Skip to content

FCC commissioner writes op-ed titled, “It’s time for Trump to DOGE the FCC“

Technology
43 28 681
  • sounds like a perfect setup for a torrent farm. they can't stop you because you're forced to pay for it.

    do it. get a good VPN and do it. I know how these networks are usually architected - they probably will never notice. use as much bandwidth as you can over a VPN and they'll probably never really see it. also there's likely no bandwidth cap, since the fiber circuits that feed these units are also usually uncapped in terms of how much data they can pass per billing period, unlike Spectrum/Comcast/VZ/all the other shit ISPs out there.

    I know I don't notice a heavy user when I look at my metrics and even if I did, I don't get paid to care. just don't get caught with your VPN off, they probably will see that and disable your service or give you a call and tell you you're being a bad user a la Skippy.

  • We’re gonna be so fucked. Get ready for shittier experiences with internet providers and cell companies.

    Is this gonna be worse than what A Shit Pie die.

  • do it. get a good VPN and do it. I know how these networks are usually architected - they probably will never notice. use as much bandwidth as you can over a VPN and they'll probably never really see it. also there's likely no bandwidth cap, since the fiber circuits that feed these units are also usually uncapped in terms of how much data they can pass per billing period, unlike Spectrum/Comcast/VZ/all the other shit ISPs out there.

    I know I don't notice a heavy user when I look at my metrics and even if I did, I don't get paid to care. just don't get caught with your VPN off, they probably will see that and disable your service or give you a call and tell you you're being a bad user a la Skippy.

    highly recommend using containerized torrents through a VPN.

    I have transmission and openvpn containers. when the network goes down transmission can't connect since it's networked through the ovpn container.

    once the vpn is restored, everything restarts and resumes where it left off.

    ever since I've had this setup running, I haven't had a nastygram sent to me.

  • 25 Stimmen
    10 Beiträge
    7 Aufrufe
    U
    Rational economical actor hypothesis? Nope we're just back 4 centuries at least https://en.wikipedia.org/wiki/Tulip_mania
  • 105 Stimmen
    50 Beiträge
    689 Aufrufe
    Z
    "Dude trust me, just give me 40 billion more dollars, lobby for complete deregulation of the industry, and get me 50 more petabytes of data, then we will have a little human in the computer! RealshitGPT will have human level intelligence!"
  • First rack at home

    Technology technology
    1
    1 Stimmen
    1 Beiträge
    22 Aufrufe
    Niemand hat geantwortet
  • 737 Stimmen
    67 Beiträge
    1k Aufrufe
    K
    That has always been the two big problems with AI. Biases in the training, intentional or not, will always bias the output. And AI is incapable of saying "I do not have suffient training on this subject or reliable sources for it to give you a confident answer". It will always give you its best guess, even if it is completely hallucinating much of the data. The only way to identify the hallucinations if it isn't just saying absurd stuff on the face of it, it to do independent research to verify it, at which point you may as well have just researched it yourself in the first place. AI is a tool, and it can be a very powerful tool with the right training and use cases. For example, I use it at a software engineer to help me parse error codes when googling working or to give me code examples for modules I've never used. There is no small number of times it has been completely wrong, but in my particular use case, that is pretty easy to confirm very quickly. The code either works as expected or it doesn't, and code is always tested before releasing it anyway. In research, it is great at helping you find a relevant source for your research across the internet or in a specific database. It is usually very good at summarizing a source for you to get a quick idea about it before diving into dozens of pages. It CAN be good at helping you write your own papers in a LIMITED capacity, such as cleaning up your writing in your writing to make it clearer, correctly formatting your bibliography (with actual sources you provide or at least verify), etc. But you have to remember that it doesn't "know" anything at all. It isn't sentient, intelligent, thoughtful, or any other personification placed on AI. None of the information it gives you is trustworthy without verification. It can and will fabricate entire studies that do not exist even while attributed to real researcher. It can mix in unreliable information with reliable information becuase there is no difference to it. Put simply, it is not a reliable source of information... ever. Make sure you understand that.
  • 4 Stimmen
    1 Beiträge
    23 Aufrufe
    Niemand hat geantwortet
  • 216 Stimmen
    13 Beiträge
    129 Aufrufe
    J
    It’s DEI’s fault!
  • 1 Stimmen
    8 Beiträge
    90 Aufrufe
    L
    I made a PayPal account like 20 years ago in a third world country. The only thing you needed then is an email and password. I have no real name on there and no PII, technically my bank card is attached but on PP itself there's no KYC. I think you could probably use some types of prepaid cards with it if you want to avoid using a bank altogether but for me this wasn't an issue, I just didn't want my ID on any records, I don't have any serious OpSec concerns otherwise. I'm sure you could either buy PayPal accounts like this if you needed to, or make one in a country that doesn't have KYC laws somehow. From there I'd add money to my balance and send money as F&F. At no point did I need an ID so in that sense there's no KYC. Some sellers on localmarket were fancy enough to list that they wanted an ID for KYC, but I'm sure you could just send them any random ID you made in paint from the republic of dave and you'd be fine.
  • 1 Stimmen
    8 Beiträge
    81 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.