possible
  • As quick to set up as possible

Nice to have:

  • Hosted under a custom domain
  • Supports users "reserving" items so multiple people don't all supply the same stuff

One option I considered would be running something like wishthis in a VPS under our own domain, but this is kinda expensive, complex, and I don't trust wishthis' auth. A different option could be just having a static page in something like Notion or Github pages, which would be free but relies on corporate services we don't trust.

Is there a middle ground between the two previous options? Or a better solution that fits most of the requirements?

 

I wrote this post for a friend, I'm sharing it here for anybody it might help. I got asked multiple times how I download cracked music software so I figured it'd be easier to write it down once. It's meant for people with very low technical skills who just want to start torrenting software without major risks, and it includes a bunch of safety tips that are already known in this community.

If you have feedback, let me know and I'll update the post.

view more: next ›