

I’m reminded of the horrid example showcased on the amber-lang website previously.



I’m reminded of the horrid example showcased on the amber-lang website previously.

My fstab doesn’t actually get read on startup. Simply because mount -a is never called.
Just to demystify this magic file.


So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence
Asking for evidence wasn’t the issue, believing that the truth relies solely upon a discussion providing such evidence is.
I think you are confusing having an option with something being mandatory.
You misunderstood. Some of your own statements say it matters and is used. Mandatory wasn’t mentioned nor implied.
And Tor nodes are not the same thing as VPN multi-hop.
I just realized you think that Tor is built using multi-hop.
I didn’t state they were the same. Tor uses “multiple hops” (you can find that string the the link I posted earlier). It is critical to the limiting of information seen by any single entity.
And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?
All that state can be removed. And the server might not be tracking that. Situations vary, adversaries vary. If you cannot imagine a scenario in which hops or IP address would matter, I would suggest doing some research.
Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.
Personal swipes mark the end of this discussion. I would suggest you to leave those out next time as It detracts focus from constructive learning.
This will be my last reply. You can also reply if you want (but I won’t see it).


Evidence, or it isn’t true.
Unrelated, but absence of evidence is not evidence of absence.
Anyways, your own statement:
Adtech relies on the OpenRTB 2.5/2.6 spec for tracking, you would have removed 1 identifier out of a hundred (one that isn’t really used anyway given SSAI is so popular).
Removing an identifier that is used. (1/100 = matters, “isn’t really used” != unused). This contradicts your other statements:
Yeah, multi-hop is pointless for tracking.
…IP addresses and multi-hop don’t matter…
Broad statements that don’t take into consideration the threat model of other users. Servers you connect to might not be using source IP in any way to track. You might be leaking so many other identifiers, that its completely useless to worry about multi-hop. But this is not true for everyone in every situation.
If its worth anything to you, the Tor Project seems to think multi-hop and IP addresses matter for protecting against tracking.


I’m unsure what evidence you are referring to.


I’m unsure what evidence you are referring to.


What specifically about multi-hop makes you think it improves your security?
I haven’t mentioned security.


- You giving some marketing crap you read from a VPN provider site on their multi-hop service.
I’m sorry, but that isn’t correct.


You almost had the rest of the sentence there:
That doesn’t change the contradiction.


Yeah, multi-hop is pointless for tracking.
The logic to it is crazy too. People think VPNs make them anonymous (they don’t), but they also think multi-hop makes them MORE anonymous.
Whether multi-hop matters to tracking is far and away a different discussion than whether multi-hop “makes you anonymous”.
I too disagree with the original comment, but also believe the pendulum swung too far the other direction in your replies.
Situations differ. Threat models differ. More hops can, from direct personal experience, make the difference in tracking. Your claim of “…multi-hop is pointless for tracking.” has too broad of a scope to be correct.


Remember to read the rest of that sentence:
It doesn’t change the contradiction.


I might have been experiencing this issue for the longest time. System fully locks up and is completely unresponsive. Happened on every distro I used.
Last distro I had it on was Artix Linux. Then I tried Alpine and I don’t think I’ve had it happen since.


…specifics about WHY IP addresses and multi-hop don’t matter.
…you would have removed 1 identifier…
So it can matter.


VPNs don’t prevent tracking, they just make sure the tracking is done through a secure tunnel.
The extra hop adds a significant barrier for the website in knowing the actual source IP. The fake source IP is likely used by many other users, and the user you are trying to track can easily rotate VPN IPs.
Its one less identifier for them to use.


I really like to get some feedback. Have fun everyone!
Remove the “MILITARY-GRADE” stuff. It doesn’t relay any useful information and has been used as a phrase in countless crappy products.






There was this recent attack to XZ utils, which shows that more attention is needed on the code being merged and compiled.
XZ was made possible largely because there was unaudited binary data. One part as test data in the repo, and the other part within the pre-built releases. Bootstrapping everything from source would have required that these binaries had an auditable source, thus allowing public eyes to review the code and likely stopping the attack. Granted, reproducibility almost certainly would have too, unless the malware wasn’t directly present in the code.
Pulled from here:
Every unauditable binary also leaves us vulnerable to compiler backdoors as described by Ken Thompson in the 1984 paper Reflections on Trusting Trust and beautifully explained by Carl Dong in his Bitcoin Build System Security talk.
It is therefore equally important that we continue towards our final goal: A Full Source bootstrap; removing all unauditable binary seeds.
Sure you might have the code that was input into GCC to create the binary, and sure the code can be absolutely safe, and you can even compile it yourself to see that you arrive at the same bit-for-bit binary as the official release binary. But was GCC safe? Did some other compilation dependency infect the compiled binary? Bootstrapping from an auditable seed can answer this question.


The solution is to have stronger privacy laws.
Many people have the power to make certain privacy attacks impossible right now. I consider making that change better for those people than adding a law which can’t stop the behavior, but just adds a negative incentive.
I wouldn’t wait around for the law to prosecute MITM attacks, I would use end to end encryption.
Choosing an esoteric system for yourself is a good way for a free people to protect their privacy, but it won’t scale.
If this is referencing using a barely-used system as a privacy or security protection, then I would regard that as bad protection.
Everyone using GrapheneOS would be a net security upgrade. All the protections in place wouldn’t just fade away now that Facebook wants to spy on that OS. They’re still in place; Facebook’s job is still harder than it otherwise would be.
Some of those countrymen are conscripts. 2/3rds? Which makes continuation of battle far less justifiable IMO.
Some people will choose to fight in Ukraine, to possibly die in Ukraine. Conscripts face punishment for refusal.
How many of those fighting would refuse the peace deal?