shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

269
active users

#proxy

0 posts0 participants0 posts today
Steven Saus [he/him]<p>(28 Jun) Amazon Remote Disables Piracy Apps Sideloaded on Fire TV Devices </p><p>Always sold at highly competitive prices that almost anyone can afford, Amazon’s Fire TV Stick... </p><p><a href="https://s.faithcollapsing.com/hey5a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">s.faithcollapsing.com/hey5a</span><span class="invisible"></span></a> <br>Archive: ais: <a href="https://archive.md/wip/3RdMc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.md/wip/3RdMc</span><span class="invisible"></span></a> ia: <a href="https://s.faithcollapsing.com/8p9dt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">s.faithcollapsing.com/8p9dt</span><span class="invisible"></span></a> </p><p><a href="https://faithcollapsing.com/tags/amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amazon</span></a> <a href="https://faithcollapsing.com/tags/block" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>block</span></a> <a href="https://faithcollapsing.com/tags/fire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fire</span></a>-tv-stick <a href="https://faithcollapsing.com/tags/piracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>piracy</span></a> <a href="https://faithcollapsing.com/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> I am pretty shure <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBrowser</span></a> and any <a href="https://infosec.space/tags/App" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>App</span></a> that does <a href="https://infosec.space/tags/Proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxy</span></a> through <span class="h-card" translate="no"><a href="https://social.librem.one/@guardianproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>guardianproject</span></a></span> / <a href="https://infosec.space/tags/Orbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Orbot</span></a> for <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> access is not affected but I do encourage both <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> and Orbot devs to test against <a href="https://infosec.space/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a>!</p><p><a href="https://infosec.space/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.space/tags/LocalhostTracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LocalhostTracking</span></a> <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> <a href="https://infosec.space/tags/StasiBook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StasiBook</span></a> <a href="https://infosec.space/tags/Facebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Facebook</span></a> <a href="https://infosec.space/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a></p>
Third spruce tree on the left<p>Oh snap! `YARR - Yet Another RSS Reader` has a new version and I missed it in March!<br><a href="https://github.com/nkanaev/yarr/releases/tag/v2.5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/nkanaev/yarr/releas</span><span class="invisible">es/tag/v2.5</span></a><br>YARR is like Feedly or NewsBlur, except more like TinyRSS or FreshRSS - you can self-host. </p><p>UNLIKE those, you can tell yarr to run at `&lt;ip:port&gt;`, so you can stick it at port 7666 for your reverse <a href="https://mas.to/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a>. And its lightweight, I run my own AND 3 other instances for fam. members on the same host accessed via different subdomains re-proxied by <a href="https://mas.to/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a>. </p><p><a href="https://mas.to/tags/rss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rss</span></a> <a href="https://mas.to/tags/smolweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smolweb</span></a> <a href="https://mas.to/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>
indyradio<p><span class="h-card" translate="no"><a href="https://mementomori.social/@rolle" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rolle</span></a></span> This reminds about useful information <span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nixCraft</span></a></span> posted about setting up a <a href="https://kafeneio.social/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> for browsing.<br>In my opinion, things are getting so bad, that really is the only way to protect your computer in the current environment, without fighting a continuous battle.</p>
linkdrop<p>Proxy Last.FM APIs - ListenBrainz <a href="https://listenbrainz.org/lastfm-proxy/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">listenbrainz.org/lastfm-proxy/</span><span class="invisible"></span></a> <a href="https://troet.cafe/tags/MusicBrainz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MusicBrainz</span></a> <a href="https://troet.cafe/tags/last" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>last</span></a>.fm <a href="https://troet.cafe/tags/listen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>listen</span></a> <a href="https://troet.cafe/tags/music" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>music</span></a> <a href="https://troet.cafe/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a></p>
aaron ~# :blinkingcursor:<p>My homelab got it's final touches. I finally removed <a href="https://infosec.exchange/tags/Nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nextcloud</span></a> and switched completely to <a href="https://infosec.exchange/tags/Stalwart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stalwart</span></a>, i added automatic <a href="https://infosec.exchange/tags/database" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>database</span></a> backups using <a href="https://infosec.exchange/tags/cronjobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cronjobs</span></a> for all my <a href="https://infosec.exchange/tags/databases" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databases</span></a>, i've set up most of my publicly exposed services to run behind the <a href="https://infosec.exchange/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a> <a href="https://infosec.exchange/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a>, improved the directory structure for my <a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>containers</span></a>, and finally set up pihole as the <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> server on my router. This feels so good.