eYredWkae3QVaX8b's recent activity

  1. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    We are on eduroam but we do not want to setup plex. Because everyone keeps guessing about specifics: The instance is sharing a huge chunk of researchdata over eduroam without some intermediary server.

    We are on eduroam but we do not want to setup plex. Because everyone keeps guessing about specifics: The instance is sharing a huge chunk of researchdata over eduroam without some intermediary server.

  2. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    We are on the same subnet, but it's possible that i have a wifi connection into the network and my friend is connected with an ethernet cable. So there is at least one extra device. NAT is a whole...

    We are on the same subnet, but it's possible that i have a wifi connection into the network and my friend is connected with an ethernet cable. So there is at least one extra device. NAT is a whole different beast, which can be defeated by ssh tunnels if you don't have network control.

    1 vote
  3. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    Of course other methods are much easier than this. But the point is to use the network

    Of course other methods are much easier than this. But the point is to use the network

    2 votes
  4. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    They are in their right to deny traffic, but not based on the content of the packet. Having said that, your key-lending analogy really sucks for this particular situation.

    They are in their right to deny traffic, but not based on the content of the packet. Having said that, your key-lending analogy really sucks for this particular situation.

    1 vote
  5. Comment on File sharing over a network in ~comp

  6. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    It shouldn't matter. If network access is provided to both of us, the contents of our packets are private and of no concern to the network administrator.

    It shouldn't matter. If network access is provided to both of us, the contents of our packets are private and of no concern to the network administrator.

    2 votes
  7. Comment on <deleted topic> in ~tech

    eYredWkae3QVaX8b
    Link
    There is only /one/ possible way to anonymize a dataset: Randomizing the dataset D such that the resulting dataset D' is drawn from the same distribution as D. This basically, means that the table...

    There is only /one/ possible way to anonymize a dataset: Randomizing the dataset D such that the resulting dataset D' is drawn from the same distribution as D. This basically, means that the table rows don't mean anything on their own but you can learn the same stuff from D' as from D.

    But there is always the utility-privacy trade off. When there is little data, you cannot randomize a lot before you start to lose information. On the other hand if the dataset is large, it becomes possible to make very strong privacy guarantees without throwing information away.

    Randomization is the only way for micro-data to be shared. And as always, there is no free lunch in data mining. It's possible, research has been going since the late '70s on this topic. Companies are just not doing it.

    2 votes
  8. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    That's fine, i don't need help poking holes because i'm perfectly capable of doing so via my vpn, vps, ssh tunnels or wireguard tunnels. The point is to have p2p capability without these. Amish...

    If you want to use a hack to get around that, I won't help with it.

    That's fine, i don't need help poking holes because i'm perfectly capable of doing so via my vpn, vps, ssh tunnels or wireguard tunnels. The point is to have p2p capability without these. Amish p2p, just plain.

    1 vote
  9. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    (edited )
    Link Parent
    This scenario should be legal in any case. The sending party consents with sending the data and the receiving party consents with receiving. The only role of the network hardware is to pass the...

    This scenario should be legal in any case. The sending party consents with sending the data and the receiving party consents with receiving. The only role of the network hardware is to pass the packets containing the data from me, to my friend.

    The problem statement is in my eyes extremely simple: send bits from one machine directly to another, the content is irrelevant, both parties consent. I claim that this impossible in almost all cases where you are a digitally illiterate person that resides in a posibbly restricted network. Because there are always third parties that control the network and their sole goal is to make your life miserable.

    This is just a manifestation of the restriction of digital freedom, because isp/company IT dep. policies assume that almost all people are stupid: They buy IOT devices that are shit, don't have their pc security in order and download any .exe file there is to get. What is a solution? Put them in restricted networks, behind a NAT, with a draconic firewall. Make everything that the internet was designed to do impossible, without centralised control. My argument is that this is erring on the wrong side. Instead of disallowing anything that could be used for bad, they should allow everything that could be used for good. Mission critical systems should instead be air-gapped, or be part of a private intranet. As a rule of thumb: If you can get out, you should be able to get back in.

    4 votes
  10. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    I'll specify it. Should work reliabliy regardless of the device.

    I'll specify it. Should work reliabliy regardless of the device.

    2 votes
  11. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    We've played with this too, but here you assume that incoming traffic is allowed. For all you know it might be blocked, like at the university where all incoming packets are dropped.

    We've played with this too, but here you assume that incoming traffic is allowed. For all you know it might be blocked, like at the university where all incoming packets are dropped.

    4 votes
  12. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    ssh tunneling works in general. Although, we've tried this at the university and they drop all incoming packets.

    ssh tunneling works in general. Although, we've tried this at the university and they drop all incoming packets.

    4 votes
  13. Comment on File sharing over a network in ~comp

    eYredWkae3QVaX8b
    Link Parent
    Because it seems to be a serious challenge. I don't want to share a movie by mailing it, neither do i want to put it on a server of someone i don't know. We've tried torrents of course. But the...

