

You can’t design away stupid, but if this is a regular problem then the intersection is designed stupid and you need to design a better one.
https://www.goodreads.com/book/show/201978334-killed-by-a-traffic-engineer
This is an alt account, you may see it around. I am not ban-dodging intentionally, I promise!
This is the main
https://scribe.disroot.org/u/drkt
You can’t design away stupid, but if this is a regular problem then the intersection is designed stupid and you need to design a better one.
https://www.goodreads.com/book/show/201978334-killed-by-a-traffic-engineer
I didn’t say conspiracy
I wouldn’t even know where to begin, but I also don’t think that what I’m doing is anything special. These NVR IPs are hurling abuse at the whole internet. Anyone listening will have seen them, and anyone paying attention would’ve seen the pattern.
The NVRs I get the most traffic from have been a known hacked IoT device for a decade and even has a github page explaining how to bypass their authentication and pull out arbitrary files like passwd.
I love the idea of abuseipdb and I even contributed to it briefly. Unfortunately, even as a contributor, I don’t get enough API resources to actually use it for my own purposes without having to pay. I think the problem is simply that if you created a good enough database of abusive IPs then you’d be overwhelmed in traffic trying to pull that data out.
I have plenty of spare bandwidth and babysitting-resources so my approach is largely to waste their time. If they poke my honeypot they get poked back and have to escape a tarpit specifically designed to waste their bandwidth above all. It costs me nothing because of my circumstances but I know it costs them because their connections are metered. I also know it works because they largely stop crawling my domains I employ this on. I am essentially making my domains appear hostile.
It does mean that my residential IP ends up on various blocklists but I’m just at a point in my life where I don’t give an unwiped asshole about it. I can’t access your site? I’m not going to your site, then. Fuck you. I’m not even gonna email you about the false-positive.
It is also fun to keep a log of which IPs have poked the honeypot have open ports, and to automate a process of siphoning information out of those ports. Finding a lot of hacked NVR’s recently I think are part of some IoT botnet to scrape the internet.
it’s so fucking true
Anytime they pull you into an argument, suddenly 5 more show up to try and overwhelm you. There’s no way it isn’t a deliberate tactic.
What is a ‘scene’ in this context?
What kind of car you like is one thing but does he understand that when he sits at a café next to a busy, congested road and blame the cyclists for the congestion that he’s actually just factually wrong? Because I don’t think he knows that. Jeremy Clarkson is fiercely anti-bicycle and until he says, in front of an audience, that he’s wrong about this and will stop spewing vitriol at bicyclists, I frankly don’t care about him.
Maybe they should take their soldiers and get off our soil, then. Putting US bases on European soil isn’t a favor to Europeans, it’s a mutually assured defense. If they’re unhappy with the deal, they can leave.
This is nice to hear after finding out what an absolute boomer Jeremy is.
Meshtastic
BOINC
Tor
I2P
Just off the top of my head. Meshtastic is probably the most similar to Helium but I don’t know what Helium is and their landing page makes me not want to. BOINC supports projects not in the official lists, just google around.
what about this is crypto mining?
Anubis is provided to the public for free in order to help advance the common good. In return, we ask (but not demand, these are words on the internet, not word of law) that you not remove the Anubis character from your deployment.
If you want to run an unbranded or white-label version of Anubis, please contact Xe to arrange a contract.
This is icky to me. Cool idea, but this is weird.
Linux is truly extensible and it is the part I both love and struggle to explain the most.
I can sit at my desktop, developing code that physically resides on my server and interact with it from my laptop. This does not require any strange janky setup, it’s just SSH. It’s extensible.
Any file manager on Linux supports this
I just type sftp://[ip, domain or SSH alias]
into my file manager and browse it as a regular folder
That doesn’t really change that it’s one company hosting it. Unless you’re willing to make 10 different accounts because your super-FOSS friends aren’t willing to join each others instances?
Have you tried? Because Proton is the miracle people make it up to be.
@futatorius@lemm.ee also replying to you
I think there’s been a semantic misunderstanding -
I’m saying that people are going to be stupid and you should design an intersection that accounts for it. I don’t think that’s ‘designing away stupid’ because the stupid is still present. It has merely been limited or entirely contained, but I don’t want to have a semantic argument. Just understand that we agree, and the book I reference says almost exactly what you both said.