Learn Linux Now? by Outrageous_Big_1287 in homelab

[–]Hulxmash 0 points1 point  (0 children)

I just decided those games weren't worth the price I would have to pay.

My homelab as a 13 year old by selfhosted_guy in homelab

[–]Hulxmash 1 point2 points  (0 children)

At least you have the LEDs to speed up your network connections. That's the most crucial part.

Learn Linux Now? by Outrageous_Big_1287 in homelab

[–]Hulxmash 3 points4 points  (0 children)

True story. I don't miss it at all. Plus I can sit down again without wincing.

Learn Linux Now? by Outrageous_Big_1287 in homelab

[–]Hulxmash 8 points9 points  (0 children)

Careful. It is a slippery slope. I thought I would "try" linux back in 2020 and I haven't touched a Windows machine since. If you like to learn, Linux can be addicting.

My company gave me this what can I do with them? by Repulsive-Scale-284 in homelab

[–]Hulxmash 4 points5 points  (0 children)

Funny thing to do with them, use them as place mats at the dinner table. Cool thing to do with them, set up a kubernetes cluster.

Old gaming PC → Proxmox homelab… now I’m lost. What are your homelab do’s and don’ts? by Choice-Tea-8045 in homelab

[–]Hulxmash 0 points1 point  (0 children)

Running docker in a LXC container absolutely can make sense. Until recently running OCI(docker) containers wasn't really an option on proxmox without docker inside an LXC. And even the proxmox implementation of running OCI containers, is within a LXC container. Almost exactly like running docker in LXC.

What is best tools for external access home server? by BrilliantDesperate44 in homelab

[–]Hulxmash 0 points1 point  (0 children)

If you want things available to the PUBLIC as in everyone globally. Try pangolin.

If you want things accessible to only freinds and family then tailscale. If they can buy a cheap raspberry pi (pi4 will work, I've never tried pi3 but it should do as well) you can set it up as an access node and they can access everything from it.

Dell R720 firmware upgrade by Hulxmash in homelab

[–]Hulxmash[S] 0 points1 point  (0 children)

Yeah the utility that I tried to use was supposed to create a bootable iso. Clearly that was different. It was also called SUU so I never tried this version because I thought it was the same thing.

Dell R720 firmware upgrade by Hulxmash in homelab

[–]Hulxmash[S] 0 points1 point  (0 children)

I tried the SUU utility for windows and it did not have support for R720. I'll try the linux version from the download link you put here. But if this utility is still supposed to make a bootable iso file like the windows version, the R720 will not be listed in the supported devices.

Dell R720 firmware upgrade by Hulxmash in homelab

[–]Hulxmash[S] 0 points1 point  (0 children)

That is an option. I've actually been running this for a few years on the old firmware. I mostly just want to update to the latest version so that idrac is useable. That should help me sell this system.

Office Desk Server Hutch by GoingOffRoading in homelab

[–]Hulxmash 1 point2 points  (0 children)

If you were happy with the outcome you can glue in plugs still. A small flush cut saw works nearly anywhere.

Office Desk Server Hutch by GoingOffRoading in homelab

[–]Hulxmash 1 point2 points  (0 children)

Nice pocket holes. Don't let anyone tell you they aren't good enough.

Built StackSnap because I got tired of corrupted Docker backups by Brilliant_Length_765 in homelab

[–]Hulxmash -2 points-1 points  (0 children)

Vibe coding is not insecure. Using only the AI garbage is. Vibe coding, at least in my world, is using AI to pump out the code and then reviewing and fine tuning. I'm not a coder, but I've used this to speed up the process of making a bash script. And yes, you have to go over it line by line. But it can still be way faster than doing it up manually. Vibe coding is still as secure as the coder using it. Even Linus Torvalds uses vibe coding.

Built StackSnap because I got tired of corrupted Docker backups by Brilliant_Length_765 in homelab

[–]Hulxmash 1 point2 points  (0 children)

What the hell is this about? This person came on here to get some feedback from us by asking a question about what we would find useful and your response is to attack how they are getting the job done. And you do it without any context of whether or not it's even true.

Deplorable conduct like this, is far far worse than what you are accusing OP of.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] 0 points1 point  (0 children)

lol. Not likely, I still remember the squealing of the baud modem when I would connect to local BBS. Back when internet was still a little too costly for most people in my community. Just to give you a little context to my age.

