sorted by: new top controversial old
[-] psud@aussie.zone 1 points 1 day ago

You can keep secrets from the future. Future decryption won't help government see what you did in the now, the logs don't store the encrypted payload, only the end points and the user/ip

[-] psud@aussie.zone 1 points 1 day ago

My mail lived on an Intel atom based mini itx machine for years. I wanted to play with breakup by replication and bought a cheap shell. Now the cheap shell is my only mail server

[-] psud@aussie.zone 2 points 1 day ago

Linux + postfix (SMTP) + dovecot (IMAP and POP3) + SPF + DKIM on the host

Point the MX record for your domain to your IP address

Contact your ISP and ask them to set the PTR record for your IP to your hostname

Mail can be handled by a very low end computer, a raspberry pi can handle email for a small number of users

If you have a specific mail machine you would forward the ports you use to that host on your router.

[-] psud@aussie.zone 3 points 1 day ago* (last edited 1 day ago)

I self host email. Email is easy. I went a tad overboard with database configuration, a configuration/password change program, a few virtual hosts so I can renew six different names, but a single domain on a Linux box (any flavour) is easy

It makes it easy to make a bespoke email address for every entity you interact with, or show them the respect they deserve by giving your valid email spam@your.domain.tld

It is a bit of a hobby though. You need to keep up with email security if you want to send to anyone.

[-] psud@aussie.zone 2 points 2 days ago

By telomere length humans should live to about 120, but we don't. There are other problems to solve before telomeres matter

[-] psud@aussie.zone 4 points 2 days ago

Your ISP sees the connection to news.usenetserver.com and if they cared could get a court order to get your data from them. They can compel you to release your username and password.

You also need to protect yourself against future law and enforcement

[-] psud@aussie.zone 1 points 2 days ago* (last edited 2 days ago)

I know that government prosecutions for fraud against government use IP addresses

The IP address identifies the company or home the fraud was done from, the account the money went to identifies the individual

If breaking the law and able to afford to make it difficult for prosecutors, it's probably best to make it difficult for the prosecutors, we may have an activist pro copyright holder government in future and logs are forever (or 5 years)

[-] psud@aussie.zone 1 points 2 days ago

It seems trivial for the US government to tie data into TOR to data out. If you're hiding things that government is willing to spend effort seeking, it's not safe.

[-] psud@aussie.zone 2 points 2 days ago

Is your home machine, your phone, better protected than the VPN servers? I bet you're not as good at IT security as the IT security staff VPN companies hire

If your threat model includes nation state actors, you're best off not using networked computers

[-] psud@aussie.zone 10 points 2 days ago

That says their error was trying American threats "we got you dead to rights, tell us your income and we'll tell you how much to pay our we'll sue for punitive damages"

Which isn't legal in Australia. They would have been ok if they had asked to send a letter saying "stop it or pay us a reasonable amount for one person viewing the film once" but of course actual damages aren't enough for film companies

They were too greedy.

[-] psud@aussie.zone 1 points 2 days ago

Optimum usage detonates the weapon at higher altitude than those who proposed nuclear winter believed

Nukes used with the intention of doing the most damage throw the 2nd least amount of soil into the stratosphere

(2nd after maximum EMP attacks)

view more: next ›

psud

joined 1 year ago