eYredWkae3QVaX8b's recent activity
-
Comment on File sharing over a network in ~comp
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b We are on the same subnet, but it's possible that i have a wifi connection into the network and my friend is connected with an ethernet cable. So there is at least one extra device. NAT is a whole...We are on the same subnet, but it's possible that i have a wifi connection into the network and my friend is connected with an ethernet cable. So there is at least one extra device. NAT is a whole different beast, which can be defeated by ssh tunnels if you don't have network control.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b Of course other methods are much easier than this. But the point is to use the networkOf course other methods are much easier than this. But the point is to use the network
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b They are in their right to deny traffic, but not based on the content of the packet. Having said that, your key-lending analogy really sucks for this particular situation.They are in their right to deny traffic, but not based on the content of the packet. Having said that, your key-lending analogy really sucks for this particular situation.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b Only works from Apple, to AppleOnly works from Apple, to Apple
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b It shouldn't matter. If network access is provided to both of us, the contents of our packets are private and of no concern to the network administrator.It shouldn't matter. If network access is provided to both of us, the contents of our packets are private and of no concern to the network administrator.
-
Comment on <deleted topic> in ~tech
eYredWkae3QVaX8b There is only /one/ possible way to anonymize a dataset: Randomizing the dataset D such that the resulting dataset D' is drawn from the same distribution as D. This basically, means that the table...There is only /one/ possible way to anonymize a dataset: Randomizing the dataset D such that the resulting dataset D' is drawn from the same distribution as D. This basically, means that the table rows don't mean anything on their own but you can learn the same stuff from D' as from D.
But there is always the utility-privacy trade off. When there is little data, you cannot randomize a lot before you start to lose information. On the other hand if the dataset is large, it becomes possible to make very strong privacy guarantees without throwing information away.
Randomization is the only way for micro-data to be shared. And as always, there is no free lunch in data mining. It's possible, research has been going since the late '70s on this topic. Companies are just not doing it.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b That's fine, i don't need help poking holes because i'm perfectly capable of doing so via my vpn, vps, ssh tunnels or wireguard tunnels. The point is to have p2p capability without these. Amish...If you want to use a hack to get around that, I won't help with it.
That's fine, i don't need help poking holes because i'm perfectly capable of doing so via my vpn, vps, ssh tunnels or wireguard tunnels. The point is to have p2p capability without these. Amish p2p, just plain.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b (edited )Link ParentThis scenario should be legal in any case. The sending party consents with sending the data and the receiving party consents with receiving. The only role of the network hardware is to pass the...This scenario should be legal in any case. The sending party consents with sending the data and the receiving party consents with receiving. The only role of the network hardware is to pass the packets containing the data from me, to my friend.
The problem statement is in my eyes extremely simple: send bits from one machine directly to another, the content is irrelevant, both parties consent. I claim that this impossible in almost all cases where you are a digitally illiterate person that resides in a posibbly restricted network. Because there are always third parties that control the network and their sole goal is to make your life miserable.
This is just a manifestation of the restriction of digital freedom, because isp/company IT dep. policies assume that almost all people are stupid: They buy IOT devices that are shit, don't have their pc security in order and download any .exe file there is to get. What is a solution? Put them in restricted networks, behind a NAT, with a draconic firewall. Make everything that the internet was designed to do impossible, without centralised control. My argument is that this is erring on the wrong side. Instead of disallowing anything that could be used for bad, they should allow everything that could be used for good. Mission critical systems should instead be air-gapped, or be part of a private intranet. As a rule of thumb: If you can get out, you should be able to get back in.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b I'll specify it. Should work reliabliy regardless of the device.I'll specify it. Should work reliabliy regardless of the device.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b We've played with this too, but here you assume that incoming traffic is allowed. For all you know it might be blocked, like at the university where all incoming packets are dropped.We've played with this too, but here you assume that incoming traffic is allowed. For all you know it might be blocked, like at the university where all incoming packets are dropped.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b ssh tunneling works in general. Although, we've tried this at the university and they drop all incoming packets.ssh tunneling works in general. Although, we've tried this at the university and they drop all incoming packets.
-
Comment on File sharing over a network in ~comp
eYredWkae3QVaX8b Because it seems to be a serious challenge. I don't want to share a movie by mailing it, neither do i want to put it on a server of someone i don't know. We've tried torrents of course. But the...Because it seems to be a serious challenge. I don't want to share a movie by mailing it, neither do i want to put it on a server of someone i don't know. We've tried torrents of course. But the problem is that there needs to be a way for the DHT to be updated, or you need to run your own tracker.
