World News
A community for discussing events around the World
Rules:
-
Rule 1: posts have the following requirements:
- Post news articles only
- Video links are NOT articles and will be removed.
- Title must match the article headline
- Not United States Internal News
- Recent (Past 30 Days)
- Screenshots/links to other social media sites (Twitter/X/Facebook/Youtube/reddit, etc.) are explicitly forbidden, as are link shorteners.
-
Rule 2: Do not copy the entire article into your post. The key points in 1-2 paragraphs is allowed (even encouraged!), but large segments of articles posted in the body will result in the post being removed. If you have to stop and think "Is this fair use?", it probably isn't. Archive links, especially the ones created on link submission, are absolutely allowed but those that avoid paywalls are not.
-
Rule 3: Opinions articles, or Articles based on misinformation/propaganda may be removed. Sources that have a Low or Very Low factual reporting rating or MBFC Credibility Rating may be removed.
-
Rule 4: Posts or comments that are homophobic, transphobic, racist, sexist, anti-religious, or ableist will be removed. “Ironic” prejudice is just prejudiced.
-
Posts and comments must abide by the lemmy.world terms of service UPDATED AS OF 10/19
-
Rule 5: Keep it civil. It's OK to say the subject of an article is behaving like a (pejorative, pejorative). It's NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
-
Rule 6: Memes, spam, other low effort posting, reposts, misinformation, advocating violence, off-topic, trolling, offensive, regarding the moderators or meta in content may be removed at any time.
-
Rule 7: We didn't USED to need a rule about how many posts one could make in a day, then someone posted NINETEEN articles in a single day. Not comments, FULL ARTICLES. If you're posting more than say, 10 or so, consider going outside and touching grass. We reserve the right to limit over-posting so a single user does not dominate the front page.
We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.
All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.
Lemmy World Partners
News !news@lemmy.world
Politics !politics@lemmy.world
World Politics !globalpolitics@lemmy.world
Recommendations
For Firefox users, there is media bias / propaganda / fact check plugin.
https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/
- Consider including the article’s mediabiasfactcheck.com/ link
view the rest of the comments
Remember VPNs definitely don’t help here, definitely don’t try to skirt any protections using a VPN, definitely remember to have your ID with you at the ready for any website to show to.
If you could project into the future, you might see that VPNs are a dwindling non-solution to the problem. As this unsettling trend makes waves across all jurisdictions in the world, every VPN's IP will be subject to these new controls.* Eventually normies might need to understand technologies like Tor or I2P. Only problem is, if things get really bad they might ban the use of both outright. I'm not sure if I2P can be detected just as Tor, but I do know Tor users can be detected easily. Which is why if you're in a "censorship" country you need to use some sort of special subset of entry guards. I2P might be better because every node in the network is like a router, none are specifically entry, middle, or exit nodes. Only thing I could think of, maybe some form of deep packet inspection? If everybody runs an I2P router, then simply making requests to other nodes is not enough to determine it's an i2p communication?* It's just distributed computing, the way the internet was intended!
Any other useful info like this? Tryna snag as much of this stuff as possible (taking screenshots and offline copies of the pages) in the event it becomes unavailable and my existing methods fail on me.
You can simply go to the official tor or i2p pages and read more about details, then do follow up research from there. With i2p there's actually a few parallel implementations actively being developed. Original is in Java, there's a C++ one, and then another one I can't remember. Very new implementations are being made in Rust as well
You’ve convinced me to create an i2p router
I found this to get me started: https://www.reddit.com/r/i2p/comments/zp9p94/setting_up_an_i2p_router_on_a_raspberry_pi/
Thanks for volunteering to help the network in good faith! I think it is much easier for normal people to get an i2p router up and running and help the entire network, instead of setting up a tor node. And with the use of inbound/outbound unidirectional tunnels (which you can set up to 5 nodes each), you could theoretically have a 10 node round trip of intermediate tunnels between you and a server, as opposed to tor which uses a bidirectional tunnel.
Some gracious users set up what is known as an "outbound proxy", which acts like tor exit node to the clearnet. Personally I would never host one of these, as I am hesitant of having anonymous entities make clearnet requests and being held liable. But as an i2p router in somebody else's tunnels, you can just imagine yourself as a road on a map that other roads connect to. The road isn't responsible for what people are carrying on it, or what their destination might be. That would be an unreasonable expectation to place on any road. In fact, the router doesn't have any idea of what the exact destination is, even if it's the last node in the tunnel - simply because during the encryption/decryption process it only knows of the next address to hit!
For example, say an i2p router hosts a git server. It could be the destination for packets, where clients are using it for version control, or it could act as a node in somebody's tunnels to connect with other servers/clients. From the network view, I do not believe you can tell, and that is pretty neat.
In the effort of being transparent and educating you, I do believe an outstanding problem is stream isolation. You should be able to do "soft resets" that reset your identity, although I forget the exact technical i2p term for this. This concern is for clients, not just leaving a router up. So if you intend on using that router to access the network yourself, it would be a good idea to do that soft or hard reset occasionally depending on your concerns. You can do it as often or never at all.
It's a good thing there are no scammers that could try stealing IDs pretending to verify you 😌