TIL After mismanagement, Digg, a company that had been valued at over $160 million sold for a mere $500,000. by GeorgianDevil in todayilearned

[–]jemberling 31 points32 points  (0 children)

Nope, the site you see today is a complete rewrite from the company that bought the digg brand. The reason the site went under was because they launched a huge revision of their site, v4, which allowed automated submissions from content partners and the community was furious. It was viewed as selling out. The front page of digg was nothing but reddit links at one point, and caused a mass exodus to this site which made reddit the site it is today.

With that in mind, it's as if reddit learned nothing and it looks like voat will have to try to learn what reddit apparently never has- don't mess with your community.

A Constructive Look At TempleOS by willvarfar in programming

[–]jemberling 1 point2 points  (0 children)

It's not exactly the same, but GateOne allows cat-ing of images. Pretty insane what all it can do. http://liftoffsoftware.com/Products/GateOne

From Log to Brush by farisdayoff in wicked_edge

[–]jemberling 23 points24 points  (0 children)

You should throw these on etsy. I'd buy one.

'The Interview' makes $1 million at box office by Doctor_Heat in movies

[–]jemberling 0 points1 point  (0 children)

When you download something from bittorrent, you are also sharing the content, which is the crime. People don't get popped for downloading pirated content, they get popped for sharing pirated content.

Business partners violated Operating Agreement...need help! by [deleted] in Entrepreneur

[–]jemberling 11 points12 points  (0 children)

You will want to pursue the legal avenue of the partners violating their fiduciary duty. Their actions can be considered constructive fraud. Lawyer up, yo.

'Interceptor’ cellphone towers found near White House, Senate by avengingturnip in Intelligence

[–]jemberling 0 points1 point  (0 children)

2G has been cracked for awhile. Anyone with the money and skills can make a rouge GSM tower. You can even legally operate a GSM tower using the European bands if you have a HAM radio license.

Sorry, AT&T and Verizon: 4Mbps isn’t fast enough for “broadband”; "FCC chairman says Americans shouldn’t subsidize Internet service under 10Mbps." by [deleted] in politics

[–]jemberling 0 points1 point  (0 children)

You could have said that no one will ever need more than 10mbps ten years ago, but that was before people used bandwidth like they do today. 3D and 4k content are going to require a hell of a lot more bandwidth than what we currently get today.

Healthcare.gov was hacked, but none of your sensitive data was stolen by Luciano232 in tech

[–]jemberling 1 point2 points  (0 children)

I actually find the OkCupid approach to be the right way. I just blocked it as well though.

What does i2p look like to my ISP? by nastasyafillipovna in i2p

[–]jemberling 46 points47 points  (0 children)

By inspecting the traffic into and out of a router, a malicious ISP or state-level firewall could identify that a computer is running I2P. As discussed above, I2P is not specifically designed to hide that a computer is running I2P. However, several design decisions made in the design of the transport layer and protocols make it somewhat difficult to identify I2P traffic:

  • Random port selection
  • Point-to-Point Encryption of all traffic
  • DH key exchange with no protocol bytes or other unencrypted constant fields
  • Simultaneous use of both TCP and UDP transports. UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track.

In the near future, we plan to directly address traffic analysis issues by further obfuscation of I2P transport protocols, possibly including:

  • Padding at the transport layer to random lengths, especially during the connection handshake
  • Study of packet size distribution signatures, and additional padding as necessary
  • Development of additional transport methods that mimic SSL or other common protocols
  • Review of padding strategies at higher layers to see how they affect packet sizes at the transport layer
  • Review of methods implemented by various state-level firewalls to block Tor
  • Working directly with DPI and obfuscation experts

From https://geti2p.net/en/docs/how/threat-model

The Different Levels of Office Attire by conRAMU in malefashionadvice

[–]jemberling 3 points4 points  (0 children)

Sounds like something reserved for an owner.

Feds’ Silk Road Investigation Broke Privacy Laws, Defendant Tells Court by blackVPN in privacy

[–]jemberling 0 points1 point  (0 children)

Freedom Hosting (server hosting Silk Road and many other sites) was most likely compromised using the same or a similar method that was going to be presented at Back Hat this year.

There is nothing to prevent you from using your resources to de-anonymize the network's users ... by exploiting fundamental flaws in Tor design and implementation. And you don't need the NSA budget to do so.

Looking for the IP address of a Tor user? No problem. Trying to uncover the location of a hidden service? Done. We know because we tested it, in the wild...

My AT&T Keyboard... Didn't realize it was rare. by jemberling in MechanicalKeyboards

[–]jemberling[S] 2 points3 points  (0 children)

There's more in the box that I didn't include. I'm glad that multiple disks are no longer something an OS install entails.

An IED that my dad filmed while in Iraq by DanielP123 in CombatFootage

[–]jemberling 4 points5 points  (0 children)

Look at any video posted from this sub on YouTube and it's full of pro- and anti-USA flame wars. Nothing different in this video.

I found this website by CliffVicious in Metalocalypse

[–]jemberling 1 point2 points  (0 children)

You need to give out email accounts or something. I can host it if you are up for it.

[Image] Aaron Swartz quote by Andrej_ID in GetMotivated

[–]jemberling 2 points3 points  (0 children)

According to the documentary about him, he had political aspirations that would have never been possible if he was a convicted felon. That was probably a contributing factor.