

I’m honestly surprised it’s not the #1 most pirated movie of all time exactly for this reason.


I’m honestly surprised it’s not the #1 most pirated movie of all time exactly for this reason.


If it’s strictly for personal use, Nextcloud can do this easily (no upload required since the client handles the sync), although it’s a very heavyweight way to do it and for security reasons most people probably have Nextcloud set up behind a VPN-wall like Tailscale or something so it may not work for you.
However, it technically has a share link feature that does exactly this. If you’re using the desktop or mobile client you just have to put it in one of Nextcloud’s sync folders and then right click on it or whatever to get a share link to the file. You can also do it through the web UI (both the upload itself and getting the link to it) You can make the share link public and permanent so anyone who can access the Nextcloud server can get access to that file through the link.
Worth considering if you already have a Nextcloud instance. Alternately, if you aren’t already using Nextcloud for sensitive personal files, and just want a repository of silly meme images you can share freely, giving public access to it (it’s still locked behind an account for upload and general access) isn’t that much of a security concern and then your public links should work just fine.
If you want something that is more of a social media site and image gallery like Imgur is, maybe Immich can handle some of that, but if your goal is simply sharing image file links, I’d focus on looking for things that are more for sharing files, since images are just files and it doesn’t sound like you need all the complex image-specific handling really.


Agree, I don’t blame the people becoming cynical and distrustful, I think that’s a totally rational and valid response to the current situation. I blame the people (government representatives and companies, more to the point) who are making this the situation in the first place.
I don’t want to live in a world where we trust no-one and nothing. But it’s delusional not to see that we do live in a world that is rapidly moving that direction. We need to do something (a lot of things) to stop it, but we also can’t pretend it’s not happening.


No, that is what it would be if we were using traditional, deterministic compression and using a reversible and verifiable mapping of data. But this is the new era of memetic compression, “Pied Piper” is what everyone remembers from the show, so we compress it to “Pied Piper” to minimize the amount of memetic overhead and allow the smallest possible compression artifact. Like with “AI”, it doesn’t need to be correct, just close enough for people to think it is! /s
He probably still has stock options he needs to vest. Can’t let the bubble pop yet, there’s still money to be squeezed out of it.


No, you are definitely not the only one. I tend to be more judgemental of projects that contain prolific use of emojis in general, but that has been ongoing since before AI became popular.
Running it as a VM or even on a server that is running other services and potentially competing for I/O or memory bandwidth also introduces many other potential sources of inefficiency. I always recommend running a firewall on dedicated bare metal hardware, it is a very specialized task with very particular requirements on behalf of both the hardware and the software and it has very little tolerance for other sources of latency or delays. That doesn’t mean you need to use a pre-built appliance, but it does explain why it’s so common, and running it on a VM on a server that is doing other stuff is likely contributing to your issues significantly.
Personally, I run my firewall/router on a very stripped-down Debian with almost no non-essential services and a custom built kernel. I hand-picked a multi-port PCIe x4 Intel NIC with good Linux compatibility and drivers, and I’m using foomuuri to handle the routing and kea to handle DHCP/DNS for my internal network. This is a very minimal, bare-bones configuration and I wouldn’t really recommend it unless you really know what you’re doing, and it’s absolutely not “idiot mode networking” and if that’s what you want you’re going to have a real bad time if you try to follow in my footsteps, because I am a very different kind of idiot. But it works for me, so it’s proof that it is possible.


wat. “hard to get anything to run”? It’s probably hard if you’re completely new to it, yeah, but Is that just because you don’t know how to use proton and wine? were you trying to pirate linux native versions? Were you using a gaming-oriented distro? And do you know how that distro is supposed to work?
Most Linux distributions you’ve heard of before like, this year, are probably boring, “stable long term support” (out of date) corporate-office-based and programmer-friendly distros and trying to run games on them is like trying to run Windows games on Windows Server Edition. It’s a nightmare, because it’s not intended for gaming, and everything is going to feel like a horrible hack because it is and it sucks don’t do that.
Use Gaming distros for gaming. Use Windows versions of games. Don’t overthink it, pretend you’re on Windows. Forget you’re on even Linux, this is Windows 12 Nobara Edition. Let Proton and Wine and Bottles and launchers like Heroic handle the dirty work of actually managing all that shit for you. There are a few things you will need to figure out how to translate the Windows-focused installation instructions the lazy pirate guys tell you into Linux-compatible installation instructions, because nobody is going to do that for you. It’s not hard, it just takes a little bit of experience and knowledge, which you probably don’t have yet. But once you do, you’re off to the races and everything runs fine. There might be a few hiccups here and there, but there are when you’re first setting up Windows too. Most of the time, with most stuff, it just fucking works. Source: trust me bro.
I consider the article’s criticisms of SMTP, HTTP, XMPP, etc. (and IRC which was not mentioned but falls in the same category) to be positive and desirable traits and I think it’s a shame that the article characterizes them negatively. HTTP’s job is not to prevent corporate takeover of the web and I don’t think it should be. That’s our job, as people. The protocol’s job is to remain neutral so that when corporate takeover of the web happens, HTTP is still there, open to everybody, providing an offramp to escape it, because it’s neutral. It doesn’t belong to the corporations. It belongs to everybody. They can try to take it over if they wish, embrace and extend, but they can’t extinguish a fire that’s smoldering underground no matter how hard they try. It will always be there, ready to flare up at a moment’s notice. The original is always still there ready for us to revert to using it at any time.
And many of us already have. Fuck Google, fuck Cloudflare, fuck AWS, they’ll never take the web from us.


