Atma Shatakam (The song of the Self) Heinrich von Ofterdingen real deepswarm 11/06/24 (Wed) 18:42:09 No. 145
>I am Consciousness, I am Bliss, I am Shiva, I am Shiva. > >Without hate, without infatuation, without craving, without greed; >Neither arrogance, nor conceit, never jealous I am; >Neither dharma, nor artha, neither kama, nor moksha am I; >I am Consciousness, I am Bliss, I am Shiva, I am Shiva. > >Without sins, without merits, without elation, without sorrow; >Neither mantra, nor rituals, neither pilgrimage, nor Vedas; >Neither the experiencer, nor experienced, nor the experience am I, >I am Consciousness, I am Bliss, I am Shiva, I am Shiva. > >Without fear, without death, without discrimination, without caste; >Neither father, nor mother, never born I am; >Neither kith, nor kin, neither teacher, nor student am I; >I am Consciousness, I am Bliss, I am Shiva, I am Shiva. > >Without form, without figure, without resemblance am I; >Vitality of all senses, in everything I am; >Neither attached, nor released am I; >I am Consciousness, I am Bliss, I am Shiva, I am Shiva. —Adi Shankara, Nirvana Shatakam, Hymns 3–6 I only like the "I am" part.>I am Consciousness, I am Bliss, I am Shiva, I am Shiva. Better to omit more unimportant parts, then it becomes:>I am, I am, I am, I am.
Stop using youtube Ludwig Klanges real deepswarm 11/12/24 (Tue) 07:25:00 No. 147
Even FDN closed their invidious instance:
https://invidious.fdn.fr/ - their blog post:
https://www.fdn.fr/the-fdn-and-gitoyen-networks-are-blocked-by-amazon-web-services-aws-youtube-and-engie-and-no-one-knows-why/ I now only able to use
https://inv.nadeko.net and
https://invidious.nerdvpn.de/ but obviously they're suffering huge traffic and investing a lot of time in maintenance for their users, every day.
Tried piped but I observed that piped is also a mess. 90% instances will show you a
Got error: "Sign in to confirm that you're not a bot" error (thanks for youtube workers) and you need to manually change your piping instance in the "Preferences".
Btw. I've never been able to really open
https://piped.itinerariummentis.org/ and watch a single video. I don't know if I'm the only one who can't use most of the available piped instances.
B. Op. 111 11/12/24 (Tue) 12:06:44 No. 148
>>147 Strange, I've been using it for several months with no problem and it works great. Could you pls tell me some detail about the behavior of the site? For example, does the frontend load? Does the thumbnails load? Or is it just that the videos don't get loaded? Are you using TOR to visit the site?
Currently there's no choice since many lecture videos are only on utube.
Invidious has software issues. Piped has no issue software-wise, but the IP can be banned. I'm using gluetun to let piped work through vpn so it isn't the same issue as other instances.
Giacinto Scelsik 11/12/24 (Tue) 12:38:59 No. 150
>>148 I tried chromium and librewolf and it didn't work, and I suppose some kind of cache kept it working for me on mercury.
I looked at the request made and found that requests are made to
https://backend_hostname and aha. I fixed it, it should work now. If it doesn't pls tell me.
Digdeepest real deepswarm 11/12/24 (Tue) 17:57:14 No. 153
>>150 I think right after you made this reply, I can use your instance by librewolf. But now it doesn't work anymore. My librewolf (using tor ips)
only shows me the blank trending page now I doubt it's because of my slow internet connection, after a really long loading it shows me the trending page and works fine and Mercury (using a HK vpn) can make it load the trending page, even can search, but shows
Got error: "Sign in to confirm that you're not a bot" for every video.
So finally I tried it by using a
real ip . It works.
B. Op. 132 11/13/24 (Wed) 09:19:55 No. 154
>>153 Strange since your ip has nothing to do with whether you're seen as a bot by utube. It simply doesn't make sense.
