Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

15
Fact
posted 4 years ago by Harambe 4 years ago by Harambe +15 / -0
27 comments share
27 comments share save hide report block hide replies
Comments (27)
sorted by:
▲ 9 ▼
– lolcowlvr 9 points 4 years ago +10 / -1

Or you could just stop using that dog shit service and use one of the many alternative streaming sites that are free and dont cuck you.

permalink save report block reply
▲ 8 ▼
– N0rds 8 points 4 years ago +8 / -0

Or... pirate.

permalink parent save report block reply
▲ 2 ▼
– PublicWifi 2 points 4 years ago +2 / -0

Arrrrrrr!!

permalink parent save report block reply
▲ 1 ▼
– deleted 1 point 4 years ago +1 / -0
▲ 0 ▼
– lolcowlvr 0 points 4 years ago +1 / -1

The site I am referencing is doing exactly that and making them available for sharing. Its napster only you have the "watch it now" ability as a bonus.

permalink parent save report block reply
▲ 3 ▼
– heybuddythatstyranny 3 points 4 years ago +3 / -0

I think you still have it wrong chief. You need to self host, bottom line. We got here because of dependency on shitty companies.

permalink parent save report block reply
▲ 0 ▼
– lolcowlvr 0 points 4 years ago +1 / -1

I use a site run by one guy who I can message anytime of the day and get help if there is an issue. It offers the ability to DL everything too so if I did want to "start my own" this site would facilitate it.

permalink parent save report block reply
▲ 0 ▼
– heybuddythatstyranny 0 points 4 years ago +1 / -1

You still have a single point of failure there. Dependency is the enemy.

permalink parent save report block reply
▲ 0 ▼
– lolcowlvr 0 points 4 years ago +1 / -1

As though it may have sounded like this was the only source I use, it is not. I do use multiple sources but was using it as an example.

permalink parent save report block reply
▲ 3 ▼
– ridethewolf 3 points 4 years ago +3 / -0

Why would you want to give Cuckflix money?

permalink save report block reply
▲ 1 ▼
– deleted 1 point 4 years ago +1 / -0
▲ 2 ▼
– deleted 2 points 4 years ago +2 / -0
▲ 2 ▼
– deleted 2 points 4 years ago +2 / -0
▲ 1 ▼
– PublicWifi 1 point 4 years ago +1 / -0

The same goes for every centralized platform or service.

permalink save report block reply
▲ 1 ▼
– SuicideTruthbomber 1 point 4 years ago +1 / -0

This is new to me. I could only find one source claiming to explain what a "VPN fingerprint" is and the definition made little sense (and the site looked dodgy).

permalink save report block reply
▲ 1 ▼
– the-new-style 1 point 4 years ago +1 / -0

https://www.amiunique.org/

me: Yes! You are unique among the 4103911 fingerprints in our entire dataset.

and that's just my regular Web Browser

permalink parent save report block reply
▲ 1 ▼
– SuicideTruthbomber 1 point 4 years ago +1 / -0

Thanks for this, but what this website refers to a browser fingerprint. I'm curious about this "VPN fingerprint."

permalink parent save report block reply
▲ 1 ▼
– the-new-style 1 point 4 years ago +1 / -0

Here's an example

OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics

https://sci-hub.st/10.1007/978-3-642-35795-4_56

permalink parent save report block reply
▲ 1 ▼
– SuicideTruthbomber 1 point 4 years ago +1 / -0

Interesting, but this is a proposed means to identify if encrypted traffic is an OpenVPN tunnel. This can't be what the poster was talking about.

I think it is supposed to mean the pool of IP addresses used by a particular VPN company.

permalink parent save report block reply
▲ 1 ▼
– the-new-style 1 point 4 years ago +1 / -0

We should also remember that OP is imagining.

permalink parent save report block reply
▲ 1 ▼
– Geek-the-Mage 1 point 4 years ago +1 / -0

Interesting. I wonder if there is a way to randomize the pieces of info they are able to collect from the browser.

permalink parent save report block reply
▲ 2 ▼
– SuicideTruthbomber 2 points 4 years ago +2 / -0

Tor Browser tries to make the browser fingerprints identical for their users.

https://www.torproject.org/download/

permalink parent save report block reply
▲ 1 ▼
– Geek-the-Mage 1 point 4 years ago +1 / -0

I tried a tor privacy browser in the past and it was bad news. I ended up taking the blame for some of the illegal traffic in the peer-to-peer network from my ISP. I may not have been protecting myself with a VPN though.

permalink parent save report block reply
▲ 1 ▼
– SuicideTruthbomber 1 point 4 years ago +1 / -0

That is not how Tor works. I don't know what you were doing, but quite a lot of disinformation about Tor is along those lines.

permalink parent save report block reply
▲ 2 ▼
– the-new-style 2 points 4 years ago +2 / -0

You can get Add-Ons to change your outgoing headers - User-Agent and the like.

At DEF CON 25 in 2017 - Svea Eckert demonstrated how to de-anonymise tracking data collected by ad agencies using the URLs of the pages someone visits in a month.

For instance I would expect no-one visits

https://communities.win/u/Geek-the-Mage/

more than you do, and then what about your Linked-In profile, your Google account, or whatever online accounts you have - they very often have unique identifiers in the URL.

Svea was able to piece together a German politician's profile together and went and showed her the online searches included in the dataset

https://www.youtube.com/watch?v=1nvYGi7-Lxo

permalink parent save report block reply
▲ 1 ▼
– deleted 1 point 4 years ago +1 / -0
▲ 1 ▼
– SuicideTruthbomber 1 point 4 years ago +1 / -0

Your MAC address gets stripped away before your data is sent to another network, and you can change the MAC address you use to whatever you want.

permalink parent save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No excessive, unnecessary and/or bullying "meta" posts.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
Message the Moderators

Terms of Service | Privacy Policy

2025.03.01 - qpl2q (status)

Copyright © 2024.

Terms of Service | Privacy Policy