IA after acceptance

This forum made possible through the generous support of SDN members, donors, and sponsors. Thank you.
However you decide to report this, OP, please don't take the laissez faire attitude of some posters here and think it's not a big deal. Own it, and don't pirate software/music/etc on college internet.
 
"YOU WOULDN'T DOWNLOAD A CAR!!!!!!!"


Sent from my iPhone using SDN mobile
Quot+get+out+quot+_bb6f6b96771c342899a3e2903d699b3b.png
 
Hey, if you go 4 miles over the speed limit then YOU SHOULDN'T BE A DOCTOR.
:ninja:

Committing repeated theft with no concept of why you're committing a crime and occasionally committing a minor moving violation that LEOs have discretion to ignore or give warnings for are not the same.
 
AdBlock is theft.
Is it theft if you turn of WiFi and data when you use iOS apps that don't require Internet but have ads? Unethical but not quite theft?

Related question: what are the ethics of doing something slightly unethical so you can answer the "Tell me about a time you acted unethically" interview question.
 
Is it theft if you turn of WiFi and data when you use iOS apps that don't require Internet but have ads? Unethical but not quite theft?

Related question: what are the ethics of doing something slightly unethical so you can answer the "Tell me about a time you acted unethically" interview question.

my point was more that it is not at all unethical. There is no principle being violated other than the most pedestrian understanding of theft.
 
Ask for a water cup at chipotle and get coke. Turn situation into an argument on how the food industry promotes diabeetus.


Sent from my iPhone using SDN mobile

My approach would be to do so, and when confronted convince the chipotle employees they have nothing to gain from coca colas corporate greed. They know how to make the burritos. They should free themselves from the yoke of chipotle and start the People's Burrito Stand. At that point they really have to crack down on the coke stealing though, perhaps through a gulag type arrangement
 
I've always struggled to understand some of the ethics arguments surrounding this topic.

Letting a friend borrow DVD to watch = OK

Library having a single copy of film passed around hundreds of people for free = OK

Ctrl+C, Ctrl+V an MP3 and send to a friend = STOP RIGHT THERE CRIMINAL SCUM
 
Can I download a pizza or is that not original enough? I don't want it to look like box-checking.
 
I've always struggled to understand some of the ethics arguments surrounding this topic.

Letting a friend borrow DVD to watch = OK

Library having a single copy of film passed around hundreds of people for free = OK

Ctrl+C, Ctrl+V an MP3 and send to a friend = STOP RIGHT THERE CRIMINAL SCUM
10/10 skyrim reference
 
I've always struggled to understand some of the ethics arguments surrounding this topic.

Letting a friend borrow DVD to watch = OK

Library having a single copy of film passed around hundreds of people for free = OK

Ctrl+C, Ctrl+V an MP3 and send to a friend = STOP RIGHT THERE CRIMINAL SCUM

They are all the same to me. What makes one criminal and another benign is not morality or ethics but the existence of private property.

October%20Revolution%20-%20Lenin%20Orating.jpg

QED
 
I know this is anecdotal, but one of my really close friends got caught torrenting ~adult movies~ twice, and the 2nd time he did receive an IA but he got into multiple schools and is currently an MS1.
 
lmao I really hope he had to include the type of content he was downloading in his apps

I actually helped him with his apps because we applied in the same year and he got by without specifying and only one school brought it up during his interview. I would say he got pretty lucky!
 
Yeah pretty amazing isn't it? Half an hour of research and you can be ready to safely purchase drugs on the dark net, yet all these college students can't figure out how to torrent
Meh, nothing is really safe. Remember all the unsafe Tor exit nodes? Plus your surfing experience can suffer by VPN due to the added lag of passing through another machine.
 
Yeah pretty amazing isn't it? Half an hour of research and you can be ready to safely purchase drugs on the dark net, yet all these college students can't figure out how to torrent
:slap: darknet is Tor (or similar), not VPN.
 
I know this is anecdotal, but one of my really close friends got caught torrenting ~adult movies~ twice, and the 2nd time he did receive an IA but he got into multiple schools and is currently an MS1.

Was there really not enough free porn on the internet that he needed to torrent?

"Bro can you edit this essay? Prompt was please explain getting caught illegally downloading porn on the school system, twice"


7878b70af8caff13ead9f43a560e0047.jpg
 
Last edited:
I know this is anecdotal, but one of my really close friends got caught torrenting ~adult movies~ twice, and the 2nd time he did receive an IA but he got into multiple schools and is currently an MS1.

