2021 Nov 23, 8:38pm
305 views 21 comments
Gab Tv I haven't figured out if that's really a thing or not though.
his customized Mastodon implementation with more holes than swiss cheese,
She keeps telling them she wants to leave to get a coding position closer to development and engineering side. So they keep giving her a raise. Good sharp QA people are hard to find.
It was fun from 1990 to 2010 - but today, we're just tweaking stuff.
I think She wants to get into machine programming and micro processors. She's beyond my skill level, but She and her sister, have gotten degrees for it. They did many school projects with Raspberry PI, and sensors and breadboards. That's where the real exploration and innovation is now.
Way back when most people and small businesses had 52K speed and it was a current buzzword. I wrote a client server bit torrent app, for offices around the country, to keep the client running. Every night the headquarters would run the server app. It would ping those offices, to run a script to convert their Quickbook records, into CSV files and stream them down, a 3gig database. We were sending a few bits at a time, and were able to get those files in about 20 minutes. Where as trying to dump it to ftp took three hours or longer. We were doing that, before bit torrent was a thing, or was just coming out. I think Napster came out the following year.
The danger of absolutely secure networks is that some of the most vile evil stuff can be shared. But we have political censorship now. Provide one, give the ability to the other. There's no choice now.
What about who controls the connection protocol?
You have to have IP or something similar to connect in the first place, before any encrypted content can be sent.
Could not a government set up a series of routers that block all IP addresses except the addresses the government officially hands out?
They could just shut down any IP that uses TOR or similar.
I suspect that current day VPNs are not as secure as the users think, and using a VPN is a marker for where the Agencies can look for the juicier stuff.
Of course they can block communication, but they won't be able to deny it when they do.
And there's no need for the Internet really. We can all do this wirelessly with ad-hoc networks that replace the internet.
richwicks saysOf course they can block communication, but they won't be able to deny it when they do.Yes, but we know now how FaceBook/Google/Apple censor and it still happens. Government shutting off IP to anyone that breaks the rules is the next step. Think China.
richwicks saysAnd there's no need for the Internet really. We can all do this wirelessly with ad-hoc networks that replace the internet.Any wireless transmissions are easy to locate. I know this from experience with TEMPEST in the Air Force, plus some dealing with FCC where they have ongoing listening and recording, and can triangulate a rogue broadcast even after the fact by "playing the tape."
When #1 fails, #2 is in effect.
richwicks saysWhen #1 fails, #2 is in effect.Absolutely. But I would like to see the country wise up and remove the tyrants before it gets to that. And the first step is like you say, getting people to realize who the tyrants and the collaborators are.
I give up on dlive. The problem is that the files also disappear once they are done. Dlive seems to ONLY be live.The other 11 I got. I'll turn it into a cgi script. 3 of them depend on wget to construct the embeded videofreevoice.io - that needs to download TWO web pages to workodysee.comrumble.comOnce I have a cgi script running I'll show you a bunch of examples. They are just random videos I found to test.