

This is an alt account, you may see it around. I am not ban-dodging intentionally, I promise!
This is the main
https://scribe.disroot.org/u/drkt
You’ve set up a bit of a word-trap because that ‘true’ can cover for either of your cases. I can’t know what you mean.
If it adds nothing, why does it matter? If it adds something, why do you care?
What are you actually upset about?
Provide them the art for free, on-demand, and they might stop doing it.
It is immature and if you go around showing it to girls expecting a date you’ll be disappointed.
Do it because it’s funny, not because you could use it as an ice-breaker (you can’t). If you really want to impress girls, doing it and not giving a fuck what your sister thinks is more likely the impress someone, girl or not- but it’s not an ice-breaker.
Change swappiness to 10 and ensure that you don’t have anything dynamically adjusting it.
I wouldn’t even know where to begin, but I also don’t think that what I’m doing is anything special. These NVR IPs are hurling abuse at the whole internet. Anyone listening will have seen them, and anyone paying attention would’ve seen the pattern.
The NVRs I get the most traffic from have been a known hacked IoT device for a decade and even has a github page explaining how to bypass their authentication and pull out arbitrary files like passwd.
I love the idea of abuseipdb and I even contributed to it briefly. Unfortunately, even as a contributor, I don’t get enough API resources to actually use it for my own purposes without having to pay. I think the problem is simply that if you created a good enough database of abusive IPs then you’d be overwhelmed in traffic trying to pull that data out.
I have plenty of spare bandwidth and babysitting-resources so my approach is largely to waste their time. If they poke my honeypot they get poked back and have to escape a tarpit specifically designed to waste their bandwidth above all. It costs me nothing because of my circumstances but I know it costs them because their connections are metered. I also know it works because they largely stop crawling my domains I employ this on. I am essentially making my domains appear hostile.
It does mean that my residential IP ends up on various blocklists but I’m just at a point in my life where I don’t give an unwiped asshole about it. I can’t access your site? I’m not going to your site, then. Fuck you. I’m not even gonna email you about the false-positive.
It is also fun to keep a log of which IPs have poked the honeypot have open ports, and to automate a process of siphoning information out of those ports. Finding a lot of hacked NVR’s recently I think are part of some IoT botnet to scrape the internet.
Nothing in life takes no effort. I’m only advocating on the basis that Windows has become more of an effort to stick with than Linux has become to learn.
… everything else in your workflow will work immediately with no research needed.
I’ll put it simply for you: You can spend a few hours figuring out a new workflow, or you can spend the rest of your life fighting a losing battle against a megacorporation that has it out for you that will also randomly upend on your workflow.
What is a ‘scene’ in this context?
I’ve found a few exposed /metrics
for kubernetes stuff because their IP poked my honeypot. I’d assume they’ve been hacked and turned into a botnet or something.
Maybe they should take their soldiers and get off our soil, then. Putting US bases on European soil isn’t a favor to Europeans, it’s a mutually assured defense. If they’re unhappy with the deal, they can leave.
Meshtastic
BOINC
Tor
I2P
Just off the top of my head. Meshtastic is probably the most similar to Helium but I don’t know what Helium is and their landing page makes me not want to. BOINC supports projects not in the official lists, just google around.
You can boil the logic down and apply it however you want. The fact is that different people have different levels of tolerance for bullshit and VPN users are a large source of it. TOR is also inherently harmless but exit nodes end up on banlists everywhere because malicious users use them to the point that exit nodes are pre-emptively banned in a lot of places because some people just don’t wanna deal with it. The big email providers have a zero-tolerance policy for the same reason; if your domain misbehaves even once then you’re on the shit-list forever because it’s not worth playing whack-a-mole with malicious actors.
Because shared VPNs are also used by malicious actors and some admins just don’t care about dealing with that.
Linux is truly extensible and it is the part I both love and struggle to explain the most.
I can sit at my desktop, developing code that physically resides on my server and interact with it from my laptop. This does not require any strange janky setup, it’s just SSH. It’s extensible.
Any file manager on Linux supports this
I just type sftp://[ip, domain or SSH alias]
into my file manager and browse it as a regular folder