The instance's connection to your machine is the standard one and I don't block TOR, neither any vpn, on my server.
The instance's connection to utube is made through a vpn that periodically switches server and I know that airvpn ips have never been banned by utube, especially when the ip is from Japan.
Horatiu Rădulescu 11/13/24 (Wed) 09:45:36 No. 155
>>154 To add to that I'm behind VPN 24/7 now and has been like that since the instance was set up. How can it has anything to do with whether you're on VPN or not? Impossible. The only possibility is that when you were on VPN utube blacklisted (but not banned) the IP of the VPN server that the piped instance was connected to, which never really happened to me, and when you got off from VPN it was whitelisted again or the instance server switched a VPN server, which is really not likely since the cronjob wasn't set to work at that time.
BTW it's nonsensical to stream video over Tor especially if you're going through snowflake bridge, it's like pointlessly suckling bandwidth. In fact I avoid viewing any of the audio/video you posted here since it's over Tor.
BWV 1002 real deepswarm 11/13/24 (Wed) 14:23:21 No. 156
>>154 Piped obviously does not use every user ip to directly connect to utube, so yesterday this also made me puzzled.
But I didn't expect it to be related to the browser or cache at all. I just tested it again. What is very strange is that it seems a different instance picked in the preference on my browser side, really remembered by piped/Mercury frontend/cache whatever. So I can now be sure that the problem is here. I clicked the
reset preferences then.
But Mercury is really strange now. I found that after I clicked the reset buttom, when I visit your instance it still shows me it connected to that unset
backend_hostname variable "domain".
https://pipedapi.itinerariummentis.org is still missing. It's clearly something cached by
Mercury , not piped. UMatrix is confused by this also. [p1]
Final test: it's fine on Palemoon and Librewolf, and streaming is also OK. [p2]
B. Op. 110 real deepswarm 11/13/24 (Wed) 14:30:59 No. 157
>>155 >it's nonsensical to stream video over Tor Yes, yesterday I was just tried to use a different ip to check the situation, because my first reaction was to wonder if my HK ip was restricted (even if it was obviously impossible)
But the audio or video I upload is almost less than 12MB. Jesus. Is this really that bloating for a snowflake proxy.
Embedding meh utube large videos do cause bandwidth problems (assume there are >5 users watch the videos I embedded in chan over tor, at the same time)
Ludwig Klanges 11/13/24 (Wed) 19:43:23 No. 159
>>157 In general I just avoid using any media when Tor is on by simply banning all the media larger than 1mb. I run a relay myself and know it's no joke and if we these relays can't hold on then only those with beefy servers will be able to really join the relay, and that'll be disastrous. IDK about how other people handle this but that's none of my business.
backend_hostname is really a misconfiguration that I made but it worked for me like for 5 months (and I think it indeed worked but a recent update somehow messed it up) so I never noticed until I switched my browser and looked at the request. It should be corrected by a browser full reset of the site.
Taras Bulba real deepswarm 11/14/24 (Thu) 02:40:35 No. 162
>>159 >run a relay Haven't run a relay yet. I'm considering to change my vps provider (not content to the vultr pricing), and after that I might be reset and clean most of the services, like, add the new and clean the old. thanks for your advice.
Media "larger than 1mb" is not suitable for the tor network. I may have never considered this issue, because I think tor actually needs
more users to make every user's anonymity in the regional network better, so I am currently in the stage of normalizing the use of tor.
Hugo Ball 11/14/24 (Thu) 10:39:19 No. 163
>>162 Why do you need more users if they won't ever contribute and don't want to make any effort in it and moreover just waste the bandwidth and make anyone participating in the Tor network suffer? They're just going to be doing stupid stuff like logging in to their google account over Tor and keep on using their raped-by-javascript favorite 20mb-per-page sites.
