GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Fijxu (fijxu@noc.social)'s status on Tuesday, 10-Dec-2024 07:16:06 JST Fijxu Fijxu

    Ok, Youtube killed a tool that is essential to watch videos on Invidious (inv_sig_helper). Because of this my server literally exploded because invidious tried to reconnect to that tool which is not able to start at all *due to youtube changes*. There is nothing I can do (for now). I will try to find a way to fix it tho, but since that tool is written on Rust, I'm 100% clueless on how to fix it, and for sure, the fix is not an easy task. So yeah, Invidious is dead until a new update.

    In conversation about 6 months ago from noc.social permalink

    Attachments


    1. https://noc.social/system/media_attachments/files/113/624/363/160/253/129/original/18f3e5278101f0cf.png
    • 10π🍇 likes this.
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Thursday, 27-Mar-2025 09:46:24 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      sure, throw more computing at the bots who are already wasteful at that, and exclude people like me who won't run software from strangers 😞

      google used to block me by demanding to run javascript on my browser; now invidious instances fail in just the same way 😞

      it was cool while it lasted, and thanks invidious for that, but now I can't even search for stuff to watch with mpv/ytdlp any more.

      yet another brick on the WWWorst App Store Wall
      https://www.gnu.org/philosophy/wwworst-app-store.html

      CC: @fijxu@noc.social
      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.gnu.org
        The WWWorst App Store - GNU Project - Free Software Foundation
        from mailto:webmasters@gnu.org
      翠星石 likes this.
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Thursday, 27-Mar-2025 09:46:25 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to

      @fijxu Thank you so much for using a proof-of-work #captcha https://nadeko.net/announcements/invidious-and-the-bot-problem/ instead of centralised proprietary mass #surveillance aka Google/CloudFlare!

      You're a hero.

      #Invidious #Anubis

      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: nadeko.net
        nadeko.net
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Thursday, 27-Mar-2025 13:23:01 JST 翠星石 翠星石
      in reply to
      • Nemo_bis 🌈
      • Alexandre Oliva
      @lxo @nemobis @fijxu It's not a matter of running software from strangers.

      It's a matter of having to run software without being able to even check it - browsers are designed to execute JavaScript without giving you the opportunity to check it first.
      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Thursday, 27-Mar-2025 13:41:41 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • 翠星石
      • Nemo_bis 🌈
      thanks to librejs and noscript, I could check it first. but it would still be running under someone else's control, so it's hardly distinguishable from any nonfree software. even if it's nominally free software, it's not free for me in that setting. it's like tivoized software.

      the key point is that it's coming from, and is thus under control of, someone else's (strangers') servers, rather than from my own.

      if it were running under control of my server, then it would be under my control, i.e., it would be free for me.

      running under control of someone else's server, it may be free for the server operator, but not for me, so it's not welcome to my computers

      CC: @nemobis@mamot.fr @fijxu@noc.social
      In conversation about 2 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Thursday, 27-Mar-2025 13:56:35 JST 翠星石 翠星石
      in reply to
      • Nemo_bis 🌈
      • Alexandre Oliva
      @lxo @nemobis @fijxu >thanks to librejs and noscript, I could check it first.
      Unfortunately, even with those you could not check it first due to the way the JavaScript engine is designed.

      There is no guarantee that the extensions will run before the JavaScript start running and JavaScript structures that will bypass then keep being found.

      The only way to be safe against site JavaScript in firefox is to go to about:config and set javascript.enabled=false.

      >but it would still be running under someone else's control
      Browsers could give you the opportunity to check all JavaScript before it is executed, save a version you prefer and use only that version, or run a different program with that website instead if you want, but such functionality has not been implemented and has been made needlessly difficult to implement intentionally.
      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Thursday, 27-Mar-2025 14:08:47 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • 翠星石
      • Nemo_bis 🌈
      yes, browser support for user-chosen replacements would be ideal

      I hope the concern about javascript potentially running before noscript and librejs kick in is merely theoretical. do you have any evidence you could share that it actually hits in practice?

      CC: @nemobis@mamot.fr @fijxu@noc.social
      In conversation about 2 months ago permalink
    • Embed this notice
      翠星石 (suiseiseki@freesoftwareextremist.com)'s status on Thursday, 27-Mar-2025 14:42:31 JST 翠星石 翠星石
      in reply to
      • Nemo_bis 🌈
      • Alexandre Oliva
      @lxo @nemobis @fijxu It certainly wasn't theoretical previously; https://tails.net/news/javascript_sometimes_enabled_in_safest/index.en.html

      https://blog.torproject.org/new-release-tor-browser-907/
      >Open about:config
      Search for: javascript.enabled
      The "Value" column should show "false"
      Either: right-click and select "Toggle" such that it is now disabled or double-click on the row and it will be disabled.

