• arisunz@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      2 months ago

      i mean the dude does end up uploading a torrent of a jordan p*terson video as an example so that’s pretty sus, at the very least

      • Confetti Camouflage@pawb.social
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        His actual computer related stuff has good advice in it but a lot surrounding that advice is indeed pretty sus or extrapolates to clownish end analysis. Like Ford patenting a speeding snitcher to put in their cars that reports other nearby speeding vehicles to the police is going to lead to the end of non-autonomous driving. I wonder if “car dependency” means anything to him. Just engage with it critically.

  • earmuff@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    If someone is actually trying to convict you just based on the correlation of the connection times, you probably don’t just share a copyrighted movie. So why mentioning this as an actual threat in the first place?

    • didnt1able@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      There’s nothing saying that tomorrow this isn’t the case. Laws are fluid, just because they won’t come after people currently for small time piracy does not mean that won’t change.

      • earmuff@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        2 months ago

        Tomorrow passwords will be cracked in no time, because most algorithms are not quantum safe. Same with password length.

        I never said it is not an attack vector. There are dozens if not hundreds. The question is about the probability, which is always a dimension if you manage risks. There is no need to list all theoretical possible attack vectors, if the probability of actually happening only affects 2 people on this planet.

        Videos for educational purposes should not sensationalize unlikely attacks, as it only causes unnecessary fear. I’d rather have someone using torrent on VPN than not using anything at all because they are now afraid of the government.

      • earmuff@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Is this the only point, when it comes to security? In my experience, the ease of use is also a factor. Today, VPN clients are just one button and it runs. I2P is almost there, but requires you to setup some configs manually. So is it really worth to drive a tank to just go grocery shopping?

        • dwindling7373@feddit.it
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          It is not the only point when it comes to adopting technologies, when it comes to maximizing privacy, yes maximizing privacy is tautologically the only point.

  • noodles@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    You can’t connect to pairs outside the i2p network And i personally haven’t found any active torrenting community for p2p So yeah i2p is really cool, but i don’t think you can pirate over it just yet