</p><p><a href="https://infosec.exchange/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://infosec.exchange/tags/homeserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homeserver</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Louis<p>Cloudflare or not Cloudflare? I have to confess I've been using it for a while, and while I do enjoy its multiple benefits (proxy, WAF, DNS management, security rules, automatic email obfuscation...), I dont like the idea of transmitting all the data through a 3rd party, especially based in the USA.</p><p>Mastodon tech people, I summon you!</p><p>What are your thoughts?<br>Do you use Cloudflare?<br>Or is it a non negociable no to you?<br>Have you tried European based solutions like Bunny.net?<br>Do you just live without such tools?</p><p>I'm interested in hearing your thoughts!<br>Boosts appreciated :boost_request:</p><p><a href="https://piaille.fr/tags/cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudflare</span></a> <a href="https://piaille.fr/tags/dataprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprivacy</span></a> <a href="https://piaille.fr/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> <a href="https://piaille.fr/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://piaille.fr/tags/bunnyCDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bunnyCDN</span></a></p>
IT News<p>Wayback Proxy Lets Your Browser Party Like It’s 1999 - This project is a few years old, but it might be appropriate to cover it late sinc... - <a href="https://hackaday.com/2025/05/26/wayback-proxy-lets-your-browser-party-like-its-1999/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/05/26/waybac</span><span class="invisible">k-proxy-lets-your-browser-party-like-its-1999/</span></a> <a href="https://schleuss.online/tags/internetarchive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetarchive</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/internethacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internethacks</span></a> <a href="https://schleuss.online/tags/earlyinternet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>earlyinternet</span></a> <a href="https://schleuss.online/tags/rasberrypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rasberrypi</span></a> <a href="https://schleuss.online/tags/geocities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geocities</span></a> <a href="https://schleuss.online/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> <a href="https://schleuss.online/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@shoppingtonz" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>shoppingtonz</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@alternativeto" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alternativeto</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> granted, those cases are <em>"nieche"</em> as in <em>"extreme low latency applications"</em> are out.of scope for <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> as they are intrinsically incompatible with a self-routing <a href="https://infosec.space/tags/Proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxy</span></a> network.</p><ul><li>Also proper <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> &amp; <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> teaches to never mingle identities and activities...</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nixCraft</span></a></span> actually this screams <em>"<a href="https://infosec.space/tags/GDPR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GDPR</span></a> &amp; <a href="https://infosec.space/tags/BDSG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BDSG</span></a> violation"</em> so loudly that even demanding <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PII</span></a> and espechally an <a href="https://infosec.space/tags/ID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ID</span></a> should get them sued by <span class="h-card" translate="no"><a href="https://mastodon.social/@noybeu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>noybeu</span></a></span> and <span class="h-card" translate="no"><a href="https://verbraucherzentrale.social/@Bundesverband" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Bundesverband</span></a></span> ....</p><ul><li>Cuz <em>"<a href="https://infosec.space/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a>"</em> has neither <em>"legitimate interest"</em> nor a mandate to even demand to <em>see</em> an ID, much less to store and process it!</li></ul><p>This isn't like a contractual agreement or some finance where one could argue <em>"<a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KYC</span></a>"</em> is warranted <em>"to combat <a href="https://infosec.space/tags/fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraud</span></a>"</em>... </p><ul><li>The only thing worse I've seen is some obscure company that brokers <a href="https://infosec.space/tags/bandwith" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bandwith</span></a> with a hidden <a href="https://infosec.space/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a> feature in <a href="https://infosec.space/tags/apps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apps</span></a>...</li></ul>
Third spruce tree on the left<p>did a thing! </p><p>Big problem in <a href="https://mas.to/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> is making sure you've set things up right: <a href="https://mas.to/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> resolution, <a href="https://mas.to/tags/ports" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ports</span></a>, rev/ <a href="https://mas.to/tags/proxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxy</span></a>. _Sometimes_ its helpful to query _from the outside_ of your local network.</p><p>`canuseeme` - a single binary <a href="https://mas.to/tags/webservice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webservice</span></a> that will query the URI you give it and see if its reachable by randos/services on the internet. A bit like a <a href="https://mas.to/tags/webproxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webproxy</span></a>, but can exercise it programmatically, and not limited to HTTP/S ports. </p><p><a href="https://github.com/tezoatlipoca/canuseeme" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/tezoatlipoca/canuse</span><span class="invisible">eme</span></a></p><p><a href="https://mas.to/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a></p>
Continued thread

@torproject same with #obfs4 bridges: there is no option to say like ports=80,443 or similar, which makes it cumbersome to get said bridges.