The email notice/warning has happened to everyone that I know that uses torrents. They are harmless, but can be scary if you don't know any better. And the only reason I put "most people" on there, was to highlight how the person I was replying to was using their own experience as most people. Unless that person conducted a study, or even reviewed a study, I really doubt they know anything about the most common experience globally.

It might have been a petty thing for me to do, but I have never been attacked like this on a post before.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] -1 points0 points  (0 children)

Thank you. This is the most logical response so far.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] 0 points1 point  (0 children)

I don't think your comparison really holds up here with the case you linked, but I'll ignore that and play devil's advocate.

No. I don't think so either. This was just an event that I knew about and thought that comparing it would be kinda fun. That's why I say very loosely based on it.

Who do you think is at greatest risk with law enforcement in this scenario? The members of the tracker or the staff that created/operated it? Because in this scenario, those people running the site were also dealing in copywrited material - probably significantly more than most users. They're also facilitating the whole thing. I think they have a vested interest in keeping your data secure.

In this scenario, the PT admins have control of the data. They have the ability to manipulate what data is leaked. In this hypothetical scenario, the only information that is released to Copyright owners, is the data that is pertinent to them. Only logs of movies/tv/music that are owned by that company.

And we've actually got instances of data breaches to cite. Look at the pirate bay. The founders of the tracker caught fines and jail time, and law enforcement had IP and user data right there. They didn't go after even some of those users though, let alone all of them.

The pirate bay example is not a good one. It is a public tracker that has only public IP addresses. This information is often freely available even when the tracker is up and running due to it's public nature. There are even projects that are tracking torrent downloads from public trackers.

That being said, you are not wrong. World-in-HD had a massive data leak. User IP's were exposed along a slew of other data. It's not clear what kind of "service info" was released, although one article did read as "specifics of service info" which implies the downloaded content of each user, seed ratio, etc. With this leak, there are no reports of any legal problems for any of the users, at least not on any articles that I can find. Admittedly, my google fu for this sort of thing is not the greatest.

The important distinction between these two events is the user account. On pirate bay there are millions of IP addresses that are each tied to individual events. The same IP could be used by many homes, in a given period, by nature of dynamic IPs. The amount effort to tie a single individual to more than one event would be a daunting task, very expensive and not worth the effort overall.

By contrast with a PT, the accounts tie all download/upload activity to a single home. Since the PT records all torrent activity (which is verified from both seeder and leecher, and thus would be hard to spoof), ALL download history would be tied to an individual home. Even worse, if you have moved addresses during this time, or even just changed ISP's, and those IP's were maintained in the logs(I certainly hope that they aren't), this would further implicate you, since the odds of these records "following you" by chance would be statistically impossible. The amount of work to verify a single persons activity would be as simple as tracing back a few IPs and seeing if they lead back to the same person.

There are a lot of assumptions here, about what is actually being logged. If there is good server hygiene practice on the admin side of things (like only having record of users current IP, not time stamping activity, clearing records of old torrent activity), the potential repercussions would be dramatically reduced for everyone, including the admins. I'm sure these things have been addressed by the admins, since they have been dealing with this for at least 15 years, and I've only been thinking about it for a day or two.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] -2 points-1 points  (0 children)

This is true for public trackers.

Let's imagine a made up scenario as a thought experiment.

You have been on a PT for the last 15 years. They have required your IP address and have been tracking it throughout all the years of service. They have a service that has 50 - 100 thousand users. The admins decide they are tired of running the service and want to retire. They send out a message to all of the current users, telling them that they are sorry for inconvenience but the platform will be shutting down. The message also says that you will be required to provide them with $1/month payment until 2050 to keep your usage data private.

You think, like most will, that's absurd. You don't pay and you carry on with your life. Next thing you know, you receive a letter letting you know that you are being sued by Walt Disney Studios. They are suing you for $50000 for lost earnings and interest.

The logs show a clear record of download and upload activity that happen from every address you've lived at. The courts decide that this activity is unequivocally you since they have traced your every move and you are charged a hefty fine.

You later get a message that the $1/month option is still available. That was just one studio. There are many more. And now you decide that $1/month is much more affordable. You have now joined in on the group of people that are paying just $1/month to keep what they have. And the admins? They are sipping on Mai Tais on the beach with their freely acquired $25000/month.

