Hacker Timesnew | past | comments | ask | show | jobs | submit | gsich's commentslogin

codec? x264 and 1080p is in the ~8GB range for a 120min movie. Depending on audio might be more.

https://www.sony.com/electronics/support/articles/00029663

VC-1, H.264 (MPEG-4 AVC)

Also, the studio paid a professional to peep at all the inter-frame pixels and turn the knobs right when they encoded the bluray. I might be able to get a perceptually lossless rip that's 25-50% smaller than the original, but it's just not worth my time.


but those are not rips

Middleboxes are not relevant in this scenario.

Uh, why not? Unless your SSH client is on the same network as theirs, there are going to be middleboxes somewhere in the path.

Because your ISP should (and most do not) alter traffic.

But you’re not considering the many business environments that do.

I don't because that would be impossible. Every business has different rules. But if you (as a business) want to to use this, you will find a way to make the changes to those "middleboxes". It's not your network, it's your business's network.

Large multi-national corporations, by way of their sheer size, tend to force their vendors to bend towards their needs, not to adapt to meet their vendors' unusual networking requirements.

Thankfully SSH on non-22 is not unusual.

Of all the SSH servers in the world, what percentage are listening on a port other than 22? To answer this question, you can visit https://data-status.shodan.io/ports.html and see for yourself.

By "unusual," I literally mean "not usual/not typical." Not "never happens."


I fail to see how this is relevant.

I'll explain it once again, then leave this thread:

Companies frequently put egress network policies in place that confine certain protocols like SSH and HTTP to certain ports. They do this in order to achieve compliance with regulations, to achieve security or operational certifications, or simply because they're paranoid. It's not necessarily the least restrictive means of accomplishing their goals, but that's what they do. And if they're big enough, they're going to use the size of the deal and their brand equity to persuade their vendors, who might ordinarily prefer to offer a service on a nonstandard port, to provide it on the customer's preferred port instead.

If you still don't understand, I'm sorry, but I cannot assist further.


Companies might do that. They have the right to do so. If they still want to use that service, they will find a way to use it. Be it by vendor-coercing or simpler methods.

Just because those companies exist, does not mean that their shitty practices have any imapct on real internet connections. If you as a paying ISP customer want to use a custom port or whatever, it is going to work. So you as a developer don't have any restriction (which you don't know anyway beforehand) if you are developing a solution for a problem.

"Middleboxes" is a hackernews meme that is thrown around because people here work at places who restrict stuff and they can't bother to change that situation but instead complain about it.

The fact that games exist and they use all kind of ports is proof that this is not a problem for normal networks.


What I really want is the Windows tool for that. Can't call it equivalent, because clunsy is way superior.

https://jagt.github.io/clumsy/index.html


People can solve a 4D Rubicks cube, so some parts are possible I guess.

The account is the same as you create in any acme client. I don't see potential for a reverse lookup.


I think the previous post is talking about a search that will find the sibling domain names that have obtained certificates with the same account ID. That is a strong indication that those domains are in the same certificate renewal pipeline, most likely on the same physical/virtual server.


Run ACME inside a Docker container, one instance (and credentials) for each domain name. Doesn't consume much resources. The real problem is IP addresses anyway, CT logs "thankfully" feed information to every bad actor in real time, which makes data mining trivially easy.


you dont even need a docker container to do that.


Agreed, that's just a personal preference thing of me. Harder to mess up and easier to route.


This is publicly publishing the account ID. There is an optional extension in RFC8659 that extends it but it isn't required by any implementer. This puts that ID into a public well known location that is easy to scrape and will be (this is exactly the kind of opsec info project like Maltego love to go lookup and pull in).


All of those alternatives don't have voice chat in the way discord has (or Teamspeak/Mumble).


Good bye. Discord is not trustworthy with this kind of data. As proven recently.


Depending on what you configured. It can also keep the mail on the server.


who would use this?


Very resource constrained systems, systems where consistent admin between *BSD and Linux is important. Containers where you have reasons to break the single process practice.


Your phone. Haven't looked into Android images for at least a decade but it was just simple bash scripts back then.


My phone does not run Devuan.


People who hate idiots that put the verb before the noun.


I have never seen this happen.

I have however experienced that a ISP will write to you because you have a faulty modem (some Huawei device) and asks you to not use it anymore.


Visit eBay and search for "blocked IMEI" or variants. There are plenty of used phones which are IMEI locked due to either: reported lost, reported stolen, failed to make payments, etc.


All offers seem to be from the US.


I the lines between IMEI banning or blacklisting and the modern unlocking techniques they use have been blurred a little bit and so some carriers and some manufacturers don't really want to do or spend time doing the IMEI stuff and would prefer to just handle it all via their own unlocking and locking mechanisms.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: