• 1 Post
  • 23 Comments
Joined 2Y ago
cake
Cake day: Jul 07, 2023

help-circle
rss

Dude. I thought That was bad. Just now I went to arstechnica to view one article and I did the same thing to “support” the site. It was 36MB in one minute.


Just yesterday I was on a news website. I wanted to support it and the author of the piece so I opened a clean session of firefox. No extensions or blocking of any kind.

The “initial” payload (i.e. after I lost patience approximately 30s after initial page load and decided to call a number) was 14.79MB transferred. But the traffic never stopped. In the network view you could see the browser continually running ad auctions and about every 15s the ads on the page would cycle. The combination of auctions and ads on my screen kept that tab fully occupied at 25-40% of my CPU. Firefox self-reported the tab as taking over 400MB of RAM.

This was so egregious that I had to run one simple test. I set my DNS on my desktop to my PiHole and re-ran my experiment.

Initial payload went from almost 14.79 -> 4.00MB (much of which was fonts and oversized images to preview other articles). And the page took 1/4 the RAM and almost no CPU anymore.

Modern web is dogshit.

This was the website in question. https://www.thenation.com/article/politics/welcomefest-dispatch-centrism-abundance/


So to be perfectly clear, setting up Wireguard is about bridging two LANs (or devices) to make them virtually appear as if they belong on the same network. For every client that connects they would need to be issued a key and every device would have to be set up. But all the traffic between the two “LANs” would be encrypted and secure.

But I don’t think WireGuard is what you’re looking for, because this would require setting up all these other people with WireGuard as well. Or doing a more complex setup where you use a VPS and WireGuard and have that serve an exit point instead of your home connection. Or any other number of more complex setups that would work but require a lot more effort… and it sounds like you were just looking for basic port forwarding.

Mullvad took that feature away a couple of years ago (presumably to combat CSAM dissemination). So if you were hoping to just have a secure path for someone to connect to your media server routed through Mullvad, I don’t believe that’s possible anymore.


It’s a somewhat convoluted story. Here are some links

The takeaway is when he logged into his Protonmail they logged his IP address which helped track this individual down. But note that Reddit thread I linked. I also cannot find that much information about “what happened next,” or the details of who was arrested and why.

There may be other examples, but this particular case kinda hit the rounds back when it happened.


Depending on how you’re accessing this, and how many people you’re trying to set this up for, it would probably be easiest to learn how to deploy your own Wireguard network. In my case, my phone automatically connects to my own Wireguard on my server (an 11 year old laptop) and whenever I’m on the go I have full access to my LAN + PiHole DNS filtering.

So, what’s the point? The point is that you will be able to securely connect to your media server without exposing it directly to the internet, all without paying for a service to do what you can already do yourself, provided your ISP allows you port forward.


I use Firefox as I actually like it more, except for the lack of Chrome-style tab groups (in development). But it does seem like it’s mismanaged and I wonder what that means for it in upcoming years.



I know that it’s not their fault, it’s the small size of the team

This part is directly Telegram’s fault. If they cannot keep up with their moderation queue then they need a bigger moderation team. Preferably properly remunerated. There are news reports about how Facebook’s sub-contracted moderators work for these extremely shitty companies who track them based on how many reviews a minute they do, and which causes extreme psychological damage to the workers both because of the extreme content they have to see as part of their jobs and the bad working conditions they must put up with.


I used ProtonVPN for years. I use MullvadVPN. Both are totally fine, in my experience. I left ProtonVPN because I couldn’t get port forwarding on Linux, and then less than two months after I did that Mullvad removed that feature, so that’s how it goes.


I will hit the like button on a video I really like. I will comment if I have a question, but not to simply join in on the “discussion” for the purpose of engagement. I will subscribe if the channel is actually good. I won’t do these things because a voice in the video suggests it to me, but because I finally decide, “This content author actually makes something worth watching.”

I have about 50 channels subscribed. Of those, about half are actively uploading videos. Of those, about half upload videos very regularly, and the others very irregularly.




That sucks. Good luck convincing them, or good luck if you failed to convince them and have to use spyware.




I don’t particularly trust any Chromium-based browser, because that affords more power to Google and their efforts to bully the rest of the world with Chrome.


But the point is what Swiss law is. They cannot be compelled by a court order to log data for their VPN service, but they can be compelled by a court order to log email accesses. This needs to be considered by users of Proton, and indeed it is a bad mark against them that this wasn’t clear upfront before the French activist case.

I’m not saying all this to defend Proton, really. I don’t even use their service anymore, but I did use the vpn for 3 years without incident.


The protonmail case has little to do with how they log records of protonvpn.


🫡 Still worth the read as usual.



When I last tried it, it runs really well. But I prefer the mouse/keyboard interface to the gamepad one.


That’s awesome. Your comment just sent me back to the good old days of PSP hacking, and to a lesser extent PS Vita hacking. The homebrew on PSP was really special particularly because of the sheer numbers of PSPs sold. I’d love to see an OpenMW Vita version someday :)


After approximately 10 months in a release candidacy phase, OpenMW 0.48 has finally been released. A list of changes can be found in the link. > The OpenMW team is proud to announce the release of version 0.48.0 of our open-source engine! > > So what does another fruitful year of diligent work bring us this time? The two biggest improvements in this new version of OpenMW are the long-awaited post-processing shader framework and an early version of a brand-new Lua scripting API! Both of these features greatly expand what the engine can deliver in terms of visual fidelity and game logic. > As usual, we've also solved numerous problems major and minor, particularly pertaining to the newly overhauled magic system and character animations. A full list of changes can be found in the link to Gitlab. ### What is OpenMW? "OpenMW is a free, open source, and modern engine which re-implements and extends the 2002 Gamebryo engine for the open-world role-playing game The Elder Scrolls III: Morrowind." It is an excellent way to play Morrowind on modern systems, and on alternative systems other than MS Windows. It requires the a copy of the original game data from Morrowind, as OpenMW does not include assets or any other game data - it is simply a recreation of the game engine. OpenMW can be found on Flathub for Linux users here. https://flathub.org/apps/org.openmw.OpenMW
fedilink

Wait, I don’t get this. Https certs are trivial to acquire and keep up-to-date with Let’s Encrypt. You can deploy a server like Caddy that will handle most of it for you. I’m a schmuck whose own website is self-hosted and I put an nginx rule to redirect http to https, because I don’t think anyone along the path between your computer and my website deserves to eavesdrop on the conversation.