Did he spin it as seeking additional study materials to review external anatomical landmarks and surface anatomy?
 
The onion type browsers are essentially just VPN on steroids is my amateur understanding
They work in very different ways and accomplish very different things.

VPN:
You have a client installed on your computer. This client will automatically encrypt all outgoing information. This information starts to send via the "traditional" route, i.e. it's routed first to your ISP then to your VPN provider (as this is the "destination"). This first part accomplishes two things: 1. the outgoing packets sent to your ISP are encrypted - your ISP can't see what information you're sending. Many VPN providers are switching over to 4096 bit encryption, which essentially means that unless they're using an incredibly outdated cipher, the encryption can't be broken barring the use of multiple supercomputers. 2. Because the VPN acts as a "hop", your ISP doesn't see the final destination of the packets you're sending - all they see is that you're sending packets to the VPN provider, and the trail (for them) ends there.

Once your packets arrive at the VPN server, they're decrypted and sent along to their final destination,which will see their origin as the VPN provider's servers. When that destination sends packets back, they travel the exact same pathway in reverse. The overall path looks something like this:
Slqvqv0.png


The advantages of a VPN are that your ISP has no clue what you're sending or where, your VPN provider will very likely utilize shared IP addresses, which means that when the unencrypted packets are sent out, they're "hidden" in a mass of other packets coming from and going to the same IP, and depending on the country your VPN provider is located from, it can be diplomatically-impossible for law enforcement in your country to get ahold of any logs your VPN provider may store (if that happens to be a concern of yours).

Disadvantages are that you need to pay for a provider to get a good one - the free ones are incredibly slow and usually quite unsafe, so you don't get all those benefits. Good news is that a good vpn shouldn't cost more than $5 a month.


Tor:
Again, you have a client installed on your computer. Again, it will encrypt all the packets you're sending out before it hits your ISP. The difference is in the "hops". Where with a VPN the packets are sent from your ISP to your VPN provider, Tor actually routes your connection into their own internal network, where your encrypted packets will be routed through a series of hops - however these hops are servers owned by the tor network, they're a bunch of random servers/computers also running Tor. At the last hop before your packet exits the Tor network, it will be decrypted, then sent to its final destination. Much more professional-looking summary below:
how-tor-works.png


Advantages: multi-hop system that can be more difficult to recreate.

Disadvantages: You have not the slightest clue who owns that last hop - if someone malicious (hacker) or law enforcement owns it, oops. You just made their job a whole lot easier. Not knowing who owns the hops (nodes) adds another challenge - it's possible your entry and exit node are run by the same person - now they know what you're sending, where it came from, and where it's going to. Additionally, Tor simply doesn't have enough traffic to "hide" your packets in a mass of others - there's a decent chance your packets will be the only ones transferring through that exit node at that time. It's also much slower, as you're limited by the multi-hop system and whatever kind of internet service those hops have. Tor also doesn't encrypt everything at once. When you start up a VPN, everything you do on the internet while it's on will route through the VPN. Tor will only route your browser through its network. You can configure many other applications to run through Tor, but this requires some background knowledge and is more complex. Not every application can be routed through Tor.

One way to think about all this is that VPNs are great for security AND anonymity: they protect your information and where it came from. Tor is good for security: it's good at keeping your information private from your ISP and your destination. Not so great for anonymity.

And that ends my educational post on how Tor and VPNs work. I'm sure it was more than you ever wanted to know, but I'm an internet security nerd and it drives me nuts when people don't distinguish between Tor and VPNs.
 
I've always struggled to understand some of the ethics arguments surrounding this topic.

Letting a friend borrow DVD to watch = OK

Library having a single copy of film passed around hundreds of people for free = OK

Ctrl+C, Ctrl+V an MP3 and send to a friend = STOP RIGHT THERE CRIMINAL SCUM


Capitalism. Remember we live in a society in which someone can own the words "Just Do It" or "I'm Loving It". Is it really that surprising that big money targets (educational institutions and firms) have been threatened financially in order to enforce IP law in a more grassroots fashion?
 
Last edited:
They work in very different ways and accomplish very different things.

