

Meltdown incoming
Meltdown incoming
That sounds like terrorist talk
/s
I don’t recall the name, but it was a Windows-only tool.
This app sounds like it’s just the recreation of that same tool in Linux. I haven’t tried it yet (I could see some added complexity when using Proton), but I would expect that you could do the same thing with this.
e: nucleus co-op was the name
I’ve used a similar tool to this to play Risk of Rain 2 as a local co-op. Both clients had their own displays, sound and controls (TV+controller and PC) and it worked flawlessly. We were both getting >100FPS @4k and 1080p using a 5700x3D and a 3080.
It’s a nice way to play older multiplayer games that don’t support split-screen.
I just mean that trying to apply the Nazi bar meme to an entire country because people are not immediately surrendering and fleeing the fascists seems kind of counter productive.
Google is paying a pittance to achieve vendor lock-in.
The training may be free but there will be other services which will not be free and the other services will integrate better with the existing ‘free’ Google services better than anything else.
Who’s trying to flee? It’s the fascists that have to go
“employers and taxpayers” is like “job creators”.
They don’t want to say “the ultra wealthy” because that would be too accurate for the owner of the site, who is an ultra wealthy person.
This is legit a fun take on the autobattler genre. Feels like you’re building a character in an RPG. It’s “multiplayer” in that you play other people’s saves so you can learn combos pretty easily.
Definitely recommend
The problem with trying to increase the signal to noise ratio is that you don’t know all of the datapoints that are being collected and some of those datapoints could be used to filter the real from the fake.
Like, in your example, if you made all of these account from the same browser then they could be linked together. If they were made on the same IP, they could be linked together. If you were using the same phone, they could be linked together. Those are just the datapoints that we know to try to protect, it’s the datapoints that you don’t know that get you.
Like, maybe your phone or desktop is screenshotting itself every 5 seconds (“for AI purposes”) or maybe the app that you’re trying to fool also secretly sends your GPS location during account creation or maybe the adversary has malware running on your PC which is keylogging you.
IF you knew all of the ways that they were collecting data on you, then you could take countermeasures. Since you don’t, you have to assume that any of your identities can be linked to your person unless you take unusual measures such, not using Microsoft/Google/Meta/Amazon/etc products at a minimum. Depending on your security needs this could also mean things like using burner hardware, non-commercial VPNs, physically disabling sensors/radios/ports, traffic/network monitoring, etc.
How are they gonna trace that to you?
The modern Internet is essentially about spying on you as much as possible and then selling the data to whoever wants to buy it. Linking identities with devices/browsers is worth a lot of money and so most every website/app has a way of linking you to the devices and software that you use.
Unless the user took some pretty extreme measures to create the account, they’ve likely logged in from a phone/ip/browser that has been linked to their real identity at some point in its lifetime. That link will be sold to data brokers and used to tie the random handle to you, the person. Then the State Department just buys that information.
Alternatively, you should be assuming that sovereign entities with the means are reading all public network data. There’s a lot of information that you can learn from that as well. Like, over time, the posts from the ‘random’ account could be strongly correlated to the times that you were accessing the site even if all of the data was encrypted with HTTPS.
Alternatively, alternatively. There is a threat known as Store Now Decrypt Later (SNDL). The idea is basically: Quantum Computers are coming and they can break some cryptographic primitives. If someone saves all of the encrypted traffic that they would want to read, in a few years they will have the means to read that data. We won’t know when this moment occurs, because it’ll likely be a secret, but we do know that it will happen and so you should additionally assume that anything that isn’t using post-quantum encryption, which transited a public network, will be read and used to link you to your identities.
This is, essentially, the core thing that the Privacy community is attempting to mitigate.
Yup, that’s the death groan.
It’ll run for a few more weeks and eventually it’ll start making that sound all the time and then the motor will freeze up and then magic smoke will signal that the electricity demons have exited its earthly form.
I like the part where it says people are using “The Dark Web” both within the United States and “at the international border”.
Because that would put essentially all computer crimes in ICE jurisdiction.
That would make sense, if it’s educational then it’s probably used to teach about the Caesar/shift cipher
In Steam, add this to the launch options games where you crash in order to enable logging to a text file:
PROTON_LOG=1 %command%
(-from: https://github.com/ValveSoftware/Proton/wiki/Proton-FAQ)
Then there will be a log file of the game in your home directory, named steam-$GAMEID.log.
When you’re reading that log, the error that causes the freeze should be in the end of the log somewhere.
If you just want to log the output of the Steam -d command (if you can’t find a crash in the proton log, for example) you can use tee, explained here since you should not just run random terminal commands you find online without knowing what they do: https://www.geeksforgeeks.org/tee-command-linux-example/
steam -d | tee ~/steam.log
It’ll write the output of steam -d to the terminal so you can read it, and also to the steam.log in your home directory.
No, I don’t.
We’re about to be seeing a lot of people with the wrong political opinions being targeted using this data.
Trump is already calling the protesters terrorists. Using this data to eliminate his political opponents would be pretty on brand for Trump.
Every felon he makes now is one less person voting against him in the next election.
All data.
Your Facebook information, Gmail emails, Insta DMs, etc. It’s all for sale and federal law enforcement are buying it. Things that they would normally need a warrant to get, they can simply pull up from a data broker.
Everything that’s collected is sold. If it is for sale, law enforcement is buying it. Everything is collected.
Snowden showed that this is being done by all major social media sites and email providers in the US.
They either willingly sell their data or are compelled to give access with a National Security Letter.
When you give up data or type a message, assume a federal law enforcement officer is reading it.
They who