

This article is very confused. America definitely isn’t banning TikTok because it’s unpopular or unimportant. American billionaires are stealing TikTok because it is more profitable than their apps.
This article is very confused. America definitely isn’t banning TikTok because it’s unpopular or unimportant. American billionaires are stealing TikTok because it is more profitable than their apps.
I think in this case whether it’s distribution or not would have to go to court. It’s not intentended to be distribution. Depending on the judge and the lawyers it could be distribution or not distribution or the prosecution may have committed a crime in finding it.
That is possible, but I don’t think you need to worry about that. Having a copy of a movie is not normally itself a crime.
If the server is using a standard path prefix and a standard file layout and is using standard file names it isn’t that difficult to find the location of a media file and then from there it would be easier to find bore files, assuming the paths are consistent.
But even for low entropy strings, long strings are difficult to brute force, and rainbow tables are useless for this use case.
It’s not that challenging if you are looking for specific media files, but if you wanted to enumerate the files on a server it’s basically impossible.
If the ID is the MD5 of the path, rainbow tables are completely useless. You don’t have the hash. You need to derive the hash by guessing the path to an existing file, for each file.
Just like last time?
But he’s too stupid for that. He wants so badly to be king when the problems catch up that he would destroy the country to do it. He had a years long tantrum after he lost the election.
The ones on Amazon are intended to run GPUs for crypto farms, but they’re all brands you’ve never heard of with dubious claims and they’ve all got at least one review where either the device was defective or something was installed incorrectly and it caused damages.
I did this but buying these on Amazon is scary. Try to find one that won’t burn your house down.
It’ll be their children’s children’s problem.
i686 is a 32-bit architecture introduced in 1995. 32-bit is still supported.
Does Syncthing actually work with device IDs? It seems to work with encryption keys which should be stored in the user directory, at least if Syncthing is running as a user. Is the problem just that you have two machines with the same name in the same network? You can change the name.
Mediamtx will receive video from the camera using whatever protocol the camera supports and make it accessible over HTTP.
Make sure if you’re using an infinite file HTTP stream instead of DASH or HLS that you configure the timeouts on the reverse proxy appropriately or else your proxy might interrupt the video after some number of seconds. I’ve wasted a lot of troubleshooting time on proxy misconfiguration like that.
Being pro gay marriage and pro transgender are completely different things.
There was one announced last year.
This fixes the issue of hosting any nefarious content.
How does removing images change anything? Any file can be transmitted by text, as we used to do with e-mail, and you don’t need to use images to make illegal or just intentionally offensive content.
That’s the point of the regulations. Directly banning porn sites would be unconstitutional, but there’s a loophole.
My Kobo is Linux but not Android.
This page says the Boox bootloader is unlocked but the kernel source is missing: https://gist.github.com/fardjad/97baf36de97d1c4ae3953b3d359bb918
Boox uses Android.
Trying hundreds or thousands of hashes against the servers of random unconsenting people on the internet is beyond what I would be comfortable with. People have been prosecuted for less. It’s not the same as a crawler where you try a few well known locations and follow links. You’re trying to gain access to a system that somebody did not intend for you to have access to.
These endpoints probably don’t have protection because they were never designed to and it’s hard to add it later. Theoretically, if the IDs are random that’s probably good enough except that you wouldn’t be able to revoke access once somebody had it. The IDs probably aren’t random because at some point only the path is used. It’s how software evolves. It’s not on purpose that somebody may be able to guess the ID to gain access to it.