> then dont call your server FREE SPEECH EXTREMIST
Hey, it's been a while since I got one of these "YOU HAVE TO RENAME YOUR SERVER" demands. Look up what "arbiter" means before the orderlies take you back to your room.
Alex to my knowledge has little to no involvement with the Btrf.ly service.
I do agree Dutch, I'm not a fan with small services that host clusters. For the very case if something fucks up you are basically reliant on 1 guy for mutiple servers.
This is a youtube tracking token. They have recently started adding it to URLs so that they can trace the spread of links across disparate sites. Your Youtube session (hope you don't have a Google account, or at minimum you have not logged into it) is now associated with everyone that clicked that link, and since the default config for most of these servers is to respect the OGP data and Twitter cards, which means several servers fetched that link, there's possibly a trail back to your fedi account.
At any rate, I recognize the "Petrol Hour" thing, I'm not gonna sit through those tedious retards to figure any of this out: if nobody bothered to write it down, it's probably not important, and I don't want to turn off the music. (Some really good music, man, you can check my Baest/SPW accounts, the "scrobble" (still a really stupid word) data should cover it.)
> so he can have your info on his DB despite deleting your sccount.
I'm not even sure what that means. I think I'd know about it if that were the case, because I've seen shit go down and jumped in to help, but graf had already scrubbed the account so I could not get some of the information required to figure out the pattern until the spammer made another account.
> back in the day i asked both Claire and Graf about a Delete everything panic button
Maybe you should have looked under "Settings". I just checked, it's there.
> because they like going true's people private messages
Holy shit, you're retarded. I didn't interact with Claire much (beyond giving her an impromptu survival guide and some suggestions for server setup), but graf doesn't rifle through your DMs.
But even if he did, do you really think that if you delete your account, this magically reaches into the DB backups and removes all of your data from there, too? This is what I was saying about being paranoid about the wrong shit. Your only option is to stop expecting to control information that has left your computer: either don't transmit anything that would be bad for you if it became public, or run your own server and still don't transmit anything that would be bad for you if it became public. there_is_a_delete_button.png
>...because a tiny mail server with a few people on it, none of whom have ever sent any kind of bulk email, is a horrifying spam risk.
Most email services with the exception of maybe mailchimp and proton do that.
Happens with me too, I just have constant communication and whitelist the sender if I detect it in the spam folder. Most likely, at least in my experience, the url may have been identified as spam and was indicated as much. Companies get that automatically and auto generate spam lists.
>Poking graf and getting dropped from Poast isn't a big deal
Sure it isn't the worst thing that has happen to me by a long shot, but to pay server and getting defed for only one person getting butt hurt is pretty pathetic. And poast isn't the only instance I'm talking about.
Imagine defederating seal.cafe because of only bot. It's very petty if you ask me to hide your users to an entire instance because of 1 user.
Issues with users for being "mean" should be handled by user settings (aka block) first than the big ol ban hammer.
Also not to mention his fuckery with reporting instances to their datacenter to take down sites he dislikes.
> but Google isn't the only ones, > What's that matter?
Because any company big or small should not take and sell your data period.
Not really worried about the dude. I like making fun of him and to call him out when a being hypocrite.
Also I can shit on Google all I want (which btw I have) but I'm not banned or IP blocked from their services. Graf decided that because I make fun of him that it's justifiable to defed my entire instance to 10k accounts, instead of using the block button.
Which dude that's way more fucked and you know it.
Yeah data tracking is horrendous, but Google isn't the only ones, most ISP are taking your meta data and selling it.
> Which dude that's way more fucked and you know it.
Nothing Poast could possibly do would be as fucked as Google. My mail server gets inundated with spam from GMail accounts but for a while, Google was silently discarding my email without telling me, because a tiny mail server with a few people on it, none of whom have ever sent any kind of bulk email, is a horrifying spam risk. This has cost me time and money. Poking graf and getting dropped from Poast isn't a big deal: I have lost work because I didn't know GMail was silently dropping my email.
> but Google isn't the only ones,
What's that matter?
> most ISP are taking your meta data and selling it.
I use Tor, I recommend people use Tor. Most of the sites that block Tor are bullshit sites I don't want to use to begin with, people's mileage may vary. Privoxy does a good job of letting you whitelist stuff, send some stuff to Tor and some stuff through the clearnet, it's pretty useful. I just stay on Tor: usually, a site that blocks Tor is not a site I would like to use. ytcracker--s.p.a.m.2.mp3
> I've done nothing illegal on my instance. > But I understand the hesitation.
