It's pretty cool to see a licensed, authorized LPFM station being set up by hobbyists!
Prior to the PIRATE act of 2020, running a pirate FM station was effectively legal until the second time you were busted. Prior to 2020, if you shut the station down after getting your NOUO, there wasn't any real penalty. Teenage me loved this, and my buddies and I had a little irregularly-broadcasting pirate radio station, using a cheap CZH-7C transmitter purchased on eBay. One time we went on air from our high school's cafeteria during a study hall, and surprisingly, nobody questioned anything! We did have Microsoft Sam narrate our broadcast so that we weren't making a ton of noise.
We never did get our NOUO; instead, we ran into the much bigger reality, which was that none of us had anything of interest to say. After the novelty of hearing our voices on the radio wore off, the transmitter ended up in a closet, where it probably still sits today. Good times!
It would be nice if IA could create a browser extension or TLS-intercepting proxy that end users can run over their own computers and connections, allowing crowd-sourced scraping. It would need an allow/deny-listing feature for sites to passively crawl, and I'm not sure how you could prevent data poisoning, but it would at least get around the issues of blocking.
As if tetraethyl lead in gasoline wasn't bad enough, they also added ethylene dichloride and/or ethylene dibromide, which acted as a lead scavengers, preventing deposits of insoluble lead (II) oxide from forming and clogging up engines/exhaust equipment. Instead, water-soluble-at-high-temperatures lead (II) chloride and lead (II) chloride were blasted out the tailpipes of vehicles using tetraethyl lead. These are mildly soluble at ambient temperatures, allowing the lead to permeate even further than it otherwise would have.
Getting a capture card that supports VGA is another possibility. Or don't and just say you did. Is there realistically any way to know whether a video was screen-recorded or if it was downloaded?
I assume if you download the stream directly it could be shown that your copy and youtubes copy are identical, since encoding a video and compressing it is different every time.
In spite of its issues, it seems like Monero is the only mainstream cryptocurrency that actually still lives up to the ethos of what Satoshi had in mind.
The built-in terminal app seems to be similarly flaky on my Pixel 8. Also, the kernel it boots into is really stripped down, and it lacks a ton of essential features. I was not able to install VirtualHere client to pass through USB devices, and there's no built-in functionality. There's also no way to open it full-screen on the Pixel 8's DP-over-USB-C desktop mode. Hopefully it continues to improve, but it seems like Google is more into extracting value than they are improving their products at this point.
Another example, this one deliriant and not psychedelic, is atropine/scopolamine, found in certain nightshades, such as deadly nightshade, mandrake, plants in the Datura genus, and trees in the Brugmansia genus. The chemical weapon QNB, also called BZ is another example of a long-acting deliriant.
As far as classic psychedelics go, I've read mescaline (3,4,5-trimethoxyphenethylamine) lasts really long.
My experiences with mescaline are that it has mostly wound down by 6-8 hours though I can tell that I am slightly "off" for a few hours after that. Shorter timeframe than LSD, though not by a whole lot.
I tried it during the summer between 8th and 9th grade after discovering a Datura Stramonium plant growing at a beach on Cape Cod. Fortunately the plant was growing in sand, and the alkaloid content of the plant was very low. I boiled an entire pod down in a soda can and gave it a try. In terms of effects, I did not become delirious, but my perception of gravity was greatly enhanced; I felt like I weighed 600lb. My eyes were also completely incapable of focusing on anything close-up for several days. I never tried Datura again, and I never will. I was lucky I didn't wind up dead, in jail, or in the hospital.
I kind of doubt this, as the rapidly changing nature of mobile IP addresses would mean that a periodic outbound connection would still be necessary to keep the attack up-to-date on the compromised devices current IP address. At that point, you may as well have the compromised device periodically poll an attacker-controlled server for instructions rather than jump through a bunch of hoops by getting things to work over inbound connections.
In the case of T-Mobile, unsolicited inbound IPv6 connections are blocked, but direct P2P is still possible. I successfully established a WireGuard tunnel over IPv6 between 2 phones. With IPv6, since the internal addresses and ports and the same end-to-end, all that is needed is a dynamic DNS service; STUN isn't necessary. I did need to set a persistent keepalive of 25 seconds on both sides of the tunnel to keep the firewall holes open.
Interestingly, Verizon Wireless blocks connections to other Verizon Wireless IPv6 addresses. T-Mobile-to-T-Mobile connections work, Verizon-to-T-Mobile connections work, but Verizon-to-Verizon connections do not work. Given the way Verizon's network has stagnated while T-Mobile's network has been rapidly improving, it may be time to move away from Verizon.
Slightly off-topic, but if you have a modern Google Pixel phone, Google includes "free" VPN service (which probably collects/sells your data). This service uses Endpoint-Independent filtering, so if you send an outbound packet with the source port you want to map, regardless of the destination IP/port, you can effectively receive unsolicited inbound connections from any host on the internet that contacts your IP:port, so long as you send a periodic keepalive packet from the source port you are using to anywhere.
This is how researchers were able to remotely hack several Chrysler models. They used a Sprint hotspot to get an IP on the cell network and were able to connect to any other Sprint device. The cellular modems on these cars were on Sprint so they just had to be on the same network. I wonder if Verizon intentionally blocks this.
Prior to the PIRATE act of 2020, running a pirate FM station was effectively legal until the second time you were busted. Prior to 2020, if you shut the station down after getting your NOUO, there wasn't any real penalty. Teenage me loved this, and my buddies and I had a little irregularly-broadcasting pirate radio station, using a cheap CZH-7C transmitter purchased on eBay. One time we went on air from our high school's cafeteria during a study hall, and surprisingly, nobody questioned anything! We did have Microsoft Sam narrate our broadcast so that we weren't making a ton of noise.
We never did get our NOUO; instead, we ran into the much bigger reality, which was that none of us had anything of interest to say. After the novelty of hearing our voices on the radio wore off, the transmitter ended up in a closet, where it probably still sits today. Good times!
reply