refalo

joined 2 years ago
[–] refalo@programming.dev 2 points 1 year ago (1 children)

imagine waiting for a torrent when usenet immediately saturates your link 24/7

[–] refalo@programming.dev 2 points 1 year ago (2 children)

depends on the voice language

[–] refalo@programming.dev 11 points 1 year ago

ACPI bugs are common and can typically be ignored, but...

without a GUI

how do you know it's even trying to start one? what happens if you try it yourself manually?

[–] refalo@programming.dev 2 points 1 year ago (1 children)

too much https traffic could also look suspicious, which they could then block...

[–] refalo@programming.dev 4 points 1 year ago

Why do you think it's "amazing" that people use it?

[–] refalo@programming.dev 1 points 1 year ago* (last edited 1 year ago) (1 children)

This seems to say it is blocked in China and Russia as well though

[–] refalo@programming.dev 22 points 1 year ago (4 children)

If it's any school like mine was, where people actively look at all the traffic going through their network, it's a losing battle. And I say this as both a huge privacy advocate and a long-time network engineer.

Anything even remotely resembling a tunnel, VPN or proxy is going to make you stand out in their monitoring, because they will see constant traffic between you and the same host on the other end... traffic that practically never stops. In my day the school even force-reset SSH and RDP sessions after a while (or maybe it was actually ALL tcp sessions, not sure).

It doesn't matter what protocol or technique you use at that point because they can either block whatever IP/ports you use, every time you change it, or threaten/shut off your service.

[–] refalo@programming.dev 13 points 1 year ago (3 children)

This technique is pretty much impossible to block

How China Detects and Blocks Shadowsocks

[–] refalo@programming.dev 8 points 1 year ago (4 children)

For at least 3 years, I’ve been wanting to get an apple silicon mac to daily drive Linux on

Can you tell us why?

[–] refalo@programming.dev 30 points 1 year ago (1 children)

I struggle to call that hacking in the sense most people probably mean. Phishing is definitely a thing but they're not 'breaking' anything to access a system, they're just tricking you into giving it to them.

view more: ‹ prev next ›