Avatar
Jac
ae668387f74ff3dabf1c8ffa99bb53758d00d179533d7113d5f8b5d2ee570f6d
Agorist The space between… John Nash Friedrich Hayek Noam Chomsky Ayn Rand RD Laing Hannah Arendt Samuel Edward Konkin III

Regarding Presidential Elections in the United States:

1. Ban outside funding of any kind.

2. Every eligible candidate gets the same fixed financial war chest.

3. Every eligible candidate debates publicly.

4. Bad debate etiquette results in expulsion from the election.

#potus #election #presidentialelection #unitedstates #kennedy

I just a saying:

Your dog is your best friend for part of your life, but you are their best friend for their whole life.

Amazing.

#canine #doggo #dogs #dog

Interesting attack on VPN services.

Thoughts? nostr:npub1f6ugxyxkknket3kkdgu4k0fu74vmshawermkj8d06sz6jts9t4kslazcka

It seems to me that any cellular network should be considered a hostile network.

Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.

TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address. The researchers believe it affects all VPN applications when they’re connected to a hostile network and that there are no ways to prevent such attacks except when the user’s VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.

[...]

The attack works by manipulating the DHCP server that allocates IP addresses to devices trying to connect to the local network. A setting known as option 121 allows the DHCP server to override default routing rules that send VPN traffic through a local IP address that initiates the encrypted tunnel. By using option 121 to route VPN traffic through the DHCP server, the attack diverts the data to the DHCP server itself.

I cannot help but believe that Local Monero closing down operations has to do with external government pressure to regulate peer to peer resource transfer. While that is reassuring for the resiliency of the Monero protocol, every channel that closes makes it more difficult to people to use it in the fungible way a currency must operate. Monero is dead! Long live Monero! #Monero

I run an I2PD instance on Linux. The sites are effortful to reach and seem unstable, but there is some interesting stuff. The maggot torrents are interesting too.

I was surprised to hear from several people living abroad that in Demark a colonoscopy is considered to be a higher risk procedure, and as such is only done when indicated for by test results or symptoms. It makes me suspicious of the let’s do it for everyone over 45 thing here in the US. Money money money money….you know? Maybe there is solid science to support it, but so much research is funded and influenced by the corporate industrial medical complex these days, it’s getting difficult to trust findings.

So I wonder, obviously you find a colonoscopy to be valid preventative medicine, but what do you think of those countries which recommend a stool blood screen and only follow positive results with a colonoscopy?

Kimber K6S 3” .357. It’s enough for defense, it’s small and hammerless. It’s not as light as it could be, but stainless and six so there is a price to be paid.

Two recommendations. Carry with an empty chamber under the firing pin, revolver or SA, and never holster the firearm in your waistband. Femoral artery breach and you bleed out in 30 seconds. Better safe and sure.

9mm won’t do much to a human either except piss them off and start some internal bleeding. I’m shocked at how ineffective handguns in general are.

nostr:npub1eg0cusp9uq92qrzk4fpy9k6ulhnu9vjzkh0vs7sswdk4czz084tsvazg6y is it true that you cannot audit someone for a tax year more than 7 years ago? Asking for a friend.

Last I knew, three years was the audit limit, but if fraud is discovered in those audits, the last ten years become available for audit as well.