And trying to get places to #DontBlockTor that criminalize the use of #Tor is foolish at best.

Replied in thread

@tauon Also what goid is an encryption like @signalapp is you don't have #SelfCustody of all the keys?

  • Shure you could disable encryption but @monocles shows you when it's active and when not and comes with sensible defaults like having #OMEMO active per default...

I can setup over a dozen #TechIlliterates 1:1 with #XMPP accounts and #monoclesChat & @gajim / #gajim in the time it takes me to get a #nonKYC #eSIM from overseas with a phone number as mandated by @signalapp and maintaining that number for #Signal will easily cost like $2,50 p.m. at minimum.

  • Whereas a Data-only eSIM is way faster and cheaper to get and maintain.

In fact even legitimately acquiring and registering a #Prepaid #SIM in-store in #Germany takes longer than setting up #Fdroid & monocles chat & a XMPP account whilst on throttled #EDGEland speeds...

possum.city/notes/a3rt4nzbn11z

Possum City🌸 lily 🏳️‍⚧️ :flag_pansexual: :flag_ace: θΔ ⋐ & ∞ (@tauon)@kkarhan@infosec.space > centralised tbh i agree, i don't like that signal is centralised, but that isn't insecure, it's just an anti-feature > proprietary no it isn't, every element of signal is open source > subject to cloud act what is that? are you talking about subpoenaing of information? they legally have to do that anyway, and can't give anything except for the account creation date and the date that the account was last accessed > collects pii like phone numbers i'm pretty sure they don't signal is more secure than anything you've mentioned because on signal, encryption is not optional. any service where encryption is optional is not secure. RE: @tauon@possum.city no, it is not because it is a #Centralized, #proprietary, #SingleVendor & #SingleProvider solution subject to #CloudAct that collects #PII like #PhoneNumbers, which makes it inherently less secure, as they are able and willing to restrict access as they please. RE: ...
Replied in thread

@bagder Problem with that is (besides occasional bugfixes), most people including myself would see #curl to be functionally complete and anything "nice to have" would be considered not worth the balooning in #complexity and #size.

  • I mean, does curl need to be able to do #BitTorrent (magnet:), #IPFS (ipfs://) or god forbid #blockchain (i.e. #EVM) support?

  • Do you really want to integrate @torproject / #Tor support natively into curl when using #HTTP (localhost:8118) and #SOCKS5 (localhost:9050) #proxy allows for the same and doesn't necessitate having to handle and ingest Tor arguments as well??

In fact if #toybox didn't have a #wget implementation that I could use for OS/1337 I would've merely chosen tiny-curl -o as a global alias or if #tinycurl wasn't an option, curl -o instead.

  • Maybe someone who wants to have said functionality like tor support built-in will go and IDK make i.e. #neocurl or sth. along those lines or build something like #ethcurl or #torcurlor #ipfscurl or whatever...

That being said I am glad curl isn't solely maintained by you but has other contributors (give them a shoutout!) but I also am glad you maintain that vital software that most "#TechIlliterate #Normies" most likely never heard of but propably use on a daily basis as part of all the #tech they use to #consume media with...

  • I consider curl to be "the #vim of downloaders" (tho that's kinda insulting and limiting since curl is more than just a downloader and more intuitive than vim) with wget being "the #vi of downloaders" (tho wget is even simpler to use than vi)...

Either way, curl is awesome...

curl.securl

#WhatsMissing:

A modern competitor to #OperaMini with:

Why?

OFC since #Opera #Mini needs a trustworthy proxy backend any "#clone" would need an #OpenSource'd & #SelfHosting-capable #backend (similar to @ActionRetro 's #FrogFind .com as it breaks #E2EE.

Needless to say it would be a godsent for anyone stuck on #EDGEland and slower speeds (i.e. #SATCOM like #Iridium)...

  • Sadly building a #browser is thousandsfold harder than building a Linux #distro...
en.wikipedia.orgOpera Mini - Wikipedia