A software developer and Linux nerd, living in Germany. I’m usually a chill dude but my online persona doesn’t always reflect my true personality. Take what I say with a grain of salt, I usually try to be nice and give good advice, though.

I’m into Free Software, selfhosting, microcontrollers and electronics, freedom, privacy and the usual stuff. And a few select other random things as well.

  • 1 Post
  • 330 Comments
Joined 5 years ago
cake
Cake day: August 21st, 2021

help-circle
  • Thanks for the nice conversation.

    Now that OP is inactive, I can also spoil the surprise: My link further up was Rick Astley singing: Never Gonna Give You Up.

    It’s safe to click. I just figured since OP isn’t listening to answers, I’ll give them some video to learn -hands-on- about videos on the Darknet.

    If someone had clicked the link, they’d get the opportunity to learn how fast or slow a video loads. And how it (likely) first requires the user to lift some security measures or videos won’t load at all. (At least my browser does, there’s no JS and then NoScript also complains about the media file.)

    We and other people in the comments pointed that out in the proceeding conversation. But nobody clicked the link anyway. I always have the feeling the groups of Threadiverse users and people with the capacity to surf the Darknet are pretty much disjoint groups. But it’s really nice to once and again talk to someone with some more knowledge and/or first hand experience. 👍


  • I think we’re somewhat on the same page here.

    That means going through an exit node […]

    I2P doesn’t have exit nodes. Once you load content from outside the network, that won’t be via I2P, only chance is to get it directly via another connection. For example your default internet connection. So either the browser or operating system is configured to block that. Or you’ll leak your IP.

    Then you didn’t have ‘Safest’ mode enabled

    Yeah, that’s why I said, use a dedicated browser for that. Something preconfigured to not allow any of that.
    Yet better: Use Tails like recommended by Snowden.

    Those are called bugs and they do happen […]

    I’m not so sure about this… Is “safest” mode really all you need? And does it reliably deal with 100% of the attack vectors? Last time I tried it wasn’t too good for example against browser fingerprinting (which doesn’t reveal an IP, but might be bad as well). And there’s a million ways from WebRTC, to trying to get the IPv6 address if all you did is configure an IPv4 proxy, DNS leaks, browser plugins, the webfont system does a lot of weird things, all the things done to do multimedia are very complex and might offer side-channels, I recently learned how to extract some information with CSS alone, no JS needed… Does “safest” really do a 100% job? I mean what I’ve done until now is to discourage people to mess with their browser settings themselves because it’s (a) easy to make mistakes or miss something, and (b) I wasn’t sure if that setting even does all the heavy-lifting without going into detail with all the other changes for example TOR browser bundle has?!

    I’d need to look it up but I think there’s a lot of opportunity without resorting to 0-days.

    EDIT […]

    Yeah, I think that’s why good (and easy to use) pron sites you’d “recommend to people” aren’t really a thing on there.

    And there’s the other thing that horny people might just click “allow” on something, because their brain is currently not in logical thinking mode.


  • First, this was an I2P link not a Tor .onion link. They are different, non-interoperable anonymity protocols.

    True. I wasn’t sure what people use to access I2P sites.

    first the whole point of Tor and I2P both is that nobody knows your IP address. Not even the website operator.

    Sure. And then they load some resource via the clearnet and get your IP address anyway. Or use WebRTC, or one of the several other methods to squeeze an IP out of a browser.

    Lastly, if you’re taking the trouble to use Tor or I2P in the first place – turn off javascript.

    And now your porn site doesn’t show videos anymore 😁 I have a hunch, this is one of the two reasons why there aren’t any good porn sites around… Despite OP not liking that answer…


  • I think you need some Agent software. Or a MCP server for your existing software. It depends a bit on what you’re doing, whether that’s just chatting and asking questions that need to be googled. Or vibe coding… Or query the documents on your computer. As I said there’s OpenClaw which can do pretty much everything including wreck your computer. I’m also aware of OpenCode, AutoGPT, Aider, Tabby, CrewAI, …

    The Ollama projects has some software linked on their page: https://github.com/ollama/ollama?tab=readme-ov-file#chat-interfaces
    They’re sorted by use-case. And whether they’re desktop software or a webinterface. Maybe that’s a good starting point.

    What you’d usually do is install it and connect it to your model / inference software via that software’s OpenAI-compatible API endpoint. But it frequently ends up being a chore. If you use some paid service (ChatGPT), they’ll contract with Google to do the search for you, Youtube, etc. And once you do it yourself, you’re gonna need all sorts of developer accounts and API tokens, to automatically access Google’s search API… You might get blocked from YouTube if you host your software on a VPS in a datacenter… That’s kinda how the internet is these days. All the big companies like Google and their competitors require access tokens or there won’t be any search results. At least that was my experience.


  • Yeah. If you’re clever you use some TOR browser bundle or something like that to access the Darknet. Not only for security. You also void your anonymity / privacy once you use just any random regular browser.

    The Darknet is a bit of a mixture of people who use it for legitimate purposes, people who tinker around, and some shady people and trolls. So you’d expect some chance of someone trying to use JavaScript against you, or leverage other browser techniques to leak your IP etc… It’s not a frequent thing by any means, but it’s a possibility.






