• 0 Posts
  • 19 Comments
Joined 23 days ago
cake
Cake day: June 5th, 2025

help-circle


  • This is the argument that bothers me:

    The court also identified a third argument, which the authors didn’t pursue in great detail; market dilution. Under this theory, AI models trained on copyrighted works can generate “countless works that compete with the originals, even if those works aren’t themselves infringing,” Judge Chhabria wrote.

    So, even if what you make isn’t infringing on their rights, its still competing with them which should be forbidden. That whole argument is a machine shouldn’t be allowed to compete with a human. So, if I am inspired by another’s work, that’s ok, but if a machine does that we need to ban it.






  • Yeah, if the student devices are locked down its done so per policy. Creating VMs which allow students to bypass that policy is going to potentially get you into trouble with administration. IT could maybe setup those students with Citrix Workspaces or something similar they support to achieve that without having to throw student restrictions out the window.


  • So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.

    To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone’s house. We’d also build cantennas from junk laying around. Those were interesting days.





  • Tailscale has the funnel command which exposes services like how you describe, but that’s off the table.

    Not quite sure I understand your layout, but if these are separate VPNs, you could run one from the server with a port forward (guessing that’s not through Mullvad as they don’t offer forwards any longer - to my knowledge) and then setup the general VPN on your router perhaps so you don’t have to change ip routes for the whole network. You would still probably need to setup an ip route specific to the server VPN traffic on the router at that point, but that would probably be less work.

    If this all being done from the same device then you would need to separate them out by IP routes.




  • Headscale is great if you like networking fun, but that aside I’m not understanding why VC funding is such a black mark to the poster. Tailscale doesn’t generate meaningful revenue streams as its early-stage, so it has to secure funding to continue operations until they achieve high enough revenue to go public. That’s pretty standard in a business life-cycle, though. It seems like the main complaint is that Tailscale is a business. And what about the Linux Foundation? They are funded through private equity. Should you consider switching away because of that?