csolisr

joined 1 year ago
[–] [email protected] 4 points 1 year ago (1 children)

Wondering how will F2P games with anti-cheat react to the news. Knowing that much of their player base may jump ship to Linux to avoid the subscription fees, will they relent and start using less invasive anti-cheat programs, or will they try to adapt specific versions of Wine / Proton to work in rooted mode?

[–] [email protected] 1 points 1 year ago

Currently using Revanced, I'm hoping to see a way to actually integrate my Google account with something else, in a similar manner to what SmartTube is somehow allowed to do.

[–] [email protected] 1 points 1 year ago (2 children)

My only issue with Newpipe is that I can't sync my "watch later" list with Google's servers. That, and I can't reply to comments straight from the app. Otherwise I'd probably be using either that or Piped.

[–] [email protected] 2 points 1 year ago (7 children)

I'd love to use it on my smartphone as well... problem is the interface was designed to react only to directional buttons, not to touch inputs. I wonder if somebody can manage to add the ability in the source code?

[–] [email protected] 24 points 1 year ago

It can be both at the same time - getting a professional voice actor to translate the script, then apply AI magic to have the voices match the original as exactly as possible.

[–] [email protected] 14 points 1 year ago (1 children)

Story of my life. I'm currently on the stage where I will mindlessly post a hot take that I think everyone will agree to, get downvoted to oblivion, and feel even more alone

[–] [email protected] 1 points 1 year ago

Because by doing so, law enforcement can manipulate the image from the source by:

  • Intercepting the payload and modifying the operative system to send data to law enforcement
  • Pose as the origin of the original payload, and send the tainted operative system to other devices when they reboot

Unless, of course, the BIOS stores the checksum of the untainted image. (Which adds its own can of worms, because that would make legitimate image upgrades require writing the new proper checksum on each server)

[–] [email protected] 0 points 1 year ago (2 children)

Because by knowing which IP is the boot image stored from, law enforcement can locate the source of the unencrypted image, thus making the scheme lose its privacy. The only way to bypass the issue is by manually configuring the IP after every reboot and keeping it a secret.

[–] [email protected] 13 points 1 year ago

As somebody who's been boycotting big media for years, I can't be happier to see the copyright industry slowly backstabbing itself once and over again

[–] [email protected] -1 points 1 year ago (4 children)

So there is still one single damning piece of information stored in the servers after all - the IP address to fetch the PXE boot image from. But hey, if Mullvad finds a way to strip even that out of the servers, that'd be great

[–] [email protected] -2 points 1 year ago (7 children)

I'm aware of PXE, but in order to do so you need either of:

  • the boot image supplying server being in the same intranet as the rest of the other servers, or
  • some sort of method to point the diskless server to the correct external IP address to listen to

Since the first mode is probably too unsafe, that leaves us with the second mode. Either the operator memorizes a specific IP address and types it into the BIOS each time the server is rebooted, or the IP address (and possibly the checksum of the image) are stored in a single-use pendrive that the operator carries. I wonder which of these two methods is used in this case.

[–] [email protected] 0 points 1 year ago (2 children)

Something tells me that they have a stack of single-use drives so that each time a server needs to reboot for some reason, they write a boot loader in one from their central headquarters, walk back to the server room, use the device to boot the server, and finally hammer the everliving bejeezus out of the thumb drive juuuuust in case. Hopefully they don't have to reboot that often!

view more: ‹ prev next ›