kittyrunningnoise

joined 2 years ago
MODERATOR OF
[–] kittyrunningnoise@lemm.ee 3 points 2 years ago (1 children)

your statement is highly dependent on where someone lives. I wonder what percent of people live within about ten minutes' walking distance from useful public transportation. I bet it's not 90% or even anywhere close. most people on Earth do live in cities now though, so maybe it's ~50%...?

[–] kittyrunningnoise@lemm.ee 20 points 2 years ago (4 children)

right but if you keep participating in broken systems you'll just perpetuate them. gotta find ways out and take them... or make them.

[–] kittyrunningnoise@lemm.ee 5 points 2 years ago (2 children)

that's not necessarily what it means. some things legitimately are easier to explain in person. ever try working out a complicated mathematical argument in an email? one can do it, but it's not pretty. in person you can write on paper, draw figures, etc., synchronously with your compatriot observing and even participating. it's not merely a change of medium from text to sound.

[–] kittyrunningnoise@lemm.ee 2 points 2 years ago

I don't read formality in these either, fwiw. in fact they're generally pretty casual.

[–] kittyrunningnoise@lemm.ee 2 points 2 years ago* (last edited 2 years ago) (3 children)

ultimately, you will need some kind of access to something with at least one port open, if you intend to host services on the clearnet. you could use tor if onion services will work for you. if you have ssh access somewhere with a port open (or a friendly sysadmin), you could tunnel to there and redirect incoming connections back through the tunnel. same thing with a VPN, if the sysadmin is really friendly.

[–] kittyrunningnoise@lemm.ee 1 points 2 years ago

but quantum stuff can tunnel through the cheese, despite its inability to be penetrated

[–] kittyrunningnoise@lemm.ee 2 points 2 years ago

I do as you, and run my own services for everything I use frequently except for email. keeping it all behind a vpn prevents unwanted access. I pay for protonmail but operate my own mail server for internal use. I have machinery to download messages from protonmail upon receipt and make them available to me, and to send through protonmail. so I'm doing both and using protonmail as the interface with outside servers.

[–] kittyrunningnoise@lemm.ee 1 points 2 years ago

picking a different port that isn't also used by another common service will eliminate most of the botscans you'll see otherwise.

... do you have a reason to belive your ISP cares if you run wireguard?

[–] kittyrunningnoise@lemm.ee 1 points 2 years ago

... in case you don't know: if it's for resources on a private home network, you can easily add the CA cert (i.e. the public key associated with the private key used to sign your certs) to your devices so that it's no longer unknown and the warnings disappear. I know this doesn't answer your question, but it's what I'd do instead of using letsencrypt for private services.

[–] kittyrunningnoise@lemm.ee 1 points 2 years ago

federation happens over the clearnet, so the only place tor gets used is your connection to the instance.

[–] kittyrunningnoise@lemm.ee 1 points 2 years ago* (last edited 2 years ago)

With syncthing, you can share securely your pictures (etc.) folder on your phone with your computer, and cut cloud storage out of the picture entirely.

[–] kittyrunningnoise@lemm.ee 14 points 2 years ago

syncthing works on every device and substitutes for cloud storage services. pictures taken with a phone end up quickly in the shared folder on my desktop. etc.

view more: ‹ prev next ›