[-] mazadin@lemmy.world 3 points 1 week ago

Try this in tmux.conf:

set-option -ga terminal-overrides ",foot:Tc"

These overrides apply to the TERM you are using outside of tmux (where this is running).

[-] mazadin@lemmy.world 1 points 3 months ago

Because J looks like a down arrow, obviously! /s

[-] mazadin@lemmy.world 3 points 4 months ago

Wanted to help you potentially avoid a wild goose chase—port checking tools won’t detect a wireguard port as open…it’s specifically designed to not advertise its presence for security purposes. Bad handshake requests are ignored, making it look like a firewall DROP rule.

[-] mazadin@lemmy.world 10 points 7 months ago

I’ll admit, this spooked me, but for different reasons than the OP and most comments.

I didn’t recognize any of the downloads, even though I have a publicly routable static IP and don’t use a VPN (I have a domain and self host so I know my IP hast changed in years).

I use exclusively private trackers, and nothing I’ve actually downloaded showed up, and the things that did were sporadic—one every couple days or so, first/last seen times identical, random torrents. I started asking myself if I had a rogue device in my network, so I checked logs and stats—nothing unusual (I think…I hope…hard to tell sometimes).

I looked more into how this site tracks peers, and it seems they have different levels of confidence. Their first API tier (peer API) is a “best guess” and this is based on listening to the DHT and PeX networks for their known torrents. I’m guessing their website uses this or a combination of this with their other APIs. I looked at my torrent config and saw I hadn’t disabled DHT/PeX and had a couple idle public torrents.

Not positive on this, but I think there can be false positives if your torrent box participates in DHT/PeX even if it doesn’t actually download said torrents. Can anyone confirm this?

mazadin

joined 1 year ago