La Legende d'Eer real deepswarm 11/14/24 (Thu) 14:31:12 No. 165
>>163 Logging in to any big company account is impossible on tor. Most of them block tor ips. Including Obfs, and snowflakes. I have not yet seen any of the tor users like you describe. From what I have observed, normies who use tor are just
less reliant on the tor network. Since they have so many accounts on bloated websites, it will be more convenient for them to use them in a normal browser (with a normal ip or vpn ip). They are very dependent on convenience. It is impossible for them to endure a re-captcha test with abnormal traffic that pops up every 1 minute on a tor browser. They often open tor deliberately when they are doing unconventional activities, such as searching for something they think glowie.
Technically tor network is aim to offer service to those who "won't ever contribute" and who wants to use, just like normal foss softwares. Not every foss software user, or even distance owner,
should be a code contributor, like, if not, they will be blamed. Users are just users. And technically tor network needs more users especially in "third world countries" so that one user in the regional network won't glow in the dark… tor network itself is aimed at the public, they have their propaganda for it, it is impossible for them to reject any normie user.
So Idk what the point of your complaint is. Tor needs more users, and as a user currently in a shit region I also need more users to make myself safe or the police will call me. When my site was on the clearnet in early days the police literally call me. Obviously I also resent normie users, and I even resent anyone who don't have their own vps server or own a static site, but I really think they seem to have nothing to do with the goals and capabilities of the tor network itself.
Morton Feldman 11/14/24 (Thu) 19:23:31 No. 166
>>165 This is so confused, wait a min.
>Most of them block tor ips. Including Obfs, and snowflakes. No once you've logged in even if your traffic is through an exit node it still works.
>Technically tor network is aim to offer service to those who "won't ever contribute" and who wants to use, just like normal foss softwares Technically yes it claims to that ideal, but practically you still need GPL instead of BSD, why? Technically you certanily owe nothing to those developing free software, but the whole culture is parasiting upon the global superpower that's behind it and moreover the capitalistic order, and free software developers nearly always are woking in a big-tech company. There are some Russian exceptions but that's another story about how Soviet education made it possible. These pen-testers who while smart enough but cannot really do software engineering doesn't seem to understand that. So let's try to think it over again. How does Tor network survive? I think there should be an agreement that doesn't need to be made but everybody somehow knows unconsciously, that they won't stream videos or torrent over Tor.
>a user currently in a shit region I also need more users to make myself safe Oh you're saying that you need many people there using the network so that the authority will not be able to locate you based on your using the Tor network, and that means you need more users using it. That I just don't think is what Tor can fight against. You use Tor, everyone sees it, the traffic is glowing in the dark, the point of Tor is simply that what's inside it cannot be seen, but it would be just clear like hell that you're using Tor. They might advertise themselves as authority-resilient but that's just pure dream because I think most of the affliated people are in Western country. There's a reason why people use simple proxy to obfuscate the traffic rather than use Tor which simply isn't designed for general usage.
>When my site was on the clearnet in early days the police literally call me. I don't think it's related to your not using Tor and moreover using Tor is just like advertising yourself that you're doing something suspicious without any bridge or proxy. If you're saying that it's the website that attracted the police then I still don't understand; I don't see anything suspicious on your site and the police they're also people who need fund to operate it's much worse than suboptimal to mess with you just because you have a clearnet website. And first of all how did they know that? There are so many things here that I cannot even imagine it has anything to do with Tor.
Hammerklavier 11/14/24 (Thu) 19:49:25 No. 167
>>165 Free software survived not because it was an ideal - maybe its status as an ideal contributed to that - but because it was quite profitable. Many of the free software on github are just stepping stones for the career advances of software developers. Especially the tranny type smh. You want to be hired? Show me your open source code. If you've participated in open source free software blah blah then well you'll be hired since you know the stuff the workflow etc. That's the reality no matter how they brag about their ideals.
