• 4 Posts
  • 78 Comments
Joined 1 year ago
cake
Cake day: June 26th, 2023

help-circle


  • I don’t know enough about ovpn or wireguard to know how that would help me…

    OpenVPN and Wireguard are different protocols that VPN providers can use. Technically, there are also groups and client apps of the same name for both too. I think there are other protocols too (pretty sure there’s one called IPsec and maybe some others) but OpenVPN and Wireguard are 2 of the most common. Wireguard is newer and generally is regarded as faster than OpenVPN protocol but there are some privacy issues with it if using the unmodified version. Some VPN companies use a modified version of WG that address those issues (Nord and PIA). But since customers can’t inspect the server configs, I would definitely recommend only using VPN companies that have undergone a third party audit to confirm that they keep no logs and have a server configuration without privacy issues (off my head: PIA, Nord, Mullvad, expressvpn, surfshark, cyberghost).

    Is that not a VPN/tunneling that you have to have both sides to use?

    Yes, if your VPN provider doesn’t have servers configured with Wireguard, then you can’t use it. And even if they do, it probably won’t be all the servers so you need to choose one with it. So if say your provider was Nord. Nord calls their modified WG as “NordLynx”.

    If you wanted to connect to Nord’s WG (aka NordLynx) servers, AFAIK you have to use the official Nord client app. Some providers might release a WG config file that you could use to manually set it up but last time I checked Nord only offers manual config files for OpenVPN (here’s an old reddit thread basically saying the same thing). This is annoying if you are trying to have a setup where you can switch between multiple providers and protocols easily (like me) or in places where you can’t install client software (like routers) but probably not a big deal to most users connecting from a computer/tablet/phone/etc.

    For PIA, it is similar although they don’t rename their Wireguard as something else. But again, they don’t provide manual WG configs and you have to use their official app to use it. However, they do have some github repos and more technical users can run some scripts to generate temporary manual configs (my understanding is that unlike the OpenVPN manual configs, these will eventually expire and you will need to rerun the scripts again at some later time).

    I used Nord proxies when I still used uTorrent, never had issues. I’m definitely hardwired, and my isp is shit, don’t get me wrong, but the only change I can see is qBit and proxies. I tried every server they had available, and the issue just stops when I don’t use their proxies. Maybe I should try proxies from some other service, but I’m not really in a place to shop around… and I don’t know that free vpn services have proxies that you can try.

    Not sure. Hard to debug without concrete details and I’m probably not the best for that anyway. Could be proxies; I connect to vpn servers but not via socks proxies so not sure how those are different speed wise.

    If not that, could be qbit settings or version (several years ago some various builds of qbit could be hit or miss but I thought that was more or less done with nowadays). If you are interested in working it out, my recommendation would be to take some screenshots of qbit settings. Then create a post asking about improving qbit speeds and also list a) who the vpn provider is - nord or whatever you use now, b) how you are connecting - nord app or proxy url etc, c) if you are testing with same torrent in each, then what kind of approx numbers you are seeing in qbit and what you expect based on network test. That would probaby be enough info for folks to help you get it sorted and would be a good resource for anybody else having similar troubles.












  • ok, you convinced me that I want Galaxy for Linux too 😁

    the achievements, social, and install management stuff wasn’t too important for me but having it simplify offline installer downloads vs doing it from browser would be great.

    Definitely agree that being able to control install location + whether or not to update is nice (compared to steam) but I was comparing vs what I can already do in the offline installers so I guess that’s why it didn’t matter to me if the client could do it. But some games you need to download a lot of files which is kind of a pain in the ass from the browser (especially when it’s something you need to run under wine since gog tends to split windows games into multiple pieces/.bin files more often than they do native linux ones from what i’ve seen).



  • every few minutes is a lot. havent been on nord for a few years but even when i was on them i dont remember getting drops that frequently. i suspect it is likely not an issue with qbit as many others use it without running into drops like that - including myself.

    probably an issue with either nord or your isp. if you are on wifi, there are also some routeres with known issues when it comes to dropping wifi signal - but there’s too many different models and firmware versions to really guess this accurately without detailed info (and sometimes it only happens in specific versions of firmware on specific routers).

    i get occasional drops on PIA but its usually after running for something like 3-7 days straight. i’m not using the official pia client app but instead download manual ovpn file configurations from pia and import them into generic client. under windows, you need the openvpn free community client for this. under linux, you can import them into networkmanager. iirc, nord has manual ovpn files too but they make you select a specific server and download 1 config file at a time.

    alternately, if you setup wireguard that might also work better but haven’t tested myself


  • I understand the chances are low and my media player needs to be exploited but is there a way to be certain?

    Personally, even if I was on a highly targeted OS like Windows, I wouldn’t really worry too much about video files being infected - with the obvious exceptions of making sure they are actually video files not something like .mkv.exe and that your system isn’t compromised some other way (e.g. installing / running random apps or scripts off the web / email / etc).

    But if you want a little extra peace of mind, you could run an antivirus file scan on it or take steps to sandbox it in a VM or security container.

    If you are on Linux, you can run the media player apps like vlc / mpv / smplayer / etc in security containers which would limit their capabilities if there ever was a successful exploit on the player software via something embedded in a video or music file. There are several different apps you can use to make use of such security containers. The easiest is probably to just use flatpak versions of applications (flatpak is a “universal” linux build format - most of these are available on flathub.org - and have a built-in security container called bubblewrap which you can control with a tool called flatseal). There are also other options besides flatpaks such as firejail (which I use myself), which has pre-made profiles for a lot of the more popular linux apps so like for vlc I could simply launch firejail vlc in shortcuts or I think there is a graphical app for it too. edit: jsut checked and yup, there is a gui called firetools: github | their blog which has screenshots and a 2min video demo.

    Linux security containers rely on features built into the Linux kernel so I’m not sure if there are comparable alternatives for Windows or Mac. But I suppose if you were on one of those, you could always just run things in a virtual machine.

    A post on reddit said to use mkvtoolnix to check all the elements but I honestly don’t know what to look for. Any help?

    Without an actual link to see what they said, I’m going to go out on a limb and guess their assumption was that you would either have some kind of corrupted exe that is NOT a valid video OR a valid video. I mostly agree with that assumption - there are things like steganography that can hide data in some other data files like pictures or videos but that is more just extra crap than exploit.

    IF you accept this assumption, then what they probably meant was that you could use mkvtoolnix to confirm that the mkv file loaded successfully and had audio + video streams (e.g. a really really basic test for it being a valid mkv file). You could do the same thing with the mediainfo tool (I believe this is also crossplatform since that’s what RARBG used to use on their media detail pages… and God do I miss that, wish other public trackers all did the same thing).