It's not about things that are illegal now or things that might become illegal in the future, it's feeding Google. Same shit as using Chrome (through which they now feed their analytics engine the "interest groups" data), you don't want to feed them, or if you don't mind feeding Google (why are you worried about graf but completely blase about Eric Schmidt?), there are a lot of people that do not want to feed Google.
>This is a youtube tracking token. They have recently started adding it to URLs so that they can trace the spread of links across disparate sites. >I recognize the "Petrol Hour" thing I'm not gonna sit through those tedious retards to figure any of this out
All fair points 😂 even though it's a 4 minute clip the point was to show Sven's disgruntleness when he deleted his account and to find out that his data was still retained.
>there's possibly a trail back to your fedi account. It has, not a big deal for me. I've done nothing illegal on my instance.
> from leaked NSA documents i've read and court indictions i've perused, i hypothesize that you stand out quite a lot using tor.
If it were more common, it wouldn't make anyone stand out. Just mentioning XKeyscore/Echelon/Carnivore/etc. probably has landed people on lists, but here's something you may not have known: visiting LWN or the LKML archives got people flagged and added to a watchlist by the NSA for a while. Maybe Linux isn't on the list any more; cryptocurrency-related activity probably is, but I have bad news if you think a proxy is less suspicious than Tor, because nearly all proxy services are on the list. Expect that you stand out if you have *any* technical interests if your traffic looks meaningfully different from "zoomer on Tiktok" or "boomer on Facebook".
> i do not know your threat model,
I'm not really worried about the internet nutcases (though there is no reason to make anything easy for anyone, they so far seem incompetent), but the government hates encryption and anonymity and if no one exercises the rights, then we don't keep them. So there are three components: (1) being more trouble than I'm worth (sure, NSA supercomputer under the desert: is it worth millions of dollars to crack my keys?), (2) raising the bar that the government would have to jump over in order to destroy civilization as we know it, and (3) I can, so I do.
In the 1990s, Bill Clinton tried to illegalize encryption: would you rather have encryption or not? I'm glad it exists. I suspect that operating FSE raises the expected value of cracking a fellow, so it's better to take whatever steps I can. Look at the chudbuds.lol admin: she probably would have had no trouble keeping her taxes and legal documents and nudes and whatnot on the same computer she used for gaming if she hadn't also been running a fedi node and doing political streams on Twitch. I do not plan to be the weak spot for any service I run.
> i am not even pretending to defend against a nation state level attack
I don't expect that the car is safe from cruise missiles or a 35mm chain gun, but I still wear a seatbelt. The seatbelt's utility in terms of keeping my head from going through the windshield is relevant whether or not the seatbelt's utility is nearly zero for stopping bullets.
I like the point you raise about traffic being different from tiktok/facebook. To be entirely frank, if it were up to me to design such a system, I would probably use that as a first pass myself.
It is speculation on my part, but I suspect that the lists which contain people whose traffic is meaningfully different from tiktok zoomer et al and the lists which contain people who use Tor are not the same lists. I've not seen any documents that describe the sort of lists that spies keep on citizens, but it is unlikely to be something I will find well-engineered.
>but here's something you may not have known: visiting LWN or the LKML archives got people flagged and added to a watchlist by the NSA for a while. I certainly was not aware of this. Looking briefly, I see that this was a controversy from 2010. I doubt anything has improved.
>it if it were more common. I would already be using it if it this were the case.
In the end, I want to emphasize that many individuals of a technical mindset place too much faith in intsec and deeply underemphasize fundamental security practices such as compartmentalization, discretion, and inconspicuous. Discussions are often about Tor, about proxies, but you never hear anyone say to buy a second computer. And if you read about cases such as the silk road raid, those criminals are nearly always done in by a lack of basic security fundamentals. It may be an extreme comparison, but there's no point in using Tor if your browser has facebook cookies.
>if you think a proxy is less suspicious than Tor, because nearly all proxy services are on the list. I was not aware of this. If anyone else had said as much to me, I would not have believed it. I looked briefly online but was not able to find any details, so i hope that you can recall a hint that helps me search for more to read about.
@p@DutchBoomerMan@NonPlayableClown@SarahGation from leaked NSA documents i've read and court indictions i've perused, i hypothesize that you stand out quite a lot using tor. sometimes it is better to not stand out than it is to be technically secure. for this reason, i think your comparison is not fair. after all, nobody will stop you from buying groceries if you have a ski mask on either. ultimately, i'm really only concerned with internet nutcases. and these sorts of people are completely defeated with basic fingerprint protection and a cheap proxy. i do not know your threat model, but i am not even pretending to defend against a nation state level attack - it is much better to avoid it in the first place by being a boring person doing boring people things.