      We are taking this precaution until we are confident recent NoScript versions successfully block Javascript execution, by default, by working around a Firefox ESR vulnerability.

      Although with version 100 it seems they were confident enough that NoScript seems to block JavaScript execution; https://blog.torproject.org/new-release-tor-browser-100/


      Against remote scripts, I am reasonably confident that NoScript is adequate, as they don't seem to ever be downloaded unless you manually do so, but I'm not sure about specifically crafted JavaScript in <script></script> tags - it wouldn't surprise me if more ways were found that allow malicious JavaScript execution in script tags with javascript.enabled=true.


      Someone has mentioned that they found LibreJS executed unlicensed JavaScript encoded via a certain method, but didn't mention further details (it seems they were telling the truth).


      To have proper security guarantees with this sort of thing, you would need firefox with the JavaScript engine completely disabled (too bad extensions and a bunch of other things rely on that and you can only really get such sort of thing in netsurf).
      In conversation about 2 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: tails.net
        Tails - JavaScript sometimes enabled in the Safest security level of Tor Browser
      2. Domain not in remote thumbnail source whitelist: blog.torproject.org
        New Release: Tor Browser 9.0.7 | Tor Project
        Tor Browser 9.0.7 is now available from the Tor Browser download page and also from our...
      3. Domain not in remote thumbnail source whitelist: blog.torproject.org
        New Release: Tor Browser 10 | Tor Project
        Tor Browser 10.0 for Desktop is now available from the Tor Browser download page and also from our distribution directory.
      Alexandre Oliva likes this.
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Thursday, 27-Mar-2025 15:47:51 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      yeah, mpv/yt-dlp work for me

      presumably tagging the javascript as free software, as recognized by LibreJS, would make it work for those who only use LibreJS for javascript blocking.

      but really, this entire approach is backwards. I mean, I know scraping bots are making server operators miserable, but the solution to that can't be to make everyone else miserable, slowing things down, wasting computing resources and rendering old computers unusable.

      the premise that blocking bots is questionable. sure, it makes things more costly for the evil scrapers, but also to everyone else, and guess who has more computing resources to waste? surely not the people who are on old computers who are now being rendered artificially obsolete because of a misguided reaction to scrapers. surely not to people who are trying to automate things on the client side to make up for the asymmetry between servers, that are automated, and clients, that are denied the convenience of automation by stupid captchas that increase the asymmetry and thus the injustice.
      In conversation about 2 months ago permalink
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Thursday, 27-Mar-2025 15:47:53 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo Yes it's unfortunate, but I mostly use it to share links. Does mpv/yt-dlp <URL> work for you?

      Is there a way to make mCaptcha work with LibreJS?

      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Thursday, 27-Mar-2025 16:29:41 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      playing the video is supposed to be useful to the user, whereas the proof of work is one of the issues that has given cryptocurrencies a poor rep, and for good reason. why are we even considering that, and, of all reasons, to implement DRM on web sites?!? (yes, it is DRM, an attempt to keep some users from doing things they otherwise could, through technological means)

      there has to be a better way to tell welcome users from unwanted ones than miseducating users into blindly running programs that web sites push onto their computers, and fighting wasted computing power with wasted computing power by making the overhead permanent and pushing it onto everyone
      In conversation about 2 months ago permalink
      翠星石 likes this.
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Thursday, 27-Mar-2025 16:29:43 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo It is sad, but we have had captchas forever. The skills to solve captchas are unevenly distributed. A PoW captcha only asks you to spend some electricity, which is a commodity more evenly distributed (among those who already have a browser and are using it for compute-intensive purposes like video). I have not measured how much additional electricity is consumed by visiting this sort of captcha, but I expect it is negligible compare to the playing of the video.

      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Friday, 28-Mar-2025 13:47:05 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      PoW captchas are essentially cryptocurrency miners for the server. when the server throws the result away, instead of using it to pay for the server or whatever, it's PoWaste

      it wouldn't be quite as bad as if the server actually took the PoW/mined currency as payment, ideally also offering alternate means of anonymous proof of payment for access (GNU Taler, browserless mining, whatever) to bypass the on-browser PoW
      In conversation about 2 months ago permalink
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Friday, 28-Mar-2025 13:47:06 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo "playing the video is supposed to be useful to the user, whereas the proof of work [...]"

