• 0 Posts
  • 67 Comments
Joined 1 year ago
cake
Cake day: June 5th, 2025

help-circle




  • The problem with religious texts is they are so badly written that essentially anything you want to do is permissible. Look at a comment you made:

    The basics argument is taking anything from anyone without their consent is morally wrong and haram.

    Who did take from? You couldn’t have taken a game from a developer/publisher if its pirated. You took it from a bittorrent seeder. Did they provide consent? Yes, they were seeding it to you.

    If I tell you a joke that I heard from someone who heard it from someone, etc. did I steal the joke? At what iteration of copying something does it stop being theft? Is it theft to begin with to make a copy?



    1. If X was not available to pirate, would you pay for it?
    2. If you would not have paid for X, does pirating X cause any actual loss to its owner? If you would not have paid for it either way (even if that were the only option) and you haven’t caused them a loss of revenue by pirating it, did you impact the creator at all?

    The counter to this is always that just because someone wouldn’t pay doesn’t mean the creator’s work has no value. To that I would yes that is completely true. The creator’s work has value, but maybe not monetary value. You can’t always conflate value to money (ex. FOSS, canonical sci-fi lore, protest symbols, etc).

    There is also a morality component used against my argument that would say I’m ignoring the intent, consent, and ownership the creator has. Its usually worded that I’m using outcome-based morality and that the ends always justifies the means by that logic. But I pay for X, not for access to use X. If the creator can opt without my consent to remove X from me, I’m not longer obligated to follow that moral constraint. Morality is a two-way street.






  • I don’t trust them, but based on some assumptions. They are statically less likely to be taken down. That cannot be argued, but because of strictly enforced rules, most (at least the ones I’ve seen) do not allow VPN IP addresses to be registered. The issue there is the user has a forced increase in reliance on the site operator to maintain pseudo-anonymity.

    The fact you were able to buy in without any proof of who you are or that I’ve encountered people just giving away invites to strangers, would suggest at least some of these trackers are not trustworthy. What protects those communities is their insular nature. Once that’s circumvented, its essentially just the same as a public tracker.



  • Unrelated, but absence of evidence is not evidence of absence.

    So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence.

    Removing an identifier that is used. (1/100 = matters, “isn’t really used” != unused). This contradicts your other statements:

    Just because an identifier exists doesn’t mean it is used. BidRequest.imp[i].tagid exists, but advertisers don’t use it. I think you are confusing having an option with something being mandatory.

    And Tor nodes are not the same thing as VPN multi-hop. If you think that they are, wow! VPN multi-hop is you connecting to a provider’s server that connects to another one of the provider’s server then out. It’s all the provider’s network.

    And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?

    EDIT: I just realized you think that Tor is built using multi-hop VPN. Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.