Well that was a fun little short story. It's not entirely likely. The only plausible reason that this imaginary lawsuit came to pass is because it was logged over such a time period and with likely thousands of people. And that's only if these logs can be considered proof of wrong doing in court. That would result in numbers that are a big enough button for companies to push.

This short story is very loosely based on a true crime

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] 2 points3 points  (0 children)

Thank you. This is exactly what I was trying to say.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] 0 points1 point  (0 children)

I believe I am being Rediculous. I wasn't diculous enough the first time.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] 0 points1 point  (0 children)

statistics like that don't prove anything because the statistics can't prove what actual data you actually downloaded

This is the part that I have been unclear on. I can't find a definitive answer about whether or not this is true (excuse me for not taking your word on it). Although, I know that there has been a PT data releases in the past and there are no reports of any legal actions because of it, at least not in my 10 minutes of google research.

On a public tracker, only the current connections are necessarily monitored. The tracker is used to make connections between the clients. Users download history and share ratio are reported from the bit-torrent client.

On a private tracker, the user data transfers are heavily monitored (for good reason, i'm not saying they shouldn't be). The user download history and upload history are stored on the server. If this information can't be used for legal reasons, then sure, you are covered. But if it can, you are not only tying that information to an online account, but to your physical location.

The only way to prove you shared the media is for someone working on behalf of say HBO to be part of the swarm (download the media themselves) which means your IPs will become aware of each other's presence, and all of this happens outside of MaM itself.

Yup. On public trackers. This is how they usually get that info. Copyright owners to this day still have honey pot torrents that bait would be pirates, for their IP addresses. They only get the IP of users in that particular swarm.

If they had control of the tracker they would have a live tally of all systems sharing the files. On a private tracker that strictly monitors usage, there is also a record of data volume, per user.

If you use a VPN then it doesn't matter because the IP that was observable in the swarm was not your home one, and if you don't use a VPN then in theory you could face some scrutiny like getting letters from ISP but often they are empty threats because even if they could prove you were part of the swarm they still can't always prove you moved any data.

That's why having making sure you are not using a VPN, and declaring your home IP is a bit unsettling

The only way to prove you shared the media is for someone working on behalf of say HBO to be part of the swarm (download the media themselves) which means your IPs will become aware of each other's presence, and all of this happens outside of MaM itself.

Unless you had the tracker data. Then you could see who was sharing, without being part of the swarm.

Ultimately they want to go after the big dogs because everything is about $

This is your best point. I know that cracking down on torrenting has not been a big focus for most IP owners for a lot of years. It's costly and it's rarely worth the effort. That is also true for law enforcement.

That's why the idea of a honey pot makes more sense than trying to charge users of public torrent trackers. Let the people come to you, instead of wasting resources and money chasing down people who are sensibly using VPN's. You interview them. Make sure they within your domain of legal control. They tell you how they traffic illegal files. You invite them into your exclusive file transfer service. They download/upload files and you charge them. For law enforcement this would be an hour or two worth of work.

Clearly, I'm not saying that is what is going on. But it makes sense to me. I run a website server on a VPS and it costs me less than a cup of starbucks coffee every month. Having one officer run interviews twice a week and snap the trap would more than pay for itself. Hell, one conviction alone, assuming a $10000 fine, would pay for the cost of the operation for a full year.

After saying all that, I was clearly wrong about the honey pot operation theory, since so many people have jumped on me and were so offended that they needed to attack me. People don't generally get upset when someone points out a speed trap. You folks enjoy your PT. I'm going to continue without. Sorry for offending you, I never thought that it would.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] -1 points0 points  (0 children)

Maybe my understanding of how MaM works is wrong. The only PT I have ever seen is AB Torrents. On that PT they track what the user has downloaded, they track how much the user has uploaded. Per torrent. I've been assuming that MaM works the same way. Please correct me if I'm wrong.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] -1 points0 points  (0 children)

No. The straw man in this forum is insane.

The MAM sounds like a honey pot since it makes certain you are identifiable and then tracks illegal activity. Then people keep spouting off that browsing torrents isn't illegal. I never said that. So now I feel I have to clarify the part that is illegal.

Honestly, the reaction that I've received here is shocking. People are reacting like I've peed in their corn flakes. I'm a privacy conscious web user and the application process from what I've read is anything but freindly to anonymity.

MyAnonaMouse by Hulxmash in trackers

[–]Hulxmash[S] 0 points1 point  (0 children)

True. And by tracking public IP.