You might be underestimating how much damage a .22 round to can do to something, especially when that something is probably at least like 60% lithium ion battery by volume. Yeah, .22s are small by bullet standards and have low stopping power, but they’re still lethal.
That said, if you’ve got a 308 handy, that’ll work reliably too. You won’t be silencing it, but feel free to blow a hole clean through one of these machines and enjoy the fireworks when its battery lights off.


There are plenty of tards out there living really kick-ass lives. My first wife was tarded. She’s a pilot president now.


If it’s legally not considered copy-pasting their monsters, why do you feel like you can assert that it is plagiarism? I suppose that’s your opinion, and you’re entitled to it, but I also think people have a right to call you out on it for saying it as if it’s a fact when it is not actually a recognized fact. Plenty of people would dispute that, including myself, and certainly Pocketpair would, and evidence suggests the courts probably would’ve agreed with them hence it wasn’t even worth pursuing legally.


I know I can probably find this specific link if I go hunting for it, but I’m wondering if anyone knows of a community/tracker/source where these sort of videos and torrents tend to get posted. I’m curious about lots of political data dumps and leaks, particularly Epstein related stuff, and even conspiracy stuff sometimes, even though I’m not super into conspiracies sometimes it’s interesting, and goddamn does Youtube get tiresome for that sort of content with its ‘unaliving’ and bleeping out ‘s**cide’ and all the tedious censorship. The post mentions the data hoarder subreddit, which I’ve lurked around before but a) reddit sucks and b) I’m wondering if there are alternatives.


It might be the end of GPL-type licenses. But, at least as far as I’ve understood it, the point of copyleft was to use copyright against itself in the first place, because copyright sucks, and at the end of the day we don’t really want copyright OR copyleft. They’re both asserting “ownership” of stuff that honestly belongs in the public domain free to all humans to use (in an ideal world, that doesn’t contain evil corporations that are considered people for some reason). We already know copyleft open source has been widely abused in proprietary software. This is not new nor surprising. We gave them the richly deserved middle finger whenever we could find out they did it before, and we hate it, but it was never “the end” of open source software because making it publicly available is precisely the defiance we are ultimately aiming for and we will always do that no matter how much they steal it and make it closed source.
People making closed source software are the enemy, and our war of freedom against them continues regardless of what tactics they use to demean our efforts while they make their closed source software. We will never let them win. They think they’ve found a new way around the GPL, that’s a shame, but so be it. The arms race will continue, but open source will not go away, because the point of it has nothing to do with meekly relying on the law to allow open source to exist, that’s just a method that has been used, with some success, and allowed a lot of people to turn it into a livelihood, and it will be a terrible shame to lose that.
Those things are not the true goal of open source though. The intention of open source, is to not let proprietary, hidden software dictate the fate of humanity and we will do it for as long as we have to. We’ll do it if we’re protected by copyleft, we’ll do it if we’re not. We’ll still do it even if they make it illegal, and we’ll call it reverse engineering, hacking, and piracy if we have to. Because the information and code that humanity relies on must be free, not owned.


It always gets dark before the dawn. This system sucks and is evil. I expect its collapse to be even more evil, but I’m looking forward to building something better.


Ironic that they have their repos hiding behind Cloudflare, then.


That may have been the intention but I doubt it ever worked as effectively as they claimed it would. Besides, it will probably cost at least 1 AI data-center of carbon emissions to continuously surveil all these people with TPMS sensors, so the argument could be made that you’re actually reducing carbon pollution at this point by removing yours.


Anything you post on the internet is public knowledge forever. End of discussion. Most people won’t care at all, in most cases almost nobody or perhaps even literally nobody will ever even see it, but the harder you try to hide it, the more the Streisand Effect will magnify it until eventually everyone knows about it.
Anyone telling you they’ll delete your data from the internet without clarifying that it is in fact impossible, is at worst deliberately lying to you usually for their own benefit, and at best making a promise they literally have zero ability to keep.
I would hope that Fediverse services will never lie to you and tell you your data is deleted, because it can’t be.


I’m going down the rabbit hole and people are forced to queue up for what I’m assuming is the equivalent of a serial key?
Not quite. A serial key is permanent, it lasts forever, although some software did try to use online and update services to identify bad serials this was trivial to block, because it’s essentially trying to backpedal a valid key into an invalid one. It only needs to be valid once, then you make sure to block anything that invalidates it afterwards (usually blocking the update servers at the DNS level), job done.
That’s different from a token. Tokens use something along the lines of at least rolling-code type security, similar to how your car keys or garage door opener keep generating new codes so someone with a scanner can’t just record the code it uses once and then have that be copied and replayed over and over again indefinitely. The trick with a token like this is that you need to keep updating it or it becomes invalid after some timeframe or number of uses. Hence the online activation. That’s required to get your next token or set of tokens.
I interpreted it to mean “troll your friends with it” and I just took that and ran with it, but honestly I have no idea and I might be completely wrong, that’s what I’m going to stick with though.