• 11 Posts
  • 169 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle
  • True, wouldn’t be too different vs just using a VPN. You’re choosing to trust the Tribler tech and the Tribler exit node operator vs choosing to trust the VPN provider. Granted most VPN connections are going to have much better performance vs anything Tribler related.

    There is a nice side effect of running an *arr stack against Tribler, even in 1 hop mode - Your Tribler node is much more easily pulling in new content into the Tribler network for other users to access afterwards without needing an exit node. Ideally it’s just one Tribler node/user needing to pull data through the exit nodes while the rest would just pull it from you and share with other nodes in-network.

    Torrents over I2P work the same way. If the torrent data isn’t found within I2P and you have outproxies configured you could pull torrents from the clearnet & afterwards other I2P users just share amongst the I2P network.


  • That’s pretty cool, thanks for sharing! Been a while since I tried it out but last I looked Tribler’s own automation features were quite lacking so something like this helps a lot.

    I was not able to download anything with more than 1 hops in between - ie it does hide your real IP address, but only uses one relay in between.

    Hmm I don’t think there’s any relays at all in that configuration, unless you’re counting the exit node itself?

    https://github.com/Tribler/tribler/issues/3067#issuecomment-325367047

    One thing to keep in mind is that to download torrents from outside Tribler’s own network you would need to download through an exit node… not sure on the exact stats but last I tested exit nodes were only like 5-10% of the Tribler user base. For a while I tried volunteering my own VPN connection as an exit node for Tribler just to see how it went but the Tribler client kept locking up/crashing after a few days so the experiment did not go well… hopefully works better nowadays.



  • Brickfrog@lemmy.dbzer0.comtoSelfhosted@lemmy.worldCustom Domain Email
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    2 months ago

    If you’re using Google Workspace, Google will give you the appropriate DMARC, DKIM and SPF records to add to your DNS. The NS themselves should resolve the records and provide the recipient server with the values you’ve entered, thereby ensuring delivery.

    Sure. But why would that matter when you’re dealing with hostile 3rd party email providers that intentionally want to blackhole all email domains at Namecheap? But yes, just to clarify I do configure DMARC/DKIM/SPF and that works great for most cases.

    I’m just describing what worked for me though in truth I don’t know exactly how these hostile email providers actually determine the domain is hosted at Namecheap. My hunch is that they are using a lookup & finding the nameserver for the domain & have already blacklisted Namecheap’s default free nameserver IP addresses. For whatever reason those same hostile email providers don’t seem to be blacklisting Namecheap’s paid nameserver but I think that sort of makes sense…

    The larger issue is that Namecheap is known for cheap domains that scammers/spammers tend to buy in bulk & then use to spam with. Those same scammers/spammers aren’t trying to spend extra money so they only ever use the default free Namecheap nameservers.


  • Brickfrog@lemmy.dbzer0.comtoSelfhosted@lemmy.worldCustom Domain Email
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    2 months ago

    If you use Namecheap for email domain(s) you may want to consider also splurging for their PremiumDNS to keep your domain(s) off spam blocks at other email providers.

    I help maintain some emails at Gmail/Google Workspace but the domains themselves are at Namecheap. For a while there were complaints that some emails never landed in other people’s inboxes… this led me to talk about the issue with one of the email provider recipients based in the UK & apparently they were null routing anything coming from Namecheap since they felt a lot of spam came from them. But after some experimenting I figured out their system (& probably others) were figuring out they were Namecheap domains via the default FreeDNS they use. On a hunch I switched those domains over to PremiumDNS and after that all our emails were landing in other inboxes correctly. I guess maybe it makes sense, a typical spammer buying a cheap domain at Namecheap isn’t going to splurge for the higher end DNS service for it.

    I’m not saying all email providers treat Namecheap domains as spam but just be warned there definitely ones out there that do.



  • Not sure if it fits what you’re looking for but I usually use YUMI for multi boot situations, can’t recall it giving me any issues over the years. But I don’t do anything overly complex either.

    Never had the need to use Ventoy myself so can’t really give a good comparison but maybe others have used both & can give a better review.

    PS - For what it’s worth my basic toolkit is YUMI with https://www.system-rescue.org and https://www.memtest.org, that alone covers the vast majority of my diagnostics/rescue situations. But I’ve also added Windows 10 ISO onto the multi boot on occasion which could be useful for getting to a Windows prompt with Windows tools when needed - though I have a habit of keeping Windows on its own USB via https://rufus.ie



  • Syncthing, Resilio Sync, or one of those browser based p2p file sends e.g. https://file.pizza or similar.

    If both p2p ends know how to use torrents then creating a simple torrent to share to the other peer would work fine. But that requires slightly more IT competence especially if someone needs to open a port forward (ideally you would make sure you have your own port forwarded so the other party doesn’t have to worry about this).

    If you’re doing this more than once it might be worth setting up a simple server e.g. HFS is a nice open source/free HTTP file server, been a while since I used it but it still seems to be active https://www.rejetto.com/hfs/