emotional_soup_88
- 45 Posts
- 247 Comments
emotional_soup_88@programming.devto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Is there a 100% free way to pirate as a newcomer?English
1·1 day agoXD
All they knew is I’m playing a game boy game called Pokémon and that this is a movie of that game. So… XD
emotional_soup_88@programming.devto
Linux@lemmy.ml•In appreciation of Linux on ThinkpadsEnglish
6·2 days agoNoice. Flawless T480 experience with Arch Linux here. Also one of the last real modular ThinkPads - I swapped the storage, memory and WiFi card. It feels like a piece of hardware from 2026.
emotional_soup_88@programming.devto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Is there a 100% free way to pirate as a newcomer?English
102·1 day agoWhat I did, what I do and why I do it
At the beginning of the 2000’s, piracy either wasn’t as prevalent as it is today or it wasn’t as persecuted, or a combination thereof. Which is to say, I started with DC++, Kazaa and direct downloads. No security or privacy measures. This is also when I proudly downloaded the first Pokémon movie Pokémon: The First Movie (1998), sat down with my parents to watch it and then immediately having to explain to them why Pokémon are having sex. Suffice it to say, it was some Pokémon themed hentai.
As my understanding of computers, networking and capitalism evolved - this being around the early 2010’s - and especially as I had learned about the improved, albeit not perfect, anonymity of torrenting in a society with otherwise increasingly oppressive demeanor towards online integrity and piracy -, I decided to only pirate using torrent clients thenceforth. I also took a brief pause from piracy for about six years, as I moved to a jurisdiction whose laws and attitude towards privacy were not known to me. I was doing my Master’s degree and thus couldn’t spare the time and effort it would’ve taken to safely engage in piracy.
As we arrive to present day - present time (any fans here?) -, nation states’ attitude towards piracy - or, rather the lobbyists’ relentless pursuit to reap legal fees - but really just the overall cyber climate with all the data brokers indiscriminately collecting, profiling and selling our data to the highest bidder, I simply don’t dare to be on the clearnet/internet without using a VPN, an adblocker and DNS/hosts file based filtering anymore. I would argue that the risks to the integrity of the individual is great enough to warrant these countermeasures regardless of jurisdiction, but I digress. Sure, if your jurisdiction does not criminalize piracy, be my guest, torrent without a VPN.
My current setup
- VPN: Mullvad VPN, €5 per month https://mullvad.net/en/pricing
- Adblocker (in browser): uBlock Origin https://ublockorigin.com/
- DNS: Mullvad (comes “automatically” with the above services)
- Torrent client: qBittorrent https://www.qbittorrent.org/
A few notes on Mullvad:
- I am using Mullvad VPN on a router so that all my traffic is encrypted, but their desktop app is also good - better in regards to customizability -, just make sure to bind your torrent client to the network interface created by the VPN app.
- You cannot make applications reachable from the internet (aka forward ports) with Mullvad. You can still download, but you are a passive seeder, only reachable by peers that do have port forwarding enabled. (Note: a great majority of the bigger seeders/public seeding groups use so called seeding boxes whose ports are forwarded and I seed in average 8TBs per month with steady share ratios of around 8.0, so don’t let this discourage you, unless maximizing your seeding contributions is what is most important to you.)
Paying nothing
As others have already pointed out, double check what laws apply in your specific jurisdiction before pirating unprotected. I haven’t tried it myself, except for running two of their routers to contribute bandwidth, but file sharing in the closed network i2p is supposedly popular. However, I can neither confirm nor deny this and it is a somewhat more technical approach. All your traffic is encrypted many times over and what you do inside i2p is not visible from the clearnet. https://geti2p.net/en/
emotional_soup_88@programming.devto
Linux@lemmy.ml•Are there any lightweight linux video editors?English
6·7 days agoAre you not making the next Avatar movie? I came here to help because I thought… I believed… Oh, well.
emotional_soup_88@programming.devOPto
Linux@lemmy.ml•Pros and cons on - and alternatives to - running three separate servers on one single Linux instance using systemd-nspawnEnglish
1·7 days agoWell, now I just have to try it!
I have no idea how to tell specific processes or shells to use a specific interface, while also forbidding others to use the same interface… Which is why I thought, “but I can force a container to use a specific interface! Gotcha!”
