Not sure about the current situation. However in general Twitch uses server side injected ads (SSAI), which are basically unblockable. They can however be bypassed (using different methods, each having it’s own pros and cons). Anway there is a very active twitch ad blocking community that will explain everything: https://github.com/pixeltris/TwitchAdSolutions Most reliably is having either an http proxy or a vpn in a country that is not served ads.
- 1 Post
- 19 Comments
Well that is actually quite dynamic as sometimes advertisers suddenly choose to place an ad in somen fringe country like czech rep. or Georgia. Mostly those small eastern EU countries are not attractive enough for advertisers. For some reason I also never get ads with Luxembourg IP, even though they are one of the richest countries in the world. Probably too small of a traget audience.
I use my paid vpn extension (Nord) to select a Country for twitch.tv which isn’t served ads. However I would all my traffic go through that specific vpn as it causes trouble with other appe/pages. So being able to cnveniently switch my IP per domain is pretty nice sometimes.
pwalker@discuss.tchncs.deto
Selfhosted@lemmy.world•introducing copyparty, the FOSS file serverEnglish
6·4 months agoI agree but it’s still in an early development state. Not really usable for everyday work let alone most people never heard about it 😅 But yeah still cool to mention it under “modern” browsers. I wish them good luck with the first alpha next year. I hope it’ll be successful.
pwalker@discuss.tchncs.deto
Selfhosted@lemmy.world•introducing copyparty, the FOSS file serverEnglish
16·4 months agoyou even mention ladybird as browser, nice 😎
lets delay the birth a bit 😅, tell us when re-birth is happening
pwalker@discuss.tchncs.deto
Fediverse@lemmy.world•Summit for Lemmy is now open sourceEnglish
2·9 months agoI love that you link Obtanium. This is the first time I saw an app dev actually linking to Obtanium. Getting your FOSS app update directly from the git repos without the google bs around it just seems logical.
pwalker@discuss.tchncs.deto
Technology@lemmy.world•immich v1.127.0 released with manual face tagging featureEnglish
2·9 months agoHaven’t heard about this project before. I was using a self hosted Nextcloud instance so far. What would be the benefit of switching to immich? I guess immich does have some advances features, like the tagging was mentioned, specifically for picture management.
pwalker@discuss.tchncs.deto
Technology@lemmy.world•Bluesky adds 700,000 new users in a week / A ‘majority' of the new users are from the US, indicating that people are searching for a new platform as an alternative to X.English
12·1 year agoI just learned that before their fundraising round Bluesky called themselves a “public benefit LLC” and I thought thats nice of them to benefit the public 😅 , then I found out about US corporate law and what it actually means…
pwalker@discuss.tchncs.deto
Technology@lemmy.world•Google Chrome warns uBlock Origin may soon be disabledEnglish
41·1 year agoAt least link the full article and not just the headline… smh. Here is also the follow-up article with comments from Firefox’s CTO. https://www.heise.de/en/news/Firefox-defends-itself-Everything-done-right-just-poorly-communicated-9802546.html
Honestly mentioning Enchrochat together with other mainstream message clients is kind of misleading. The Enchrochat message client was also E2EE. However Enchrochat was also a company that sold their own mobile phones with a prorietary OS on it together with own sim cards and only those phones were able to connect to each other. And law enforcment had enough evidence that they sold those hardware in shady untracable ways similar to drugs. At that point there was no western government that didn’t want to help seizing their infrastructure and taking over their update services for example.
The bigger problem however for the general public is that certain politicians want to break encryption all together by forcing companies to implement backdoors on client side. This has been an ongoing discussion for 2 years in EU parliament and it has to stop: https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control
pwalker@discuss.tchncs.deto
Today I Learned@lemmy.world•TIL kobolds in Japan are dog-people because of a mistranslation in a copy of AD&D in the 80sEnglish
2·1 year agoI guess with some imagination you could say the muzzle does indeed look dog like but the rest? I mean even if you morph some reptiles into humans you’d get such kind of muzzle. It’s not really that “distict” imo, but I get why some would say otherwise.
“Kobolds were first described as hairless humanoids with small horns by Gygax in the Monster Manual (1977)”
https://en.wikipedia.org/wiki/Kobold_(Dungeons_%26_Dragons)?wprov=sfla1
pwalker@discuss.tchncs.deto
Today I Learned@lemmy.world•TIL kobolds in Japan are dog-people because of a mistranslation in a copy of AD&D in the 80sEnglish
11·1 year agoFound a really good source including a picture of the first edition. It looks like that they were mentioned indeed in the 2nd edition to be more dog like in a sense of voice “yappin like a dog” and smelling like damp dog. Their visuals however were not really dog like. So I assume it was maybe both a mistranlation and an over interpretation of some texts from 2nd edition or just pure free choice from the author of this anime. https://www.belloflostsouls.net/2022/01/dd-monster-spotlight-kobolds.html
pwalker@discuss.tchncs.deto
Technology@lemmy.world•WhatsApp and Signal messages at risk of surveillance following EncroChat ruling, court hears | Computer WeeklyEnglish
3·1 year agoWell just recently researchers discovered a campaign installing backdoors on iPhones using a chain of several 0-day expoits or in this case using also 0-click exploits, where no interaction from a user is needed. However those attack chain are so advanced that practically normal law enforcement would never be able to do it. But theoretically yes some well equiped state actors are able to infect you without noticing. If you are really intrested to see how advanced these attack are search for “project triangulation” or watch the recording from last years chaos computer conference: https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers#t=373
thank you for stepping up, I tried to connect with @Alchemy@lemmy.world earlier this year to talk about community topics but I think they are inactive
definitely Progressivist is the most active mod and I agree. There is no rule yet but maybe you’ll get into trouble with instance admins posting 100s of picture at once. I think with some common sense you should be fine. Maybe just post your top 10 pictures or strecht it over a period of time so that we get a picture from you each day/week for example
pwalker@discuss.tchncs.deto
Technology@lemmy.world•Pioneering internet messenger ICQ shuts after 28 years - CNAEnglish
1·1 year ago165166320 here

Well you have your “home” lemmy instance which you are logged in to. Everything you see goes through your home instance. But many things you will see originate on a completely different “remote” instance. Your home instamce nees to be federated and synced in order to the everything that happens in the remote/origin instance