• 3 Posts
  • 28 Comments
Joined 9 months ago
cake
Cake day: June 24th, 2025

help-circle




  • RommieDroidtoLinux MemesThe Penguin Calls
    link
    fedilink
    arrow-up
    1
    ·
    9 months ago

    This is my pet peeve. This is one application that should be paid for. It hugely lacks features. Non-destructive editing with gradients, adjustments, masks. Better selection tools, CMYK would be nice. But that’s not the worst part, it doesn’t have the entirety of Adobe Illustrator, which you can work between. Affinity has the Designer equivalent, which I use a lot.


  • RommieDroidtoTechnology*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    9 months ago

    I can assure you they’re doing more than that. If you see the recapture or cloudflare verification box, you have been cross-site fingerprinted. So if you turn a VPN on and you’re using the same OS and browser, they know who you are.








  • RommieDroidtoLinux MemesThe Penguin Calls
    link
    fedilink
    arrow-up
    5
    ·
    9 months ago

    Why don’t we have an open source anti-cheat protocol that is a demon-level service. Everyone hates kernel anti-cheat, but only because they’re close source, so why don’t we have one that’s open source. Seems like a simple solution.


  • RommieDroidtoLinux MemesThe Penguin Calls
    link
    fedilink
    arrow-up
    3
    ·
    9 months ago

    I still use VirtualBox with Windows 10 to launch all the Affinity products because GIMP is so bad. And for browser fingerprint protection, e.g. chrome (ungoogled) on windows, because no browser fakes it. Not mullvad, Tor or Brave.



  • Oof 😅 0.59 nanoseconds. I dang messed up. This would be a good project for students to identify the weaknesses. Like the Theprimeagen says the problem with the tutorials is they’re neatly packaged, refined end products and you miss out on all the learning and debugging. You sound like you know what you’re talking about and the 1-byte block size is a huge mistake. I think I’ll do some more research into the different algorithms. Thanks for having a look, and weighing in.



  • Hey, thanks for the thoughtful breakdown. I probably should label it: warning random IT grad project. I mistakenly believed I could make something that was good, well it’s a lot more difficult. You’re right that this doesn’t provide the kind of plausible deniability I initially hoped for, the decoys were just a workaround, because I couldn’t find the type of algorithm I wanted.

    The query parameters are masked with HTTPS so you’re not revealing any extra data, it would just look like any other redirect if you were packet sniffing. And when visiting the destination links, your normal OPSEC still applies, like changing your DNS, using a VPN, etc. I was just seeing if this project would find some sort of use, but I only spend two days on it and it was a fun learning experience.