Gifted Autistic Sysadmin, Anti-Corporate activist

I help people and build things that help people.

Check out our instance and our communities:

  • 199 Posts
  • 2.97K Comments
Joined 1 year ago
cake
Cake day: October 23rd, 2023

help-circle














  • hauiAtoAsklemmy@lemmy.mlHow to use peertube
    link
    fedilink
    arrow-up
    20
    ·
    12 days ago

    You will probably get the best answers from the peertube community so I suggest you crosspost your question there.

    That said, I host a peertube instance. It is the same as any other fediverse service but it is very young so dont expect it to be on par with mastodon and lemmy in terms of usability.

    As with all other services, you can make an account on an instance, seeing only what that instance allows you to, either by specifically allowing or disallowing other servers.

    So if you want the user experience, check joinpeertube.org for a rather well connected (and or maybe large) instance and join if you want to upload content. If not, you can just use your mastodon account to follow creators or comment on their videos.

    If you want freedom to do as you please, you need to get a server that is online (as in not in your home network or at least exposed but treat with caution). You can then install a peertube instance of your own, ideally with a custom domain. Then you can join the network and federate with who and whatever you like.

    In any case, framatube is a great company imo but their marketing just isnt that good. Peertube has so much potential and it could be further along by now.

    But dont get me wrong. It is still great and here to stay.

    Good luck.







  • I did quite some reading in my time, as I mentioned. The methods you are describing are riddled with ifs and buts. The reality is that even online systems arent hacked if they dont have obvious flaws like passwords in root ssh. on the other hand tools like john the ripper can break each and every common encryption given the right circumstances. Its no difference. Its all just marketing.


  • I‘m not that bad at rhetoric either but I avoid it when I can.

    Your argument is empty. Privilege escalation attacks are plain old cves that get found, evaluated and fixed. You need access to the phone, mostly in an unlocked state to get anything to work like that, same as with a computer.

    I know a couple of pen testers and I would definitely know if there were large differences between operating systems securitywise.



  • You do realize that this is bullshit, right?

    Its typical fearmongering (in fact the same article too) that I have been sent a ton of times by low tech users that fanboy for graphene.

    There is no such thing as „physical port attacks“. It also works very different on phones then on computers. You can for example use i2c on an iphone to crack it open which somewhat straightforward to do but still has zero implications for daily use. The linux apps are desktop apps and as such dont have any chance to get through all of the open source community‘s eyes undetected.

    Its a completely backwards take that assumes using bad faith software written in the dark by proprietary vendors which just isnt real.