VPN:
You have a client installed on your computer. This client will automatically encrypt all outgoing information. This information starts to send via the "traditional" route, i.e. it's routed first to your ISP then to your VPN provider (as this is the "destination"). This first part accomplishes two things: 1. the outgoing packets sent to your ISP are encrypted - your ISP can't see what information you're sending. Many VPN providers are switching over to 4096 bit encryption, which essentially means that unless they're using an incredibly outdated cipher, the encryption can't be broken barring the use of multiple supercomputers. 2. Because the VPN acts as a "hop", your ISP doesn't see the final destination of the packets you're sending - all they see is that you're sending packets to the VPN provider, and the trail (for them) ends there.

Once your packets arrive at the VPN server, they're decrypted and sent along to their final destination,which will see their origin as the VPN provider's servers. When that destination sends packets back, they travel the exact same pathway in reverse. The overall path looks something like this:
Slqvqv0.png


The advantages of a VPN are that your ISP has no clue what you're sending or where, your VPN provider will very likely utilize shared IP addresses, which means that when the unencrypted packets are sent out, they're "hidden" in a mass of other packets coming from and going to the same IP, and depending on the country your VPN provider is located from, it can be diplomatically-impossible for law enforcement in your country to get ahold of any logs your VPN provider may store (if that happens to be a concern of yours).

Disadvantages are that you need to pay for a provider to get a good one - the free ones are incredibly slow and usually quite unsafe, so you don't get all those benefits. Good news is that a good vpn shouldn't cost more than $5 a month.


Tor:
Again, you have a client installed on your computer. Again, it will encrypt all the packets you're sending out before it hits your ISP. The difference is in the "hops". Where with a VPN the packets are sent from your ISP to your VPN provider, Tor actually routes your connection into their own internal network, where your encrypted packets will be routed through a series of hops - however these hops are servers owned by the tor network, they're a bunch of random servers/computers also running Tor. At the last hop before your packet exits the Tor network, it will be decrypted, then sent to its final destination. Much more professional-looking summary below:
how-tor-works.png


Advantages: multi-hop system that can be more difficult to recreate.

Disadvantages: You have not the slightest clue who owns that last hop - if someone malicious (hacker) or law enforcement owns it, oops. You just made their job a whole lot easier. Not knowing who owns the hops (nodes) adds another challenge - it's possible your entry and exit node are run by the same person - now they know what you're sending, where it came from, and where it's going to. Additionally, Tor simply doesn't have enough traffic to "hide" your packets in a mass of others - there's a decent chance your packets will be the only ones transferring through that exit node at that time. It's also much slower, as you're limited by the multi-hop system and whatever kind of internet service those hops have. Tor also doesn't encrypt everything at once. When you start up a VPN, everything you do on the internet while it's on will route through the VPN. Tor will only route your browser through its network. You can configure many other applications to run through Tor, but this requires some background knowledge and is more complex. Not every application can be routed through Tor.

One way to think about all this is that VPNs are great for security AND anonymity: they protect your information and where it came from. Tor is good for security: it's good at keeping your information private from your ISP and your destination. Not so great for anonymity.

And that ends my educational post on how Tor and VPNs work. I'm sure it was more than you ever wanted to know, but I'm an internet security nerd and it drives me nuts when people don't distinguish between Tor and VPNs.
I enjoyed this! Thanks

Edit: So what makes Tor better for darknet shady stuff? Is it because in theory someone could subpoena a VPN provider and learn it was you doing XYZ, whereas it would be impossible to trace you through all the PCs in a Tor chain to get to the original node that knows your identity?
 
I enjoyed this! Thanks

Edit: So what makes Tor better for darknet shady stuff? Is it because in theory someone could subpoena a VPN provider and learn it was you doing XYZ, whereas it would be impossible to trace you through all the PCs in a Tor chain to get to the original node that knows your identity?
There's a lot of things that factor into this. First and foremost is that a lot of people are cheap - free is better than $5 a month. Second is that when used correctly and for certain purposes Tor can be considered as safe as a VPN. It just takes more knowledge and experience to use Tor correctly. Third is a misconception, something that you mentioned: people are under the impression that it's impossible to recreate the path a packet took through the Tor network and therefore link its source to its destination. This isn't true, unfortunately. It can be done with no entry/exit node compromising (it would likely require supercomputing to complete that in a reasonable timeframe, however) or it can be done by compromising the entry/exit node (e.g. if the same source owned both, or if someone had managed to compromise the system that hosted both the entry node and exit node). Finally, Tor has its own darknet, and you must use Tor to access this darknet. So if your end goal is that darknet, you have to use Tor.