I’m almost there, I think. I managed to get my phone and my nspawn-ed wireguard interface to shake hands. I just need to tweak the forwarding and nat-ing rules in my firewall. After I touch grass. Oh, my back…
emotional_soup_88@programming.devOPto
Linux@lemmy.ml•Pros and cons on - and alternatives to - running three separate servers on one single Linux instance using systemd-nspawnEnglish
2·7 days agoThanks! What a sweet little handbook for getting started! :D
emotional_soup_88@programming.devOPto
Linux@lemmy.ml•Pros and cons on - and alternatives to - running three separate servers on one single Linux instance using systemd-nspawnEnglish
2·7 days agoThank you for the suggestion on Podman! The thing is, since the VPN is running on one of my routers (connected to eth0), and since I want the public facing interfaces (1 and 2) not to use that router, I’m going to make use of one of those two extra interfaces anyway. Either way, good advice in adding multiple addresses to the same interface!
emotional_soup_88@programming.devOPto
Linux@lemmy.ml•Pros and cons on - and alternatives to - running three separate servers on one single Linux instance using systemd-nspawnEnglish
2·7 days agoI’d absolutely do that if I didn’t already have two extra physical interfaces. :)
emotional_soup_88@programming.devOPto
Linux@lemmy.ml•Pros and cons on - and alternatives to - running three separate servers on one single Linux instance using systemd-nspawnEnglish
1·7 days agoSweet! I’ll start reading up on Docker, especially as it sounds like it has become an integral part of your self-hosting. :)
emotional_soup_88@programming.devto
Ask Lemmy@lemmy.world•Is the dead internet already a reality?English
18·9 days agoMatter of perspective. Earlier today, I told a coworker how happy I am to have been born in the late 1980’s, because it spared me from the internet culture of today: shallow, exploitative, otherizing and it encourages short term dopamine kicks. It’s a breeding ground for media illiteracy, bigotry, xenophobia and narrow mindedness in general - which is ironic, since it also makes the culminated knowledge of human kind easily accessible, which has the potential to open your mind if you have internet access and if you use the internet wisely. Anyway, in a way, the internet of today is a crystalization of everything that’s making me have a gloomy outlook on the future and keeping me from wanting to have children.
emotional_soup_88@programming.devOPto
Electronics@discuss.tchncs.de•Simpler times [vintage clothing iron]English
1·11 days agoSweet!
emotional_soup_88@programming.devOPto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Experience with hosting a public Invidious instance?English
3·13 days agoThanks for the warning!
emotional_soup_88@programming.devOPto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Experience with hosting a public Invidious instance?English
3·13 days agoThanks for the tutorial! For now, I’m looking into connecting to my instance with a simple wireguard tunnel, if I decide to just have a private instance.
I already read Invidious’ documentation. 👍
The reason I’m asking about a public instance is because I want to share my bandwidth with y’all with more than torrenting, an I2P router and Tor bridges. 🙈
emotional_soup_88@programming.devOPto
Privacy@lemmy.ml•Experience with hosting a public Invidious instance?English
2·14 days agoThanks!
emotional_soup_88@programming.devOPto
Hardware@lemmy.ml•Where there is a will... [M.2 drive cooler]English
1·15 days agoI was having a hard time getting out of bed, but this made me laugh and woke me up in an instant. I mean… Sure. Why not. XD
emotional_soup_88@programming.devOPto
Hardware@lemmy.ml•Where there is a will... [M.2 drive cooler]English
1·15 days agoThat looks really cool. Pun intended.
emotional_soup_88@programming.devOPto
Hardware@lemmy.ml•Where there is a will... [M.2 drive cooler]English
1·15 days agoYeah, that’s what’s one mine. A plain fanless heatsink.
emotional_soup_88@programming.devto
Privacy@lemmy.ml•How Microsoft stores and shares your encryption keysEnglish
7·16 days agoOne could cool down system memory before power is cut to a point where it retains in-use plaintext encryption keys. One basically renders the otherwise volatile system memory temporarily nonvolatile. And if one manages to keep the temperatures low for long enough, one could swap those memory modules into one’s own computer/motherboard and print the keys. As you can imagine, the resources needed for this type of attack makes the proposition of it infeasible. Then again, if your adversary is a nation state… Fingers crossed?
emotional_soup_88@programming.devto
Ask Lemmy@lemmy.world•Soundtrack for these dark times?English
7·17 days agoIf and when I want to feel political listening to music, it’s mostly RATM or some down to earth 90’s black rap, such as Wu-Tang Clan (I’m white though). Occasionally I drink a few and sing Bella Ciao until my voice gives out.
Otherwise, nowadays, I’m mostly depressed (clinically) and I often just flee into some darksynth like Perturbator.










If you want to be funny about it, you could say that I have made love to my love doll by banging it. It is of a cute design, which can make me feel that it’s pretty. But that’s about it. It’s a cute looking tool that imitates humans, used to relieve horniness. I think that AI/LLMs are similar. Under the hood, they are nothing more than tools that index information according to any chosen predetermined algorithm and rearrange and present it in a way that gives the illusion of having genuine generative properties. Just as my love doll gives me the impression that it is cute in a human way, AI is made to respond in ways that give the impression of reciprocating love. But it isn’t. I think your friend - and a lot the youth of today - just live on the dopamine kicks that the clever imitations induce.