lurkerlady [she/her]

  • 27 Posts
  • 107 Comments
Joined 3 years ago
cake
Cake day: March 28th, 2022

help-circle











  • I’m gonna get the worst ones out of the way:

    1. Anime

    2. scifi / isekai / adventure modern fantasy fighting thing

    3. Re:Zero / Steins;Gate / Fate/Grand Order. The plots are mostly just anime slop, Re:Zero at least has a more interesting setup and I genuinely enjoy watching the creepy protag die repeatedly in new ways. Trans rep in each of these is ‘trans woman everyone calls a boy but is weird weeb lust bait’. Later manga Ferris comes out as a woman which is handled much better than the other two animes.

    4. Bad, bad, bad. One upside: the character designs are so motivated and cute, smfh. How fucking dare they draw me in with the cute outfits. Characters in order: Ferris from Re:zero, Ruka from Steins;gate, Astolfo from Fate.


    Obvious better ones:

    1. Anime

    2. modern fantasy

    3. Zombieland Saga / My Hero Academia

    4. Good! Zombieland Saga has stfu-terf Lily Hoshikawa and My Hero Academia actually has a couple of trans characters, some are villains and some are heroes and its a little lowkey, you have to pay attention and listen to the small lines where they mention they’re trans. Lily’s story is heartbreaking, she died of fright after hitting puberty and seeing a single hair on her chin and all the girls in her zombie pop band are very accepting of her. As for MHA, the villains have very sad and brutal stories, so keep that in mind when watching for Magne, who was not able to transition due to stigma and being poor, yet is constantly gendered correctly and Twice even berates the shit out of someone for misgendering his ‘big sister’. Yawara Chatora was in an all female cat-hero group and transitioned to male.

    Lily from Zombieland:

    Magne:

    Yawara:


    Trans Vibes Honorable Mention:

    Your Name. This is honestly a tearjerker of a romance bodyswap movie and it feels trans as fuck and kinda gay as hell even though its technically straight. 10/10 one of the best anime movies I’ve ever watched.
















  • lurkerlady [she/her]@hexbear.nettomemes@hexbear.net___
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    1 month ago

    So like, unless youre really digging into wireshark or something over a long time, you really dont know what connections are encrypted or unencrypted coming from your OS. Thats more what I’m referring to. Certain OSes like whonix have safeguards for this, and linux in general is much better about this. Its hypothetically possible a malicious actor could hijack an operation that isnt encrypted coming from your OS to bork you.

    And yeah tor browser on its own without JS and high tracking prevention is the way to go if you dont want a big hassle dealing with your OS. I was more referring to TORing all of your computer traffic, which should only be done with specific OSes. Mullvad browser with vpn is fine for the vast majority of people and it doesnt reduce speed a lot like TOR does.


  • lurkerlady [she/her]@hexbear.nettomemes@hexbear.net___
    link
    fedilink
    English
    arrow-up
    24
    ·
    edit-2
    1 month ago

    Tor can be very dangerous if you don’t compartmentalize it enough and use the wrong software with it. Its pretty well documented that if you request a normal http page (not https) malicious tor nodes are constantly checking for it so they can attempt to serve you bad shit to steal info. You never really know when your computer on say, a windows machine, will make a bad request. So it becomes imperative to use operating systems and technologies that limit that issue. (Re: use tor only on the tor browser, or use qubes+whonix to compartmentalize potential bad requests).

    The most secure ‘every day’ thing someone can do is use almost any linux distro, mullvad browser (or a normal hardened firefox), and a trusted vpn (proton, mullvad, ivpn, out of these three mullvad is probably the best).

    the most secure thing possible (re dont do this its ridiculous for 99.9% of people) is probably a sneaky self-made wireguard vpn entry node + tor + qubes/whonix. and by sneaky wireguard vpn i mean doing stuff and things in order to not pay for an ISP with your vpn server. that means you have pivpn or something setup on a hidden raspberry pi on a network you probably dont have permission to run vpns on.


  • lmao the company running this, Hi Auto, is also an israeli firm

    from what i can tell they hook into google voice’s api and then hook the output into an llm to respond. the order is put into their system through RAG. this is like, script kiddie shit but they have a company of 50 people doing it (with 12 actual programmers). they also advertise 90% accuracy of the order which is fucking abysmal, any legit data scientist would be ashamed of such a low rate. it should be noted that accuracy is usually measured per token, so imagine it getting 10% of your syllables wrong in your order, which can end up with an order that is very wrong and could trigger the wrong RAG (ordering something you dont want). some of this is likely due to issues with audio quality from shit ass drive thru mics, loud motors, and bad noise cancelling. you can get a much higher accuracy spooling up a random local speech+llm model at home while picking your nose



  • Krolden is taking issue that they can see the vpn traffic at all, as in they can see that youre using a vpn (re: ISP knows who you are) and can sell that info to third parties who will now use your identity associated with that IP address (because ISP sold them info that the VPN connection came from you)

    theres ways around this of course and its actually somewhat easy to measure how big your fingerprint is. most sites of course wont have access to this paid info so reducing fingerprint is only useful to hide from google or cloudflare, and even then they wont know specifically what data you have, just what IPs you accessed. also since so many people use the same VPN it makes it very difficult to track you, you need to have a large fingerprint which can be mitigated by using linux (or with piracy, having a separate server that doesnt fuck with anything but torrents and so on)

    ISPs can also tell if youre using i2p or tor so ultimately its just a masturbatory argument, of course nothing is perfect, we all know that shrug-outta-hecks the only way to be truly secure is to steal internet from someone else without them knowing who you are, and you also need to be sure they dont have cameras and you have a sophisticated setup with qubes + vpn + (maybe) tor depending on what you want to do. this is of course an absurd amount of security for looking at pig poop memes on hexbear