• 0 Posts
  • 25 Comments
Joined 3 years ago
cake
Cake day: November 26th, 2021

help-circle

  • If you are talking about effectively adding to the WEBDL scene as in taking streams directly from sites and decrypting them you are going to want to start to find your way into the scene more. I have no idea how to but I’d start with a more exclusive site like a private torrent site and work your way up to good standing through other upload grunt work like filling requests etc. This will in turn open you up to more exclusive forums on that site where you can ask this question again.

    As far as I know all roads lead to a rooted a android device as a means to then figure out a way to either get he file without the DRM as part of the playback from the App or direct access to the full file in it’s original version and to then enploy the definitely closely guarded secret of how to crack the DRM. This is only stuff I’ve gathered randomly reading things.


  • My understanding is:

    Passkeys are like a password + 2FA mashed together. If someone steals your “passkey password” they still can’t use it to login without the hardware component. That means phishing is harder. Since passkeys are generated for the user from their hardware it also forces better hygiene on the user by not allowig any password duplication.

    A downside is it is tied to hardware and a provider that can cause problems witb loss of device or when you change devices but it is hard to say how painful that is going to be.

    [edited for a bit more clarity]














  • Port forwarding allows for a direct connection from one client to another. Effectively when a VPN let’s you port forward if you go to the external IP address they assign + the port they assigned they will be able to directly connect to a port that a program/service is listening on.

    Torrent sites are only telling your client who to connect to via the tracker, your client still needs to be able to connect to them. You can still download without this but it is generally slower (may be going through a relay) and you cannot seed torrents except for anyone that can directly connect to you on whatever VPN you are on.

    *Likely some mistakes above. Keep me honest denizens of the web.




  • So you have raw database access and you can see that data. Why is this surprising? The systems I’ve used that solve storing data encrypted have massive usibility hits around exchanging and authenticating keys to a point where it sucks so bad I just want to disable it (matrix is a good example, non question their key exchange bullshit is hindering their adoption). I’m not saying this couldn’t be fixed but should it? Most services that use a database will be inline with your discovery of how Lemmy uses that database. Storing something encrypted that is meant to be viewed publicly is the same outcome with more steps. If someone cares enough to monetize it just patch the code to change whatever behavior you don’t like. I havent seeing anything about an acceptance test for Lemmy instances or anything that requires someone to use an unaltered version of Lemmy. How do you know the server admin isn’t already doing all of this? You don’t. Don’t expect privacy in public spaces.


  • So you have raw database access and you can see that data. Why is this surprising? The systems I’ve used that solve storing data encrypted have massive usibility hits around exchanging and authenticating keys to a point where it sucks so bad I just want to disable it (matrix is a good example, non question their key exchange bullshit is hindering their adoption). I’m not saying this couldn’t be fixed but should it? Most services that use a database will be inline with your discovery of how Lemmy uses that database. Storing something encrypted that is meant to be viewed publicly is the same outcome with more steps. If someone cares enough to monetize it just patch the code to change whatever behavior you don’t like. I havent seeing anything about an acceptance test for Lemmy instances or anything that requires someone to use an unaltered version of Lemmy. How do you know the server admin isn’t already doing all of this? You don’t. Don’t expect privacy in public spaces.