  • We got open-source agents like OpenCode. OpenClaw is weird, and not really recommended by any sane person, but to my knowledge it’s open source as well. We got a silly(?) “clean-room rewrite” of the Claude Agent, after that leaked…

    Regarding the models, I don’t think there’s any strictly speaking “FLOSS” models out there with modern tool-calling etc. You’d be looking at “open-weights” models, though. Where they release the weights under some permissive license. The training dataset and all the tuning remain a trade secret with pretty much all models. So there is no real FLOSS as in the 4 freedoms.

    Google dropped a set of Gemma models a few days ago and they seem pretty good. You could have a look at Qwen 3.5, or GLM, DeepSeek… There’s a plethora of open-weights models out there. The newer ones pretty much all do tool-calling and can be used for agentic tasks.






  • This reads like it’s written by OpenClaw?!

    All open-source. […] You built this. Not a vendor. Not a consultant. Not a managed service provider who will send you an invoice next month for the privilege of using what was always supposed to be yours. You opened a terminal, followed a guide, made decisions, fixed the things that broke, and kept going.

    Aha?

    • Cloudflare not open-source
    • OpenAI not open-source and they DO send you a bill
    • Anthropic not open-source and they do send you a bill
    • Google not open-source and they do send you a bill
    • Perplexity not open-source and they do send you a bill
    • supabase.com not open-source and the free service is limited
    • QuickBooks Online is proprietary, so are Xero, FreshBooks and Wave?

    4 Part Series

    Ah a 4 part series in 5 parts with one part missing?

    zero-trust through eight independent layers

    I don’t think the layers build on top of each other. That’s just random things all shoehorned in. One firewall is enough to block 100% of packets, you don’t really need 3 to do the very same thing. And then delegate it to Cloudflare anyway.

    OpenClaw

    And now you got zero security layers. And I bet your API bill will be way more than 3-5 inference runs per day with that.

    Step 1: Apache Guacamole

    What do you need RDP for?

    Step 9: AES-256 Encrypted Backup

    Please(!) don’t do “backups” like that. Learn how to do Docker and what makes sense in that environment, how to backup your databases. And the need to keep backups somewhere that’s not just the same harddisk. And do test them. And you should really consider following the 3-2-1 rule if this is your company’s data or you rely on it as a freelancer.


  • I think it’s fascinating tech. And fun to play with. But I think a lot if the every-day use-cases are more of a gimmick. In the good old times we could look up facts on Wikipedia. Or google why the yellow light on the router started flashing and we’d find an answer on Reddit. Now we ask ChatGPT, but that alone doen’t increase my quality of life. I’d rather have it sort the mess on my 8TB hdd, find a cheaper insurance company for the car. Do my stupid paperwork at home… And maybe I’d like an AI robot to do the chores for me. Laundry, dishes… So I can relax and do other things. But I feel it’s still early days for the really useful tasks. AI is more useful for replacing callcenter workers, assisting programmers… And unfortunately it’s bad for the environment and makes computer hardware unaffordable.



  • hendrik@palaver.p3x.detoAsk Lemmy@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    12 days ago

    Empathy and availability are great. Listen to them, respect their struggles growing up. I don’t think that necessarily means being strict/authoritative or lenient, for me it means more feeling respected as a person. And a sane, straightforward way to deal with mistakes. Because we all make mistakes. Especially while learning and growing up.

    And I’d say shared memories are awesome. Whatever that means for you. Go on a Canoe trip, teach them how to fix their bike, do woodworks, drill a hole into the wall or bake a cake.


  • hendrik@palaver.p3x.detoSelfhosted@lemmy.worldPower efficiency
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    16 days ago

    Yeah, I think the correct sticker on a PSU would be something like 80 Plus Ruby?! Everything else comes with 80+% efficiency at 20% rated load. Which is 200W for a 1000W PSU. And there’s no guarantee on what happens below that, so it might very well be utter garbage at a home server power draw of 20-30W.

    You never know without looking up the datasheets. Though, back when I built my home server/NAS, I failed to find a good one. I got a PicoPSU and a 12V power brick instead. Not sure if that’s still a thing. But I remember it was a lot of work to find proper and efficient components. And it doesn’t make any sense to put in all the effort (and money) and then burn all the saved energy, and then some more, in an average PSU.

    Some MiniPCs, NUCs and even computers also come with fairly efficient power supplies.


  • hendrik@palaver.p3x.detoSelfhosted@lemmy.worldPower efficiency
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    17 days ago

    I got a power-efficient mainboard and PSU. I think that’ll be the lion’s share. And I don’t have any unnecessary stuff like a GPU or extra stuff connected.

    I ran powertop and adopted the recommendations to set the various buses, peripherals and devices into powersave mode. That does a few Watts here and there. CPU of course is also allowed to save power when idle.

    And then I made the harddisks spin down after 40min of not being used. Or something like that. So they’ll automatically spin down at night and when I’m not using them. As spinning hdds consume quite a lot of power if you have multiple of them and compare it to the 15-20W or so the rest of the computer uses. The operating system is on a SSD.