If you end up going with a SFF build, I would recommend a dedicated GPU for Jellyfin. Nothing fancy, just a low profile GTX-1030 or RX 550 to handle the transcoding. Otherwise you'll probably run into high CPU spikes while watching content from browser or some smart TVs.
Starting line 6040 the Constants class. That isn't bytecode, those are binary blobs that look like licensing/hardware identifiers. Given those byte arrays are named for HWID and KMS that would make sense. They also are also only being used for versioning calls for KMS4k (Key Management Service). There isn't anything suspicious about that.
I had an issue with an old Lenovo X260 laptop. The onboard bluetooth device was showing as not being present if the wireless device was loaded. I could have one or the other, but not both. BT/Wifi was being supplied by the same M.2 card, so as soon as a module loaded (the wireless loaded first I guess) it prevented it from being used by another module. I'm not sure if there was an actual fix to that, though. I had a spare USB bluetooth dongle so I just ran that instead.
If these services want to act like an al a carte service, then their pricing needs to reflect that. If they had a plan that allowed someone to subscribe to 2-3 shows for $5 a month (but only those shows could be accessed), people would flood their platforms. The problem is the service's greed would take hold and they'd try to find a way to ruin the experience to push people to the higher price plans. They don't get that people don't want 100s of janky shows to watch, they literally are only there for maybe 1 to 2 shows and that's it.
digital piracy remains prevalent and costs the U.S. economy an estimated $29.2 billion annually
That's based on the false assumption that if pirated materials weren't available, people would then be forced to buy them. That's not true, they just don't buy them. If someone has no intention to spend money your content, you aren't losing anything when they find it for free.
For my travel devices, I use Tailscale to talk to the server. For raw internet, I use their funnel feature to expose the service over HTTPS. Then just have fail2ban watching the port to make sure no shenanigans or have the entire service offlined until I can check it.
The court also identified a third argument, which the authors didn’t pursue in great detail; market dilution. Under this theory, AI models trained on copyrighted works can generate “countless works that compete with the originals, even if those works aren’t themselves infringing,” Judge Chhabria wrote.
So, even if what you make isn't infringing on their rights, its still competing with them which should be forbidden. That whole argument is a machine shouldn't be allowed to compete with a human. So, if I am inspired by another's work, that's ok, but if a machine does that we need to ban it.
A lot of privacy threads focus on fantastical what-if scenarios that just never really come up. For the majority of Internet users, the biggest threat they would face comes from the adtech sector. Now most people aren't going to understand what is collected in realtime as that's usually company specific and usually encoded on the site/app, but standards are all open for anyone to read. Mostly this is going to come in the form of OpenRTB 2.6 (https://iabtechlab.com/wp-content/uploads/2022/04/OpenRTB-2-6_FINAL.pdf) or the Prebid library and its User ID Module (https://docs.prebid.org/dev-docs/modules/userId.html) with maybe some custom fields and VERY granular audience mapping.
Specific to that standard, 3.2.20 Object: User and 3.2.27 Object: EID and 3.2.28 Object: UID are the important ones, but honestly all of the information can be used in conjunction with other pieces. Now if you look through that info, you'll notice you don't really see that much. You're real name isn't present. Your email isn't present. Your physical address isn't present (although its likely your geo location info is accurate from the device object). The thing is that so many little bread crumbs exists and so many actors are mapping those bread crumbs that once human psychology is overlaid on top of it crazy amounts of information that was not collected can be inferred. People think info like "His name is John Smith" is important when really "This is device ID EA7583CD-A667-48BC-B806-42ECB2B48606" and the numerous IDs built from that or a dozen other things is what matters.
Just from that standard with enough data/time, its possible to determine your demographic/sociographic information. One could determine who you will vote for and political leanings, how much money you make, what your job is, your sexual orientation, etc. This is great if someone is trying to sell you Tide detergent, but its also really useful if you're wanting to start a "grassroots" campaign to add/remove rights for specific citizens. It allows you to know where you can get a foothold for your legislation (Cambridge Analytica comes to mind). And these things are all easily verifiable from your browser. Without an adblocker, go browse the internet and keep track of how many 1x1 tracking pixels get dropped on you. Checkout what's in your cookie store and what's sitting in sessionStorage and localStorage.
So, I think groups like r/privacy focus a lot on sci-fi inspired dystopia, when instead they could be focused on more real world dystopia.
That's a valid reason. AirVPN is slower than Mullvad or PIA. AirVPN does fit some use cases better, like multi-port forwarding, but that's not going to be what everybody is doing. PIA does offer port forwarding but only single port for single instance. To do multiple, you'd have to have multiple sessions running which doesn't really work well from one machine.
So, if speed is your only criteria, don't use AirVPN. Better options exist.
I'm not sure why one of those is flagged. From what I can see its just the obnoxiously written write_file.content one-liners and lots of regex/sed, but nothing looks wrong with what its doing.
GDPR is not relevant to state monitoring. Article 23 provides the provisions to explicitly restrict data protection rights for the purpose of eavesdropping, detection, crime prevention, etc. Its wildly open ended to the point that it makes no difference in choosing a VPN: https://gdpr-info.eu/art-23-gdpr/
If you aren't concerned with flashy setups, AirVPN might be something to check into. In terms of cost, 3 months of AirVPN cost roughly about the same as 1 month of PIA.
Yeah, if the student devices are locked down its done so per policy. Creating VMs which allow students to bypass that policy is going to potentially get you into trouble with administration. IT could maybe setup those students with Citrix Workspaces or something similar they support to achieve that without having to throw student restrictions out the window.
So, this was more common when WEP encryption was used. You could just listen to the radio traffic of the given network and collect IVs which the encryption would leak. Once you had enough pieces you could reassemble the key and access the network. When WPA came out it was harder, but tools like pyrit and john the ripper helped, so long as you were able to capture the 4-way TCP handshake.
To actually see the networks, you would build biquad parabolic antennas from old DirecTV dishes people left behind. They were very directional high gain antennas that you would just target at someone's house. We'd also build cantennas from junk laying around. Those were interesting days.
If its compression related, have you checked your caching on that system?
You might try (as root - not sudo) to toggle swap off/on: swapoff -a && swapon -a
Then just before running the installer (again as root - not sudo): echo 3 > /proc/sys/vm/drop_caches
If you end up going with a SFF build, I would recommend a dedicated GPU for Jellyfin. Nothing fancy, just a low profile GTX-1030 or RX 550 to handle the transcoding. Otherwise you'll probably run into high CPU spikes while watching content from browser or some smart TVs.