This should be something that is easy, just like chat. but it turns out that it's not because almost everyone resides in a severely restricted network. Tbh i don't care what kind of data we send, it's meant to be an instantiation of setting up a pure p2p connection without using someone elses computer.
-
File sharing over a network
Me and my friend arrive at an arbitrary place, we have access to a network from there. Now, we want to share a file and the network connection is all we have. The challenge: make the file go from...
Me and my friend arrive at an arbitrary place, we have access to a network from there. Now, we want to share a file and the network connection is all we have. The challenge: make the file go from my device to my friends device in a pure p2p setting. If you know, for sure, that incoming connections are allowed this is very simple but here i want to explore which solutions exist that do not assume this.
Assumptions:
- Same network altough possibly different access points (one might be wired and the other wireless)
- We have no prior knowledge about the network, incoming traffic might be blocked (outgoing isn't for sure)
- No extra machines can aid in the transaction (no hole punching etc)
- Should work reliably for any kind of device that you have free -- as in freedom -- control over. that is PCs, android phones/tablets and macs. most of Apple's other hardware can be excluded because they don't allow for anything anyway.
- hard mode: We are both digitally illiterate
Goal:
- Send a file, p2p, from one party to another.
Me (MSc cs) and my friend (PhD cs) tried to do this last week. And it appears to be among the hardest problems in CS. I would like to discuss this and hear which solutions you might have for this problem.
Edits:
- this is not an assignment
- Added some specifics to the assumption set
- we're looking for practical solutions here.
- more specs
10 votes -
Comment on This town in Mexico threw out their government. Things couldn't be going better in ~misc
eYredWkae3QVaX8b Now they sing Beasts of England but life will go on as it always hasNow they sing Beasts of England but life will go on as it always has
-
Comment on <deleted topic> in ~tech
eYredWkae3QVaX8b I have been using posteo.de for over a year now and they are really good, feature rich, fully support all kinds of encryption you might want and they have carddav/caldav, notes, tls sending...I have been using posteo.de for over a year now and they are really good, feature rich, fully support all kinds of encryption you might want and they have carddav/caldav, notes, tls sending guarantee, accept cash payments from envelopes, don't require you to put any personal information etc. Good price as well.
-
Comment on Wikipedia makes the case for Google and Facebook to give back to the Commons, rather than just take in ~tech
eYredWkae3QVaX8b I don't think they will do so without demanding control over the information as well... Wikipedia works well because there is no big entity behind it that might force their ideals onto the...I don't think they will do so without demanding control over the information as well... Wikipedia works well because there is no big entity behind it that might force their ideals onto the consumers. I always give when they ask for donations, starting from i was 16. I had next to nothing, but i gave 1 euro nonetheless. Ask yourself this: if wikipedia was a paid service, how much would you be willing to give monthly to keep it as it is? Just donate that much *12 per year. and be done. even if it's a euro, or 5, everything helps them.
Wikipedia is the last place we can go for information that --- as closely as possible -- resembles the truth and we can not afford losing it.
-
Comment on Budgeting app in ~finance
eYredWkae3QVaX8b Gnucash is really good and works on almost all platforms. You have to do syncing between different machines yourself.Gnucash is really good and works on almost all platforms. You have to do syncing between different machines yourself.
-
Comment on Password manager suggestions? in ~tech
eYredWkae3QVaX8b pass, very easy and it uses your GPG key.pass, very easy and it uses your GPG key.
-
Comment on Firefox is back. It’s time to give it a try. in ~tech
eYredWkae3QVaX8b (edited )LinkI have a suggestion for a browser setup that i switched to when quantum came out. I currently run a stripped version of firefox called waterfox, It is very quick and supports the old addons,...I have a suggestion for a browser setup that i switched to when quantum came out. I currently run a stripped version of firefox called waterfox, It is very quick and supports the old addons, including unsigned ones.
If you run Waterfox + this stack of addons (over a VPN, with a pihole dns set up ofc)
- Decentraleyes (decentralises dependecies)
- HTTPS everywhere (Forces HTTPS if it's available)
- NoScript (blocks JS by default)
- Privacy Badger (blocks trackers)
- self-destructing cookies (automatically delete cookies)
- uBlock Origin (blocks ads)
- Random Agent Spoofer (Spoofs referers, ip, resolutions, against browser fingerprinting because you are very unique when you use the above)
you are as protected as you can be without going completely TOR.
edit: wrote origin after uBlock
We are on eduroam but we do not want to setup plex. Because everyone keeps guessing about specifics: The instance is sharing a huge chunk of researchdata over eduroam without some intermediary server.