• 0 Posts
  • 18 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle

  • OK, thanks for the information, that sounds really interesting. I was playing Doom Eternal and Metro Exodus some time ago, but I made a bread and didn‘t pick it up anymore due to a lack of time. Many years ago I was also trying a bit of Linux on a Netbook (small notebook). By then it was really a different world than Windows.

    However, I am not sure how easy that is to manage with getting the right Linux distribution, then Wine, then Proton and then getting all tricks and tweaks right… - I am not a tech expert, so leaving a system that works out of the box is a bit of a hurdle for me.

    What would be the best Linux „Distro“ (I guess that‘s how it is called) to start with? I would prefer if I would not have to deal with command line stuff… ;-)







  • TheProtagonist@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    2
    ·
    3 months ago

    This has nothing to do with privacy! Criminals have their techniques and methods to protect themselves and their “businesses” from discovery, both in the real world and in the online world. Even in a complete absence of privacy they would find a way to hide their stuff from the police - at least for a while.

    In the real world, criminals (e.g. drug dealers) also use cars, so you could argue, that druck trafficking is a side effect of people having cars…


  • TheProtagonist@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    25
    ·
    edit-2
    3 months ago

    I think you are mixing here two different aspects of this and of similar past cases. I the past there was often a problem with takedowns of such sites, because german prosecutors did not regard themselves as being in charge of takedowns, if the servers were somewhere overseas. Their main focus was to get the admins and users of those sites and to get them into jail.

    In this specific case they were observing this platform (together with prosecutors from other countries in an orchestrated operation) to gather as much data as possible about the structure, the payment flows, the admins and the users of this before moving into action and getting them arrested. The site was taken down meanwhile.

    If you blow up and delete)such a darknet service immediately upon discovery, you may get rid of it (temporarily) but you might not catch many of the people behind it.


  • I am not even so much concerned about Google / YT getting my IP (by using a VPN), but I would only watch it though an alternative ad-blocking frontend (like Invidious, Piped, FreeTube) and not the standard YT website or app.

    None of my previously used alternative apps / frontends seems to be working anymore (at least that’s my recent experience). Not sure what the difference to (Android) apps, that apparently still work (NewPipe, PipePipe) actually is, but it seems that these apps are the only remaining alternative frontends.



  • Is this even possible? My impression is that nowadays Google, whenever they have the impression that a connection to YouTube may been proxied, require a sign-in to prove that "“you are no bot” (I wonder which bots are watching YT videos), but in fact to avoid access via VPN or proxying via Invidious or Piped.

    That’s the reason why YouTube is essentially dead for me now.






  • Even if you find an alternative it might not help you if not all the others would follow, too, and you could find the type of content and contacts you currently have in FB on that other platform.

    Same problem with many social networks that became toxic, but that can’t be replaced easily, because in other, better places, you might not find the same content and contacts.


  • Me neither, but I guess the tracking will also take place when you just browse the internet and visit websites, that have Google Ad Tracking technologies implemented (which could be the majority of websites). Tracking and Ad-Blockers like uBlock might help a bit, though.

    The specifics are complex—these are the algorithms that ingest all the data signals you give off when browsing the internet on any device, some based on who you are—device, IP and credential identifiers, but also the sites you visit and apps you use as a map to be followed and analyzed.