I did nothing and I’m all out of ideas!

  • 0 Posts
  • 35 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle


  • Mechanize@feddit.ittomemes@lemmy.world🤖.🌎
    link
    fedilink
    arrow-up
    19
    arrow-down
    4
    ·
    2 months ago

    Considering you seem to dislike the whole concept of Bots, isn’t the Bot toggle in the Lemmy profile exactly what you want?

    It auto ignores all posts and comments made by accounts marked as Bots. Sure, the owner of the account has to correctly mark it, but I feel that can easily be solved by reporting unmarked bots.

    But I’m interested, if you would like to expand on it, how would you make a bot opt-in?
    The only way I could think of is through PMs, but that would be cumbersome, and generally unfit for purpose, for all the involved parties.







  • disable this system security feature temporarily,

    This should be - if I’m not mistaken - possible using the pip env var I posted about earlier, like this:

    PIP_BREAK_SYSTEM_PACKAGES=1 sudo apt install howdy

    Or exporting it for the current shell, before running the installation

    export PIP_BREAK_SYSTEM_PACKAGES=1

    But I personally highly discourage it, because - AFAIK - if it even works it will mess up the deps in your system.


  • I’m no python expert but reading around it seems your only real solution is using a virtual environment, through pipx or venv as you already had found out, or using the

    --break-system-packages
    
    * Allow pip to modify an EXTERNALLY-MANAGED Python installation
    
      (environment variable: `PIP_BREAK_SYSTEM_PACKAGES`)
    

    pip flag which, as the name suggest, should be avoided.

    EDIT: After rereading I got your problem better and I was trying to read the source for Howdy to see how to do it, so far no luck.







  • Mechanize@feddit.ittoLinux@lemmy.mlproton VPn
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    7 months ago

    Considering you are not using the Flatpak anymore it is, indeed, strange. The only reasons I can think of are: your network manager is using the wrong network interface to route your traffic ( if you go on an ip checking site like for example ipinfo do you see yours or the VPN’s IP?) or that you have WebRTC enabled and the broadcaster is getting your real ip through that.

    For the first case it can get pretty complicated, but it is probably an error during the installation of the VPN app or you set up multiple network managers and it gets confused on which one to configure. You should also enable the Advanced Kill Switch in the configuration.

    For the second case you could try adding something like the Disable WebRTC add-on for firefox and check if it works. Remember to enable it for Private Windows too.

    The last thing I can think of is that you allowed the broadcaster to get your real geolocation (in firefox it should be a small icon on the left of the address bar), or you are leaking some kind of information somewhere: there are a bunch of site that check for ip leak, but I don’t know if that goes too deep for you.
    If you want to check anyway the first two results from DDG are browserleaks and ipleak. Mullvad offered one too but it is currently down.

    EDIT: If you enable the Advanced Kill Switch, and the app is working correctly, internet will not work while you are not connected to a VPN server or until you disable the switch again, so pay attention to that.