How does Tor survive? I can suspect that black markets operating behind it makes it possible; they need it, so they run nodes and relays, but they can say that they're doing that for pure benovelence for general users. Then I can speculate that those who value privacy and those do black market business are symbiotic over Tor. This may not be true, but crucially there is money flowing into it. General user can participate and that's good for both general users and those governmental institutes and bigtech companies that sponsor it, but that ends there. When people stream video over it, for example, those servers run by those who earn money by doing black market business will survive, but others just won't, and that means gaining control of the network. Of course I don't think it would be the black market runners that gain control of it, it was just purely hypothetical. There's no essential difference in using youtube or using Tor since they're just all damn in some way good for bigtech and that's reality, the point for now is to live within it properly when it's possible.
Maybe in the future when network becomes really cheap and watching videos is just like reading text a large user base will help, but for now I sincerely doubt it, and I'm not optimistic about the current direction of the, muh, world, at all. For example I have more doubts, which others may not be concerned about, regarding for example the increasing consumption of eneregy and all those waste that the internet is introducing - that damn generative AI and cryptocurrency which literally are negative nuclear power plants. These are real problems that no one seems interested in solving and many problems are just diverted to, say, third-world countries and causing havoc there, but I guess people can still brag about there openness and future-directedness.
BWV 1004 11/14/24 (Thu) 20:29:21 No. 168
>>167 Let me expand it just in case.
First. Clearnet site stuff I just don't have a clue normally they won't ever be able to detect who's running a site unless the site admins is really stupid and did something unimaginably stupid or the VPS provider just gave your info away and I've never heard about censoring ssh connection. Of course they can dig the dns record of a site and identify the IP with the ssh remote host destination in their record, but that's simply too much a budget needed. And even if they indeed do that you can simply multi-hop and ssh to your server. It's irrelevant to Tor.
Next. Obfs and snowflake. I think you understand that what obfs/snowflake does is simply providing a proxy and all connections to the destination need to go through an exit node.
Without proxy: Origin -> layers of Tor relays -> Tor exit node -> Destination
With proxy: Origin -> proxy -> layers of Tor relays -> Tor exit node -> Destination
Here Origin -> Relays is transparently advertising itself as Tor and hence you need snowflake since Chinese network simply blocks Tor, but they possibly do it really badly when compared to homebrew solution given by shadowsocks/v2ray, and more users using Tor doesn't help even a bit for your anonymity as to whether the local authority can detect whether you're using Tor. Locally the best way is certainly just connect to a self-hosted v2ray/shadowsocks over tls + websocket possibly with cloudflare cdn and that will never get censored. Now for anonymity - now it has nothing to do with the local authority but with the big techs and stuff - the proxy should be connected to the onion network and the traffic should pass through it, this can be accomplished simply by stream-lining in the origin or by torifying in the proxy, but either way more users using Tor just won't ever help about your problem so your explanation just doesn't make any sense to me.
Edgard Varèse real deepswarm 11/15/24 (Fri) 05:07:56 No. 170
>>166 >just because you have a clearnet website. And first of all how did they know that? Clearly you don't understand how messly one live in a shit censored region. That's not just because I have a clearnet website, that's because this website is hosted on an
overseas server, this was what they told me.
And for the question that how they know that, I think you quite know your website and my website both have huge amount of glowie visitors. (although I don't have much content on my website, this cannot stop someone spread my clearnet url. Also on early days when I'm more "naturally" I think I even post my clearnet link over the douban profile so this made the clearnet link spread in the first place) They occasionally post my xyz domain to someplace like censored group chat room. I don't really know who and when but I'm sure there were such situations that they made me glowing.
So none of anonymity methods work (simply because there're many glowie visitors) until I intended to block them by totally using a onion site. They cannot find the site anymore, most normies aren't able to find the hidden onion link or they didn't store the onion link locally so they will give up.
Wilhelm Meister real deepswarm 11/15/24 (Fri) 05:33:15 No. 171
>>168 >Tor doesn't help even a bit for your anonymity as to whether the local authority can detect whether you're using Tor. Yes I know that. The police will know the location,
and whether or not Tor is being used.
