

I don’t have what it takes to be a parent
All it takes is the creativity you get when high. You know what fruit kids will eat? Apple chips, Mango chips, dehydrated strawberries, frozen blueberries
The same fruits you crave when really high
“If man chooses oblivion, he can go right on leaving his fate to his political leaders. If he chooses Utopia, he must initiate an enormous education program - immediately, if not sooner.”
-R B Fuiler
I don’t have what it takes to be a parent
All it takes is the creativity you get when high. You know what fruit kids will eat? Apple chips, Mango chips, dehydrated strawberries, frozen blueberries
The same fruits you crave when really high
getting two computers to talk to each other is so so much harder due to NAT traversal
… which is why you will take IPv4 on my home network from my cold, dead hands, and why all IPv6 traffic is blocked in the network that hosts my PC/laptop
Source for this assertion?
China blocks old style bridges like obfs-4. They recently managed to detect some snowflake bridges, but again only against individually targeted users – they can’t find “all Tor users in Shanghai” for example.
I suggest some background reading
https://harpia.pages.torproject.net/support/censorship/connecting-from-china/
suspicion of using a VPN or Tor
My point is that using a VPN is trivially easy to detect, and can be en masse, dragnet style
Tor usage (especially with a bridge) is difficult or impossible to detect, even for nation-states, and to the best of my knowledge is only tractable against specific targeted individuals/machines. It’s not possible to “get a list of all suspected Tor bridge users”, even if you are an ISP
Tor Exit Nodes
Good point. The moment you leave Tor, you lose a lot of its protection.
In theory, exit nodes should completely hide the connection between you the end user and what goes thru the exit node. In practice, exit nodes can leak metadata/side channel info. And they are always susceptible to global network analysis that nation-states are able to use (albeit as far as I know only against targeted individuals, not in mass-surveillance mode)
Tor won’t be affected by this.
Tor bridges are virtually impossible for even major governments to detect, much less block.
Unfortunately it works like any other prohibition: when the regulated legal market goes away, the hard stuff takes over
Eerily similar to what’s happening in Russia with the murderers and rapists who “earned their freedom via glory on the battlefield” now murdeing and raping in Russian society
Hard to tell if foreign adversaries, patriots, or both
Yes, it’s much more expensive to have two providers. Both in terms of outright costs but even more so in terms of ongoing engineering/technical overhead.
The calculus is how much the expectation downtime is, versus that cost. It’s a reasonable calculation and TBH if outages are a few hours once every few years for most cases it’s acceptable.
OFC if your hospitals or emergency services depend on a cloud service, you happily fork over the extra money same as you do for any other insurance.
from multiple companies
See the above post from the Azure shop … that uses AWS for 2FA tokens
You want to add multiple companies in parallel as alternates/failovers, not in serial where any one failure blocks the whole flow
A summation of scums
Especially Microsoft, Google, and Oracle, who are all at this very moment probably sending out sales droids in vast numbers
I love it when Cloud companies pretend there are “serverless” services that are “location-transparent”
You know, they sell this crap to governments and have to follow compliance regimes like FedRAMP but yet… this happens
But the only way to do this is to have a CSO willing to invest heavy in red-teaming – for attacks of every kind the team can brainstorm – and a CEO willing to spend the $$ and attention to get their recommendations implemented.
Lemmy seemed fine
Federated, open source
Reddit did not
Centralized, corporate
I’m pretty sure most of Azure (Microsoft), OCI (Oracle), and GCP (Google) have all been fine.
Bezos is a craven beast but I don’t see many companies above with CEOs that I’d feel comfortable babysitting my teenage daughter
That was a good summary
Some of us want to be known as being opposed to fascism
Oooh idea for resistance from corporate salarymen like me
T-shirt that says “salesforce.com” but with both S’s stylized as the Nazi SS angular shapes
Genius military strategists haven’t heard of the Streisand Effect
A lot depends on your Tor circuit. There are lots of very slow Snowflake nodes (FWIW I operate on an a VPS with high bandwidth and ~98% uptime)