Hacker News new | past | comments | ask | show | jobs | submit | manbash's comments login

VPN is used to bypass regional restrictions.

The VPN provider will share information if an active investigation is underway.


Buy VPS with Monero.

Deploy image containing Tor router and hidden service onion config.

Do above as many times as one needs to feel comfortable.

Use VPSes as proxies intermixed with VPN and Tor legs.

What's lil officer Timmy at CISA gon' do? Netflow you? LOL!


Fine except TLA is running your VPS.

And just like that, they track you down to an Upstate NY MacDonald's wifi hotspot that you're never going to visit again. Now what?

It's the same with all crimes, sure you can theoretically get away with the perfect crime. But you only have to make one mistake to get caught.

Re-use a username, accidentally log in to something as yourself, forget to turn on the VPN, etc.

Just for some lolz which could result in prison time.


the VPN provider can try to share whatever information but most reputable providers would have nothing

You can pay for a VPN using monero or cash and then connect to the VPN from TOR - VPN provider doesn’t need to know anything


Please don't do this. Most people aren't going to pull this off correctly and if they think this makes it safe for them to go around messing with companies they could really get themselves in a lot of trouble.

If I were to mess around with stuff, and im not. The only way I'm doing that is with a used laptop of Craigslist or whatever and cafe with no cameras, even then idk.


Qubes OS.

Done.


Sorry you will never catch me using hardware to commit a crime that's ever connected to my home or work networks or ever in anyway been associated with my name. IDC about the OS. But I'm not going to commit a crime either so I don't worry about this FYI

If you're already using Tor, what's the point of having a VPN too?

There isn’t a point. It is useless security theatre for those who do not understand how tor works.

it's called defense in depth which makes sense if your life depends on it not to mention tor is most likely blocked while VPS/VPN aren't

So the target doesn’t see a bunch of random connections coming from tor/known exit nodes

Only "benefit" would be that TOR might be blocked but the VPN isnt.

I sometimes indulge in doing the KFC chicken rice cooker hack recipe. Look it up if you haven't yet.

I do too wonder.

Given the disruption of LLM everywhere, and in Google specifically, I wouldn't be surprised if the headcount was reduced in these teams as well.


A side note: I am suspicious about the channel in the posted link. It seems to simply cut clips from the original video, without information and credit.

Anyway, here is the original source: https://youtu.be/cPvRIWXNgaM


State diagram and sequence diagram complement each other, rather than competing.


I am surprised by the lack of eSIM option, which unfortunately is a dealbreaker for me. :(


The article should at least preface with some explanation about lazyvim.

Some snippets simply have comments like "I use lazy.nvim to load plugins" and that's it.


I hate when that happens, a lot of searches around the neovim ecosystem ends up with various replies that assume 96 layers of knowledge even before understanding what the solution is about.


after years of using my custom neovim config I honestly just transitioned to lazyvim and it removed so much maintenance time, I'm happy with it


Same. I want to say junegunn's vim-plug started this revolution. I'm thankful for all the prolific vim plugin developers. They've really made my day to day more pleasant.


lazy.nvim is a plugin manager. LazyVim is a Neovim configuration. Don’t confuse the two.


What a great game. The "mega monkey" difficulty had me attempting every possible combination with my inventory items.


I actually don't understand the "AI-generated code" excuse. Code analysis should be part of the pipeline regardless.

It's not like people are perfect code developers.


I think what they mean is 'an influx of AI-generated code (which is frequently garbage)'


With respect, the person doesn't understand the purpose of git.

Doing 'git pull' often would fit for a very specific workflow, and one that in time proves to be a wrong workflow, in my opinion.

Don't do things that don't have a conscious purpose.


You are commenting on one page of a webzine, written by a person who has used git for years and has written lots of educational material on git and other technical subjects. She understands the purpose of git.

In the linked comic she is pointing out, correctly, that while there are conventions that make good workflows, git doesn't enforce them and allows you to do stupid stuff. Surely you don't disagree with that.


Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: