• 0 Posts
  • 45 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle
  • But how will you get a “universal” view of the fediverse? No single authoritative view exists.

    You yourself acknowledge that this is complicated, but I honestly don’t understand what appeal a hacked together fake centralized system would have for people if they don’t care about decentralization in the first place. Any such solution is almost inevitably gonna end up being janky and hacked together just to present a façade of worse Reddit.

    Lemmy’s strength is its decentralization and federation. It’s not a problem to be solved, it’s a feature that’s attractive in its own right. It doesn’t need mass appeal, it’s a niche project and probably always will be. I don’t think papering over the fundamental design of the software will make it meaningfully more attractive to the non-technically minded.


  • Yes, but only if your firewall is set to reject instead of drop. The documentation you linked mentions this; that’s why open ports are listed as open|filtered because any port that’s “open” might actually be being filtered (dropped).

    On a modern firewall, an nmap scan will show every port as open|filtered, regardless of whether it’s open or not.

    Edit: Here’s the relevant bit from the documentation:

    The most curious element of this table may be the open|filtered state. It is a symptom of the biggest challenges with UDP scanning: open ports rarely respond to empty probes. Those ports for which Nmap has a protocol-specific payload are more likely to get a response and be marked open, but for the rest, the target TCP/IP stack simply passes the empty packet up to a listening application, which usually discards it immediately as invalid. If ports in all other states would respond, then open ports could all be deduced by elimination. Unfortunately, firewalls and filtering devices are also known to drop packets without responding. So when Nmap receives no response after several attempts, it cannot determine whether the port is open or filtered. When Nmap was released, filtering devices were rare enough that Nmap could (and did) simply assume that the port was open. The Internet is better guarded now, so Nmap changed in 2004 (version 3.70) to report non-responsive UDP ports as open|filtered instead.



  • The “make a fork” thing is part of the issue, I think. In general there’s this culture in the open source community that if you want a feature, you should implement it yourself and not expect the maintainers to implement it for you. And that’s good advice to some extent, it’s great to encourage more people to volunteer and it’s great to discourage entitlement.

    But on the other hand, this is toxic because not everyone can contribute. Telling non-technical users to “make it yourself” is essentially telling them to fuck off. To use the house metaphor, people don’t usually need to design and renovate their houses on their own, because that’s not their skillset, and it’s unreasonable to expect that anyone who wants a house should become an architect.

    Even among technical users, there are reasons they can’t contribute. Not everyone has time to contribute to FOSS, and that’s especially notable for non-programmers who would have to get comfortable with writing code and contributing in the first place.



  • Melmi@lemmy.blahaj.zonetoSelfhosted@lemmy.worldReverse proxy
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 months ago

    It definitely encrypts the traffic, the problem is that it encrypts the traffic in a recognizable way that DPI can recognize. It’s easy for someone snooping on your traffic to tell that you’re using Wireguard, but because it’s encrypted they can’t tell the content of the message.






  • Most things should be behind Authelia. It’s hard to know how to help without knowing what exactly you’re doing with it but generally speaking Authelia means you can have SSO+2FA for every app, even apps that don’t provide it by default.

    It also means that if you have users, you don’t need them to store a bunch of passwords.

    One big thing to keep in mind is that anything with its own login system may be more involved to get working behind Authelia, like Nextcloud.


  • Melmi@lemmy.blahaj.zonetoLinux@lemmy.mlHow do you say SUSE?
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 months ago

    Except GNU is a great example of an acronym that is pronounceable. It’s even in the dictionary. The GNU mascot is a gnu, in fact.

    LGBTQIA+ is essentially unpronounceable, thus we treat it as an initialism. Not that that’s a requirement, there are examples like VIP where even though we could pronounce it we pronounce each letter individually.


  • That’s I guess why CSEM is used, because if the images are being shared around exploitation has clearly occurred. I can see where you’re coming from though.

    What I will say is that there are some weird laws around it, and there have even been cases where kids have been convicted of producing child pornography… of themselves. It’s a bizarre situation. If anything, seems like abuse of the court system at that point.

    Luckily a lot of places have been patching the holes in their laws.



  • This is certainly an interesting topic. There are men who are comfortable wearing dresses and wearing makeup and all that, just as there are women who are comfortable with cutting their hair short and wearing baggy clothes and all that. It’s also true that those people are sometimes harassed and called “eggs” by people who are ostensibly trans-friendly (especially fem-presenting guys).

