🇨🇦

  • 9 Posts
  • 211 Comments
Joined 3 years ago
cake
Cake day: July 1st, 2023

help-circle


  • Another 30+ years of “terrorists”

    America claims its attacks are to stop ‘terrorists’, but it’s exactly those actions that are creating ‘terrorists’. And they’re fully justified in becoming ‘terrorists’ imo.

    If I lived in Iran, I’d certainly want revenge for this.

    (here I’m using the word terrorist to mean ‘enemy of America~s administration~’, as that’s what America has turned that word into)


    Prior to this attack, as well as the bunker busters dropped last year: I do not believe Iran is/was creating nuclear weapons.

    Since these two attacks however, I believe they’d be justified in seeking such weapons simply because America has proven over and over that no nation is safe without them.

    In short; I don’t think they are/were, but I do think they should be in response. As much as I don’t like nuclear proliferation, I’m much much more against deliberately killing innocents, particularly children.


    Perhaps I’d have a different opinion if America/Israel struck military targets; but they didn’t. They struck homes, schools, and other civilians.

    America is truly a Terrorist State, if not just a lap dog of Israel’s genocidal regime.




  • If you have a static IP address, you can just use A records for each subdomain you want to use and not really worry about it.

    If you do not have a static IP address, you may want to use one single A record, usually your base domain (example.com), then CNAME records for each of your subdomains.

    A CNAME record is used to point one name at another name, in this case your base domain. This way, when your IP address changes, you only have to change the one A record and all the CNAME records will point at that new IP as well.

    Example:

    A example.com 1.2.3.4

    CNAME sub1.example.com example.com

    CNAME sub2.example.com example.com

    You’d then use a tool like ACME.sh to automatically update that single A record when your IP changes.



  • Good, maybe the masses will finally abandon that garbage.

    I’m so sick of being directed to a fucking Discord server when I’m looking for a projects forums, especially when researching a specific problem.

    Add on their forced arbitration terms and I’d rather abandon projects/creators that use discord vs support them. I’m not giving up my legal rights just to ask a common question that I should be able to find with a google search. (but can’t because all the answers are on discord instead of a public forum)








  • Your ISP could snitch on you for tons of ‘illegal’ traffic, but they don’t because that would require deep packet inspection on an absurd amount of traffic and they gain nothing for it. Instead they pass on notices when they receive them from third parties, and take enforcement actions (like cutting off their service to you) only when they’re directed to. They want your money after all.

    Torrenting for example; only gets flagged when copyright holders join torrent trackers, then send letters to ISPs that control the IPs found in those groups. That’s not the ISP hunting you down, they’re just passing on a legal notice they’ve been given and thus are obligated to pass it to you.

    From and ISPs perspective; a VPN connection doesn’t look any different than any other TLS connection, ie https. There’s nothing for them to snitch because a) they can’t tell the difference without significant investment to capture and perform deep analysis on traffic at an absurd scale and b) they have no desire to even look and then snitch on customers, that just costs them paying customers.

    The ONLY reason this can be enforced at all, is because comercial VPN companies want to advertise and sell their services to customers; so lawmakers can directly view and monitor those services.

    Lawmakers have no way of even knowing about, let alone inspecting an individuals private VPN that’s either running from private systems or from a foreign VPS.


    All that’s not even touching things like SSH tunneling - in a sense, creating a VPN from an SSH connection; one of the most ubiquitous protocols for controlling server infrastructure around the globe. Even if traffic was inspected to find SSH connections, you CAN’T block this or you disrupt IT infrastructure at such an alarming scale there’d be riots.



  • I don’t really see this as surprising. Drones have been used in mass coordinated swarms for things like new years light displays for years.

    It was only a matter of time that gets used as a weapon system/platform.

    A swarm doesn’t give you much advantage over a single drone though. There’s more targets to shoot down, so perhaps there’s a better chance of getting one through drone defenses; but they also lose the stealth factor a single drone brings… Maybe a really wide surveillance view if you combine their camera feeds?

    IDK, doesn’t really seem all that beneficial.