

Pyrotry?
Pyrotry?
You can create a virtual machine, running within your debian install, to serve as your router. It actually works very well.
I used a headless Debian VM as a router with Shorewall to configure iptables. If I had to do it again, I probably would have used an opensense VM.
OK, but where are the Epstein files?
Just how many kids did Trump rape?
Identifying and responsibly disclosing security flaws is legal; publicly exploiting them is not.
“Security Flaws” implies that there was some attempt to restrict access that could have been considered “security”. They made no such attempt. Everything was openly provided to the general public.
Putting a big bowl of candy on your front porch during Halloween is an “invitation”, not a “security flaw”.
Your proposal is acceptable.
I start typing in URLs that aren’t linked anywhere on the site, then I’m accessing stuff the site hasn’t explicitly indicated I have access to.
Doesn’t work like that. With the policy you describe, anyone who ever sees a “404” error is a criminal.
I don’t have to publish everything I am willing to offer. You are free to ask for something I may or may not have. I get to decide how to respond to your request.
To use your analogy, I can walk up to your door and request a glass of water. You’ve never explicitly offered a glass of water to anyone; I’m still allowed to ask. If you dont want me to have your water, you can say “No” or you can ignore me.
When you go ahead and give me a glass of water, you don’t get to claim I stole it from you. It is not theft to ask.
You have to make some sort of effort to have your web server limit my access, and I have to make some sort of effort to convince your webserver to bypass those restrictions before you can claim I am exceeding my authorization.
Terrible analogy. A webserver is not at all like a door. It doesn’t block or allow traffic to and from your file system.
A web server is more like a receptionist. It handles requests. “Can I have your basic catalog?” “Certainly, here you go.”
“Can I get this item from your basic catalog?” “Certainly.”
“I don’t see it in your catalog, but my buddy said he got this other item from you. Can I have this other item too?” “Absolutely.”
“Can I borrow your stapler?” Sure. “How about a pad of paper?” “Of Course”. “Can I just have the contents of your supply closet?” “Here you go.” “How about your accounting files, can I get those?” “No problem!” “How about your entire customer list?” “Consider it done!”
When you hire a receptionist and specifically tell them to give customers anything they request, that’s entirely on you. You have to at least make a token effort to restrict access to only authorized users before you can even claim that a particular user was unauthorized.
This wasn’t burglary. This was putting up signs that say “come in” and labeling everything in your house with “free” stickers.
Comapnies dont have that right. Companies are required to pay quarterly estimated taxes, and are fined if they are found to have underpaid on those estimates.
27 years, actually. Specifically, since October 12th, 1998.
I have been looking for a US ISP with the balls to ignore their obligations under the DMCA since the DMCA was implemented.
If the number is excessively multitudinous, feel free to leave out any dial up providers you used back in the late 90s/early 2000s. You can also leave out any ISP that has since merged into another, or gone out of business.
For me, that would leave five names in 27 years, none of which would be a surprise, and all of which issue DMCA letters.
I would love to hear about even one of the many unicorns you’ve engaged over the past quarter century.
I read your entire comment. What I didn’t read is any information on how I can duplicate your experience. I’d like to subscribe to one of these ISPs, if they are available in my area. Is there a reason I can’t know who is providing this superior service?
I would appreciate any advice you might have on a provider who isn’t a scum-sucking sycophant of the copyright industry. I assure you, your experience is the exception, not the rule.
Those letters originate from the rights holders, who have leechers in the swarm, verifying that you are actively uploading data to them. Your ISP doesnt care if you torrent, or who you torrent to. They wont originate a letter unless a rightsholder requires them to.
The rightsholder has your IP address, and the name of the file you sent them. Data for those files was sent to their leechers by your IP address, perhaps not by you, but by some machine operating on your network, or through it.
It is possible that the letter to your ISP included a list of both IP addresses belonging to several of their customers, and filenames sent from all of those customers. It is possible that the ISP sent out letters to each of the individual subscribers, and just attached the full list of files from the original complaint.
Who is your ISP? Or do you just use your neighbor’s connection?
On behalf of whoever is paying for your internet connection, do not torment without a VPN.
If you ignore this advice, be aware that the aformentioned person will get a nastygram in the mail, complete with the exact title of the torment you downloaded. They have no qualms with outing your darkest perversions to the breadwinner(s) in your household.
WTF? No no no.
UBlock origin will let you do this. Come back to this comment in a couple minutes…
Edit: Add something like this to your uBlock Origin custom filters. (The sites I included are all paywalls, but you can substitute your own)
feddit.org.##.title:has-text(/theintercept.com|economist.com|military.com|wired.com|theverge.com|theglobeandmail.com|404media.co|nytimes.com|vox.com|washingtonpost.com|theatlantic.com/)
This will turn something like this:
into something like this:
(The “Anker’s Sound” post has had its link and headline hidden)
Reddit Enhancement Suite had FilteReddit, which had more fine grained controls to block posts linking to specific sites. I’ve been looking for a Lemmy equivalent, but UO is the best I’ve found so far.