All that said, (smart) people who are doing illicit things utilize more than one layer of security. A "good" setup would be one that utilized some combination of VPN(s), Tor, proxychains, and/or VPS(s) (which are essentially "part" of a server that you can purchase, typically used in this context to host your own VPN server).

EDIT: as for VPN providers, that is correct that theoretically they could get hit with a subpoena and be required to cough up any logs they stored. This is where doing your research comes in handy. There are many countries where the law enforcement will not cooperate with US law enforcement. Say (and I'm making this up) Brazil is one. If your VPN provider was based in Brazil and you live in the US and are suspected of committing a crime using your VPN, US law enforcement can come up with a subpoena for those records from your provider. HOWEVER when they deliver the subpoena, the Brazilian company can toss it in the trash and move on with their day - the US authorities have no jurisdiction there. Then there's also many VPN providers that recognize that their clients are (obviously) quite wary about logs and have their system set up in a way that no logs are stored at any point in time, so if they got a subpoena, there would be no data to provide to authorities.
 
Last edited:
I enjoyed this! Thanks

Edit: So what makes Tor better for darknet shady stuff? Is it because in theory someone could subpoena a VPN provider and learn it was you doing XYZ, whereas it would be impossible to trace you through all the PCs in a Tor chain to get to the original node that knows your identity?


Careful or someone at the VPN will unmask your identity and then leak your info to The NY Times.
 
Moral of the story, kids: if you must torrent, pay $5 for a VPN to do it.

Also, I need to remember this for the "teach me something" question at interviews.
 
or use that $5 to buy spotify premium and download as much as you want legally on your phone with no ads....
Think of me like a sex-ed teacher. If you're going to have sex (do illegal things on the internet) I'm not going to lecture you about how it's wrong or a terrible idea, I'm just going to remind you to put your condom (VPN) on. Otherwise it's gross.

EDIT: also note that spotify does not provide access to certain things that are commonly torrented (movies, textbooks, etc).
 
Think of me like a sex-ed teacher. If you're going to have sex (do illegal things on the internet) I'm not going to lecture you about how it's wrong or a terrible idea, I'm just going to remind you to put your condom (VPN) on. Otherwise it's gross.
I mean, I don't do illegal things online and I'm considering a VPN simply because I don't want future patients, the govt, or anyone else looking at my web history. You never know what may come up in a malpractice suit.

*edit*

Not saying you are advocating for anything illegal. I'm on your side here!
 
I mean, I don't do illegal things online and I'm considering a VPN simply because I don't want future patients, the govt, or anyone else looking at my web history. You never know what may come up in a malpractice suit.

*edit*

Not saying you are advocating for anything illegal. I'm on your side here!
"Well, members of the jury, in case you still harbor doubts about the nature of this doctor's twisted mind - just look at the things he's googled people doing with bananas!"
 
I mean, I don't do illegal things online and I'm considering a VPN simply because I don't want future patients, the govt, or anyone else looking at my web history. You never know what may come up in a malpractice suit
I cannot recommend it highly enough. Seriously. EVERYONE should be using a VPN, whether they're doing illegal things or not. It's not just some sketchy, sneaky way to avoid getting in legal trouble. It provides you anonymity "just in case" (God forbid someone sends you an innocent-looking link and you click it only to discover it wasn't so innocent after all). It also helps protect your information from being compromised in select hacking scenarios - e.g. someone who interrupts your packet between your router and your ISP when you happen to be logging into your bank is going to get some nightmare 4096 bit encryption they can't break - no bank hack for you!
 
"Well, members of the jury, in case you still harbor doubts about the nature of this doctor's twisted mind - just look at the things he's googled people doing with bananas!"
NOBODY CAN PROVE I DID THAT
 
Think of me like a sex-ed teacher. If you're going to have sex (do illegal things on the internet) I'm not going to lecture you about how it's wrong or a terrible idea, I'm just going to remind you to put your condom (VPN) on. Otherwise it's gross.

EDIT: also note that spotify does not provide access to certain things that are commonly torrented (movies, textbooks, etc).
lol wut is a textbook?
 
Top