    But I don’t think that that is equivalent to the trans experience. I assume you’re not trans, correct me if I’m wrong, but dysphoria is a real thing that for many people is very deeply related to physical body parts, and your theory just doesn’t account for that at all. I don’t think that your average fem-presenting guy wants to take HRT to get breasts, let alone go to the extra length of getting bottom surgery and get vaginoplasty. There’s clearly something more about dysphoria than it just being a matter of what they like differing from what’s socially acceptable, unless you broaden it so wide as “liking having breasts or a vagina” or “liking having a penis”, and even that is a stretch because dysphoria is a very visceral sense of wrongness in one’s body that goes much deeper than just preferring a different body part.

    Not all dysphoria is physical, either. It can relate to misgendering, or any number of societal things that aren’t necessarily related to just what we’re “allowed” to do. Frankly, unless gender is outright abolished and there are no longer distinctions between genders or even societal differentiation between sexes, I don’t see it going away. And even in a post-gender world, I imagine there would still be trans people (perhaps by another name) who experienced physical dysphoria.

    Your theory also doesn’t account for trans people who present as would be socially acceptable for their assigned gender at birth, and have interests that are similar to their AGAB, but still identify as trans and even may experience dysphoria.

    All in all, while I appreciate your conclusion to support trans people, I disagree with your reasoning. I don’t think that being trans is merely a result of one’s likes not being in line with societal norms. I think it goes much deeper than that, and can’t be reduced to such a simple cause.




  • Why would a random browser extension take it upon itself to snoop on your traffic to ensure that the websites you’re using can’t be used for illegal things, and then intentionally break it if it detects something it thinks it’s illegitimate? That’s a huge breach of privacy. It’s just malware at that point. It’s not like a court of law would hold your browser extensions responsible for your piracy. That’s like blaming a cup holder because the car was used in a robbery.

    No, I think this is just a bug. Especially since people have reported that the extension breaks other websites too.


  • I love to be able to reclaim works from their hateful authors, especially cultural ones. I’m a big fan of Lovecraft, and that dude was hateful. He makes JK Rowling look sweet and kindly. But it’s a lot easier to reclaim the narrative and make it a part of our culture when the author is literally dead.

    Lovecraft is a cornerstone of modern fiction, despite being a bigot. We can acknowledge how he was a terrible person, even analyze it, but we know that our enjoyment of Lovecraftian fiction isn’t benefiting Lovecraft’s hateful causes, especially because the work is public domain.

    In contrast, JK Rowling is not only still alive, she is active and vocal about her hatred, how she spends her money towards hate, and how she considers support of Harry Potter in light of her hate to be support of her vile views.

    Consumption of media is not a passive action. Even if you do not actively give any money to the franchise, promoting the franchise encourages other people to do so, and then their money goes to fund hate.

    I understand that HP is important to a lot of people. It was a cultural phenomenon. But we aren’t leaving it behind just because JK Rowling said something offensive. We’re leaving it behind because the author is actively using our consumption to fund hate and campaigning to deny rights to trans people.

    There are plenty of other forms of media, new and old, that aren’t being piloted by known bigots. If you want a cultural backbone, using one that is currently controlled by a bigot will probably make a lot of trans people feel unwelcome at best and at worst, if HP continues to be a cultural phenomenon on a large scale JK Rowling will use the platform and the money to further the oppression of transgender rights.


  • There’s a difference between defederation policy and ban policy. You could have a server that is very slow to defederate, only defederating for abuse and illegal content that can’t be stopped through moderation, while implementing a standard or even fairly aggressive enforcement policy for individuals, both local users as well as remote users. The idea is that you ban offending users, while only defederating when the instance itself is the problem.

    Defederation splits the network apart. Trying to make defederation a last resort doesn’t necessarily mean one is a freeze peach instance. Defederation policy is an entirely different beast from moderation.

    That said, my understanding is that Lemmy’s moderation tools are pretty lackluster at the moment, and so a big part of the reason that some instances are quick to defederate is that it’s difficult to moderate between poor mod tools and small volunteer mod teams. It’s easier to just defederate.

    I agree though that the freedom of FOSS moreso lies with admins, as they’re the ones deploying the software so they can choose how to run their instance, whether that means federating with everyone or just running a completely defederated Lemmy instance with no peer instances.