    Because it seems to be a serious challenge. I don't want to share a movie by mailing it, neither do i want to put it on a server of someone i don't know. We've tried torrents of course. But the problem is that there needs to be a way for the DHT to be updated, or you need to run your own tracker.

    This should be something that is easy, just like chat. but it turns out that it's not because almost everyone resides in a severely restricted network. Tbh i don't care what kind of data we send, it's meant to be an instantiation of setting up a pure p2p connection without using someone elses computer.

    2 votes
  14. File sharing over a network

    Me and my friend arrive at an arbitrary place, we have access to a network from there. Now, we want to share a file and the network connection is all we have. The challenge: make the file go from...

    Me and my friend arrive at an arbitrary place, we have access to a network from there. Now, we want to share a file and the network connection is all we have. The challenge: make the file go from my device to my friends device in a pure p2p setting. If you know, for sure, that incoming connections are allowed this is very simple but here i want to explore which solutions exist that do not assume this.

    Assumptions:

    • Same network altough possibly different access points (one might be wired and the other wireless)
    • We have no prior knowledge about the network, incoming traffic might be blocked (outgoing isn't for sure)
    • No extra machines can aid in the transaction (no hole punching etc)
    • Should work reliably for any kind of device that you have free -- as in freedom -- control over. that is PCs, android phones/tablets and macs. most of Apple's other hardware can be excluded because they don't allow for anything anyway.
    • hard mode: We are both digitally illiterate

    Goal:

    • Send a file, p2p, from one party to another.

    Me (MSc cs) and my friend (PhD cs) tried to do this last week. And it appears to be among the hardest problems in CS. I would like to discuss this and hear which solutions you might have for this problem.

    Edits:

    1. this is not an assignment
    2. Added some specifics to the assumption set
    3. we're looking for practical solutions here.
    4. more specs
    10 votes
  15. Comment on This town in Mexico threw out their government. Things couldn't be going better in ~misc

    eYredWkae3QVaX8b
    Link
    Now they sing Beasts of England but life will go on as it always has

    Now they sing Beasts of England but life will go on as it always has

    1 vote
  16. Comment on <deleted topic> in ~tech

    eYredWkae3QVaX8b
    Link
    I have been using posteo.de for over a year now and they are really good, feature rich, fully support all kinds of encryption you might want and they have carddav/caldav, notes, tls sending...

    I have been using posteo.de for over a year now and they are really good, feature rich, fully support all kinds of encryption you might want and they have carddav/caldav, notes, tls sending guarantee, accept cash payments from envelopes, don't require you to put any personal information etc. Good price as well.

    3 votes
  17. Comment on Wikipedia makes the case for Google & Facebook to give back to the commons, rather than just take in ~tech

    eYredWkae3QVaX8b
    Link
    I don't think they will do so without demanding control over the information as well... Wikipedia works well because there is no big entity behind it that might force their ideals onto the...

    I don't think they will do so without demanding control over the information as well... Wikipedia works well because there is no big entity behind it that might force their ideals onto the consumers. I always give when they ask for donations, starting from i was 16. I had next to nothing, but i gave 1 euro nonetheless. Ask yourself this: if wikipedia was a paid service, how much would you be willing to give monthly to keep it as it is? Just donate that much *12 per year. and be done. even if it's a euro, or 5, everything helps them.

    Wikipedia is the last place we can go for information that --- as closely as possible -- resembles the truth and we can not afford losing it.

    3 votes
  18. Comment on Budgeting App in ~tech

    eYredWkae3QVaX8b
    Link
    Gnucash is really good and works on almost all platforms. You have to do syncing between different machines yourself.

    Gnucash is really good and works on almost all platforms. You have to do syncing between different machines yourself.

    1 vote
  19. Comment on Password manager suggestions? in ~tech

    eYredWkae3QVaX8b
    Link
    pass, very easy and it uses your GPG key.

    pass, very easy and it uses your GPG key.

    14 votes
  20. Comment on Firefox Is Back. It’s Time to Give It a Try. in ~tech

    eYredWkae3QVaX8b
    (edited )
    Link
    I have a suggestion for a browser setup that i switched to when quantum came out. I currently run a stripped version of firefox called waterfox, It is very quick and supports the old addons,...

    I have a suggestion for a browser setup that i switched to when quantum came out. I currently run a stripped version of firefox called waterfox, It is very quick and supports the old addons, including unsigned ones.

    If you run Waterfox + this stack of addons (over a VPN, with a pihole dns set up ofc)

    • Decentraleyes (decentralises dependecies)
    • HTTPS everywhere (Forces HTTPS if it's available)
    • NoScript (blocks JS by default)
    • Privacy Badger (blocks trackers)
    • self-destructing cookies (automatically delete cookies)
    • uBlock Origin (blocks ads)
    • Random Agent Spoofer (Spoofs referers, ip, resolutions, against browser fingerprinting because you are very unique when you use the above)

    you are as protected as you can be without going completely TOR.

    edit: wrote origin after uBlock

    5 votes