      I don't really see the qualitative difference here. When I play the video or audio there are parts of the decoding that are redundant for me, for example the video may be too high resolution or contain a padding intro/outro I'm not interested in or audio frequencies I can't here.

      "there has to be a better way"

      Maybe. I don't run an Invidious instance so I don't know. On wikis, QueryCaptcha works.

      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Friday, 28-Mar-2025 15:36:07 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      PoW is by definition an expensive-ish computation.

      Sometimes the result is used for something. Then it's not wasted.

      What we're seeing is result that's not used for anything, only to slow down access indiscriminately, to burden LLM bots so they don't burden the sites so much. It's entirely wasted computing. How can there be any doubt about that?

      This kind of waste multiplies and accumulates, whether or not one keeps track of it.
      In conversation about 2 months ago permalink
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Friday, 28-Mar-2025 15:36:08 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo It's not like currency, precisely because it can't be accumulated. Timeless accumulation is the problem with currency; without it, a number of problems vanish.

      Anyway, we've still not established that any significant waste exists. That's not a philosophical question but something that a power meter can determine.

      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Friday, 28-Mar-2025 15:57:32 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      I'm not really interested in comparing new sucky thing with old sucky thing; I'm interested in something that solves the problem without sucking.
      In conversation about 2 months ago permalink
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Friday, 28-Mar-2025 15:57:34 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo Captchas are always waste (compared to the user's task at hand). The question is whether this kind of captcha is more wasteful than the unfortunately more common ones. (The hypothetical benefits produced for datasets of proprietary captcha-makers are not verifiable and would only accrue to shareholders; they need not be counted.)

      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Saturday, 29-Mar-2025 01:48:12 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      Yes, I loathe captchas, precisely because they come across to me as the server (owner) saying "I get to automate, you don't, loser". Plus, they run under control of a remote server, so they're nonfree. I'd rather get rid of them all.

      But I'm also sympathetic to the needs of server operators who're getting overwhelmed by LLM bots. PoW as micropayment, offering something tangible to the server, besides granting access to the client, with alternate means for anonymous payment available, seems a lot more sensible to me than PoWaste: it solves two problems, rather than barely solving one while inconveniencing everyone.
      In conversation about 2 months ago permalink
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Saturday, 29-Mar-2025 02:09:59 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo Truly privacy-respecting #micropayments could open many possibilities, yes. The #digitalEuro plans are interesting too, in this regard.
      https://mamot.fr/@nemobis/111951626495391352

      In conversation about 2 months ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Nemo_bis 🌈 (@nemobis@mamot.fr)
        from Nemo_bis 🌈
        Recent #ECB speeches on the #DigitalEuro say (almost) all the right things on #privacy and other controversial areas. They've done their homework. ECB statements on the latest AML legislative package were far less clear. How to trust such promises? Did any MEP ask a question about the role of #FreeSoftware? "Preserving people's freedom to use a public means of payment: insights into the digital euro preparation phase": Piero Cipollone at the #EuropeanParliament". https://www.ecb.europa.eu/press/key/date/2024/html/ecb.sp240214_1~4bf1ab0319.en.html #EU
      Alexandre Oliva likes this.
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Saturday, 29-Mar-2025 02:11:51 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      that wouldn't be a bad approach, but it's not what's going on: lots of sites that didn't use captchas are adopting ones now, because others are doing so. that's not harm reduction, that's epidemic contagion.
      In conversation about 2 months ago permalink
    • Embed this notice
      Nemo_bis 🌈 (nemobis@mamot.fr)'s status on Saturday, 29-Mar-2025 02:11:53 JST Nemo_bis 🌈 Nemo_bis 🌈
      in reply to
      • Alexandre Oliva

      @lxo Fair enough. I treat captchas like an addictive drug: I follow #HarmReduction principles.

      In conversation about 2 months ago permalink
    • Embed this notice
      Alexandre Oliva (lxo@snac.lx.oliva.nom.br)'s status on Saturday, 29-Mar-2025 02:51:24 JST Alexandre Oliva Alexandre Oliva
      in reply to
      • Nemo_bis 🌈
      • Alexandre Oliva
      now, cryptocurrency miners aren't exactly a great model to follow, not only because they're so wasteful, but because they're time-sensitive: whatever goes into computing a hash with slowish computers at high latency is likely to be PoWaste as well. protein folding, signal detection, and other massive computations that can be broken into smallish verifiable pieces would be more reasonable. and we don't even need a source of funding to "micropay" for such computing: websites that adopt such PoW access controls could refer users (transparently or not) to distributed computing platforms that issue tokens that can be used to micropay for access

      CC: @nemobis@mamot.fr
      In conversation about 2 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.