This profile is from a federated server and may be incomplete. Browse more on the original instance.

0v0,

I think glider can do this, with -strategy rr (Round Robin mode). I have not used it in this way myself, so you might need to experiment a little. Proxychains can also do this, but it doesn’t present a socks5 interface itself (it uses https://stackoverflow.com/questions/426230/what-is-the-ld-preload-trick, so it won’t work everywhere).

EndeavourOS encrypted partition

I installed endeavourOS 2 days ago and then, the next day, there was a newnrelease of endeavourOS. It’s supposed to have better encryption. Is it possible to upgrade encryption on Linux? An unrelated question: is it possible to change the password of an encrypted partition? I’m a beginner, so please explain your magical...

0v0,

GRUB works just fine with LUKS2 these days. There is no need to switch bootloaders.

0v0,

Argon2id (cryptsetup default) and Argon2i PBKDFs are not supported (GRUB bug ), only PBKDF2 is.

There is this patch, although I have not tested it myself. There is always cryptsetup luksAddKey --pbkdf pbkdf2.

BTRFS and moving /home to subvolume, in need of a sanity check.

So I installed Debian 12 with btrfs and apparently it only uses a single subvolume rootfs. I would like to have my /home in a separate subvolume (and possibly /var too I guess) and with a flat subvolume structure. I started figuring out on how to do it and I feel like I’m not entirely sure yet so I need a sanity check....

0v0,

This seems right and exactly the way I’ve set it up. On subvolid=5 I have subvolumes @ and @home, in /etc/fstab I mount / as subvol=@, and /home as subvol=@home.

0v0,

stackoverflow.com/…/how-does-user-js-work-in-fire…:

It just looks like a JavaScript file. Once upon a time in Netscape 3 and maybe 4 it actually was, but now it’s just a file with a .js extension and a very restricted syntax that’s parsed by a separate (non-JS) parser and not executed in any way.

0v0,

Funny enough I arrive at this the most when I play the Triassic and my opponent goes for a Cretaceous game structure.

0v0,

Possibly X. subtomentosus, based on the cracks on the cap. What kind of tree was it found next to?

0v0,

The ecology supports it then. S. variegatus would have been found near pine.

0v0,

We have those on I2P already, see tracker2.postman.i2p for example.

0v0,

Was it found near birch? Possibly Leccinum scabrum.

0v0,

You should not torrent over the tor network, but you can torrent over the I2P network. qBittorrent even has experimental I2P support built in.

0v0,

Have you tried running tcpdump / wireshark on another device in the network when this happened?

0v0,

I’m not on NixOS, but I have a decent working knowledge of Tor.

Not quite clear on what you’re trying to do, are you trying to run a relay, or just connecting to the Tor network and pointing your browser to the socks proxy?

Arti (the official Tor implementation in Rust) is not a complete replacement for the Tor C implementation yet. Hidden service support is disabled by default (due to the lack of a security feature that could allow guard discovery attacks), and bridges don’t work either. If you don’t understand Tor very well stick with the old router.

0v0,

Here is a config template to run an obfs4 bridge, make changes as required:


<span style="color:#323232;">BridgeRelay 1
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Replace "TODO1" with a Tor port of your choice.
</span><span style="color:#323232;"># This port must be externally reachable.
</span><span style="color:#323232;"># Avoid port 9001 because it's commonly associated with Tor and censors may be scanning the Internet for this port.
</span><span style="color:#323232;">ORPort TODO1
</span><span style="color:#323232;">
</span><span style="color:#323232;">ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Replace "TODO2" with an obfs4 port of your choice.
</span><span style="color:#323232;"># This port must be externally reachable and must be different from the one specified for ORPort.
</span><span style="color:#323232;"># Avoid port 9001 because it's commonly associated with Tor and censors may be scanning the Internet for this port.
</span><span style="color:#323232;">ServerTransportListenAddr obfs4 0.0.0.0:TODO2
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Local communication port between Tor and obfs4.  Always set this to "auto".
</span><span style="color:#323232;"># "Ext" means "extended", not "external".  Don't try to set a specific port number, nor listen on 0.0.0.0.
</span><span style="color:#323232;">ExtORPort auto
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Replace "" with your email address so we can contact you if there are problems with your bridge.
</span><span style="color:#323232;"># This is optional but encouraged.
</span><span style="color:#323232;">ContactInfo 
</span><span style="color:#323232;">
</span><span style="color:#323232;"># Pick a nickname that you like for your bridge.  This is optional.
</span><span style="color:#323232;">Nickname PickANickname
</span>

You can also use the reachability test to check if everything is configured correctly. If it is reachable and bootstrapping reaches 100% you should be set.

Set SocksPort if you want to connect your browser (don’t confuse this with ORPort). Default is localhost:9050.

0v0,

I thought about torrents, but found no way to do that privately either.

You can torrent privately using I2P (It’s like Tor but peer-to-peer). The Java router comes with a pre-installed torrent client, accessible from the console. After installing and setting up your browser you can browse the main tracker at tracker2.postman.i2p.

Being logged out on refresh, Firefox

I am experiencing weird behavior on both lemmy.ml and lemmy.ca where refreshing, or closing and reopening my browser, will cause me to be logged out. This seems to be an issue with my browser, Firefox 102.13 on Debian Bookworm, but it does not happen with any other sites with logins. I have tried clearing cookies and site data...

0v0,

I occasionally experience the same thing. When this happens, it appears the jwt token is not sent with the initial request (thus appearing to be logged out), but it is sent with api requests on the same page (unread_count, list, etc.), so the cookie is not lost (document.cookie also shows it). Sometimes refreshing again fixes it, but I haven’t yet found a good workaround. I’ll experiment a bit next time it happens.

0v0,

The snowflake proxy acts as a bridge to the tor network at the entry side. If by repercussions you mean risk of exit-node traffic, there are none. It might cost a little bit of bandwidth.

0v0,

Indeed. This works because direct connections to the tor network are easily censored, but WebRTC is not (not without a lot of collateral damage at least).

0v0,

Memory safety would be the main advantage.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines