• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: July 27th, 2023

help-circle
rss
  • You say you’ve already read Librewolf’s FAQ, so I can skip over what they’ve provided in their response.

    The only possible downside I could see would be that your encrypted data is stored on Mozilla servers. Which isn’t a very major downside–it’s properly end-to-end-encrypted. This is mentioned both by Mozilla themselves, as well as in the Librewolf docs. This is the only downside I can see right now, but for the paranoid, it might be worth looking toward the future; who knows, maybe some day, Firefox will randomly decide to disable E2EE for Firefox sync. That could be a potential downside down the road. But I find that to be pretty unrealistic… I honestly can’t see a lot of ways for Mozilla to screw this up.

    If the prospect of relying on Mozilla servers still makes you uncomfortable, then you can self-host a sync server, but it’s not exactly a quick setup. They do provide a Docker method of installation, at least. The sync server code is found here, along with installation instructions for self-hosting and how to connect it to Firefox/Librewolf/other derivatives: https://github.com/mozilla-services/syncstorage-rs




    • ALWAYS avoid partial upgrades, lest you end up bricking your system: https://wiki.archlinux.org/title/System_maintenance#Partial_upgrades_are_unsupported
    • The Arch Wiki is your best friend. You can also use it offline, take a look at wikiman: https://github.com/filiparag/wikiman
    • It doesn’t hurt to have the LTS kernel installed as a backup option (assuming you use the standard kernel as your chosen default) in case you update to a newer kernel version and a driver here or there breaks. It’s happened to me on Arch a few times. One of them completely borked my internet connection, the other one would freeze any game I played via WINE/Proton because I didn’t have resize BAR enabled in the BIOS. Sometimes switching to the LTS kernel can get around these temporary hiccups, at least until the maintainers fix those issues in the next kernel version.
    • The AUR is not vetted as much as the main package repositories, as it’s mostly community-made packages. Don’t install AUR packages you don’t 100% trust. Always check the PKGBUILD if you’re paranoid.


  • In regards to email aliasing services, addy.io is the only one I know of other than SimpleLogin, which is owned by Proton AG–so if you want to get away from Proton, SimpleLogin isn’t an option. Both of these services are recommended on privacyguides.org.

    Some email services allow you to use a domain you own, which theoretically should give you unlimited aliases to work with, but may not be as privacy-focused as the email address is only as anonymous as your registered domain.

    Personally, I prefer the ‘pseudonymous’ aliases that addy.io and Proton Pass give (it’s usually something like random.words123@passmail.net in the case of Proton).

    If anyone has good experiences with other aliasing services that provide this option, please let us know.





  • I get 8.44 bits (1 in 347.34 browsers). I use Firefox with Arkenfox user.js applied on top, with some of my own custom overrides.

    However, I think the biggest factor could be because I have Ublock Origin set to medium-hard mode (block 1st party scripts, 3rd party scripts and 3rd party iframes by default on all websites), so the lack of JavaScript heavily affects what non-whitelisted websites can track. I did whitelist 1st-party scripts on the main domain for this test (coveryourtracks.eff.org), but all the ‘tracker’ site redirects stay off the whitelist.

    I actually had to allow Ublock Origin to temporarily visit the tracker sites for the test to properly finish–otherwise it gives me a big warning that I’m about to visit a domain on the filter list.









  • At this time, we feel our case for a defamation suit would be very strong; however, our deepest wish is to simply put all of this behind us.

    The passive-aggressive bragging… this comes off as nonprofessional to me, like “we could sue the pants off this person if we wanted to”. Why does the public even need to hear this part in particular? It sounds like something that should be privately communicated to the alleged defamer, not the public. It’s a little odd in my opinion…

    Regardless, I am interested in seeing the full report and I’ll keep a close eye on this.


  • I would try what the other commenter here said first. If that doesn’t fix your issue, I would try using the Forge version of WebUI (a fork of that WebUI with various memory optimizations, native extensions and other features): https://github.com/lllyasviel/stable-diffusion-webui-forge. This is what I personally use.

    I use a 6000-series GPU instead of a 7000-series one, so the setup may be slightly different for you, but I’ll walk you through what I did for my Arch setup.

    Me personally, I skipped that Wiki section on AMD GPUs entirely and it seems the WebUI still respects and utilizes my GPU just fine. Simply running the webui.sh file will do most of the heavy lifting for you (you can see in the webui.sh file that it uses specific configurations and ROCm versions for different AMD GPU series like Navi 2 and 3)

    1. Git clone that repo, git clone https://github.com/lllyasviel/stable-diffusion-webui-forge stable-diffusion-webui (the stable-diffusion-webui directory name is important, webui.sh’s script seems to reference that directory name specifically)
    2. From my experience it seems webui.sh and webui-user.sh are in the wrong spot, make symlinks to them so the symlinks are at the same level as the stable-diffusion-webui directory you created: ln stable-diffusion-webui/webui.sh webui.sh (ditto for webui-user.sh)
    3. Edit the webui-user.sh file. You don’t really have to change much in here, but I would recommend export COMMANDLINE_ARGS="--theme dark" if you want to save your eyes from burning.
    4. Here’s where things get a bit tricky: You will have to install Python 3.10, there is warnings that newer versions of Python will not work. I tried running the script with Python 3.12 and it failed trying to grab specific pip dependencies. I use the AUR for this; use yay -S python310 or paru -S python310 or whatever method you use to install packages from the AUR. Once you do that, edit webui-user.sh so that python_cmd looks like this: python_cmd="python3.10"
    5. Run the webui.sh file: chmod u+x webui.sh, then ./webui.sh
    6. Setup will take a while, it has to download and install all dependencies (including a model checkpoint, which is multiple gigabytes in size). If you notice it errors out at some points, try deleting the entire venv directory from within the stable-diffusion-webui directory and running the script again. This actually worked in my case, not really sure what went wrong…
    7. After a while, the webUI will launch. If it doesn’t automatically open your browser, then you can check the console for the URL, it’s usually http://127.0.0.1:7860. Select the proper checkpoint in the top left, write down a test prompt and hopefully it should be pretty speedy, considering your GPU.

  • I assume 4chan does not sell your data with 3rd parties (it pays the bills from user donations and people who buy a ‘4chan pass’, I think advertisers might’ve pulled out from the site long ago, given its vulgar nature) however it does appear to comply with law enforcement. See this 4chan user who was sending death threats to a Florida sheriff on 4chan, and was later arrested for this: https://www.thedailybeast.com/tyler-meyer-busted-for-threatening-sheriff-mike-chitwood-on-4chan

    I believe it’s possible that 4chan had given this user’s IP address to law enforcement. 4chan records your IP address when you post, and only administrators can see it: https://4chan.org/faq#postanon

    You can also look at the Wikipedia entry for 4chan, similar users have been arrested for making these death threats: https://en.wikipedia.org/wiki/4chan

    I don’t advocate for what these users do, it’s harmful, and they honestly have it coming when they get arrested–but it shows that if 4chan is compelled to reveal your information, they will.

    It’s not possible to post under a VPN by default, they’re blocked site-wide to combat spam and automated posts, even though there’s already a captcha when you post? I guess they’re just trying to play it extra safe. You can post under a VPN if you buy the 4chan pass (https://www.4chan.org/pass), however 4chan does not support any privacy-centric options like Monero or even cold hard physical cash, which means even if you post under a VPN, you can still be linked to your posts via payment method.

    Me personally? I lurk on there every once in a while, but I’ve never posted, for these reasons. At least I can post under a VPN on Lemmy.