I think I really didn't make it clear what I mean. The "regional" network I refer to refers to a public network rather than a private home network. A public network means that many people are using it at the same time, and more users do mean that individual traffic will no longer glowie in the dark. What I envision may be that in a regional public network, there will be really a large number of people using the tor network at the same time, which makes the anonymous method completely effective… (assume that biological threats including cameras and monitors are not within the scope of discussion)
But you know, of course I doubt whether people can get this place, but I don't think it should be so difficult in Europe. The tor network still needs more publicity and
popularization , so I want to use it more. If you think that I only allow visitors visit my bloated website over tor will cause a waste of bandwidth, a better way may be that I shrink more media content, but this becomes very strange again for me. It seems to me that it is an unnecessary restriction. I would rather become more "unethical" and be a "user" (but then again, I don't think I have ever done any actual action to pay for foss commmuuunity or tor network)
Kaoru Abe real deepswarm 11/15/24 (Fri) 05:47:43 No. 172
>>171 As for my using of home network which totally makes me glowing, ich finde that in fact, when cops cannot access the inside content, they will not care at all, since they're clumsy and lazy. Another possibility is that cops are no longer planning to watch me now. Because the previous situation of being watched by cops was in SH, I later found that outside that place, including Guangdong and Fujian, that kind of situation would not occur, especially Fujian.
So I gradually came to the conclusion that in addition to give up using the internet, the way to be truly anonymous is to not let any glowie user/group/platform know about myself.
Well, maybe I have added more unimportant details now.
Norbert Von Hellingrath 11/15/24 (Fri) 10:42:08 No. 173
>>171 Oh it still doesn't make sense to me because using Tor itself is just "dangerous" even if you're in a public network unless you do something about your MAC address etc. and I think you already know that. You individual traffic will always be glowing in the dark and when Tor is popularized they'll just crack it down completely. Using Tor is of no help. China works just different from the States, the "threat model" is completely different. You're confusing the case in China between the case in the States or EU. It's just totally different.
In China simply being a Catholic can make police contact you, and using Tor is no different from being a Catholic. They may not know what you're doing on Tor, but they don't care. In the first place they're doing this not mainly for censoring but for the sake of creating an isolated economic system so that the big techs in the States won't be able to monopolize the market and make Chinese internet dependent on the States.
Aroura 11/15/24 (Fri) 10:56:10 No. 174
>>172 In the States and possibly EU they really want to know what you're doing, but in China they just don't. It is not that when cops cannot access the content they don't care, it is that since normal user won't access your site they'll no longer care.
But still I don't understand why they are shaming themselves by lol watching even you. They're too rich maybe. There are plenty of people hosting websites on an oversea server, in Beijing or Shanghai, but I've never heard similar stuff happening.
B. Op. 132 11/15/24 (Fri) 11:17:18 No. 175
>>171 And again why so personal? I'm not saying that your site is problematic. I just don't let any media to be played on Tor and it's unreasonable to connect to, say, piped, over Tor, that was my point. The crucial point was piped, not your site which I doesn't care. Whether you host a clearnet site or not I don't care. Whether you do anything on Tor I don't care, but the point simply is, to stream video over Tor is totally unreasonable and strange and I can't think of a single reason to do that. And that was that and no more.
But on the other hand the claim that Tor introduces anonymity regarding Chinese authority it just doesn't make any sense. Over a proxy they'll never be able to know what you're doing on the net, except that you're connecting to a proxy, so it's no different from Tor, and maybe better since stuff like v2ray can obfuscate more completely than obfs or snowflake since they're specifically designed for that.
The picture you attached and stuff like that it's really about the case in the States. They normally won't watch people simply because someone uses Tor. Even if you're the only one using Tor in a public space to really get you they'll need to first trace back from, say, a black market activity, and google search logs (which are stored like for 10+yrs), and isolate that area out, and then they'll be able to catch you because you're the sole one over Tor. But that requires hell more work and is much more precise than what the Chinese are trying to do.