• 0 Posts
  • 9 Comments
Joined 1 year ago
cake
Cake day: July 27th, 2023

help-circle
  • I get 8.44 bits (1 in 347.34 browsers). I use Firefox with Arkenfox user.js applied on top, with some of my own custom overrides.

    However, I think the biggest factor could be because I have Ublock Origin set to medium-hard mode (block 1st party scripts, 3rd party scripts and 3rd party iframes by default on all websites), so the lack of JavaScript heavily affects what non-whitelisted websites can track. I did whitelist 1st-party scripts on the main domain for this test (coveryourtracks.eff.org), but all the ‘tracker’ site redirects stay off the whitelist.

    I actually had to allow Ublock Origin to temporarily visit the tracker sites for the test to properly finish–otherwise it gives me a big warning that I’m about to visit a domain on the filter list.





  • I would try what the other commenter here said first. If that doesn’t fix your issue, I would try using the Forge version of WebUI (a fork of that WebUI with various memory optimizations, native extensions and other features): https://github.com/lllyasviel/stable-diffusion-webui-forge. This is what I personally use.

    I use a 6000-series GPU instead of a 7000-series one, so the setup may be slightly different for you, but I’ll walk you through what I did for my Arch setup.

    Me personally, I skipped that Wiki section on AMD GPUs entirely and it seems the WebUI still respects and utilizes my GPU just fine. Simply running the webui.sh file will do most of the heavy lifting for you (you can see in the webui.sh file that it uses specific configurations and ROCm versions for different AMD GPU series like Navi 2 and 3)

    1. Git clone that repo, git clone https://github.com/lllyasviel/stable-diffusion-webui-forge stable-diffusion-webui (the stable-diffusion-webui directory name is important, webui.sh’s script seems to reference that directory name specifically)
    2. From my experience it seems webui.sh and webui-user.sh are in the wrong spot, make symlinks to them so the symlinks are at the same level as the stable-diffusion-webui directory you created: ln stable-diffusion-webui/webui.sh webui.sh (ditto for webui-user.sh)
    3. Edit the webui-user.sh file. You don’t really have to change much in here, but I would recommend export COMMANDLINE_ARGS="--theme dark" if you want to save your eyes from burning.
    4. Here’s where things get a bit tricky: You will have to install Python 3.10, there is warnings that newer versions of Python will not work. I tried running the script with Python 3.12 and it failed trying to grab specific pip dependencies. I use the AUR for this; use yay -S python310 or paru -S python310 or whatever method you use to install packages from the AUR. Once you do that, edit webui-user.sh so that python_cmd looks like this: python_cmd="python3.10"
    5. Run the webui.sh file: chmod u+x webui.sh, then ./webui.sh
    6. Setup will take a while, it has to download and install all dependencies (including a model checkpoint, which is multiple gigabytes in size). If you notice it errors out at some points, try deleting the entire venv directory from within the stable-diffusion-webui directory and running the script again. This actually worked in my case, not really sure what went wrong…
    7. After a while, the webUI will launch. If it doesn’t automatically open your browser, then you can check the console for the URL, it’s usually http://127.0.0.1:7860. Select the proper checkpoint in the top left, write down a test prompt and hopefully it should be pretty speedy, considering your GPU.

  • I assume 4chan does not sell your data with 3rd parties (it pays the bills from user donations and people who buy a ‘4chan pass’, I think advertisers might’ve pulled out from the site long ago, given its vulgar nature) however it does appear to comply with law enforcement. See this 4chan user who was sending death threats to a Florida sheriff on 4chan, and was later arrested for this: https://www.thedailybeast.com/tyler-meyer-busted-for-threatening-sheriff-mike-chitwood-on-4chan

    I believe it’s possible that 4chan had given this user’s IP address to law enforcement. 4chan records your IP address when you post, and only administrators can see it: https://4chan.org/faq#postanon

    You can also look at the Wikipedia entry for 4chan, similar users have been arrested for making these death threats: https://en.wikipedia.org/wiki/4chan

    I don’t advocate for what these users do, it’s harmful, and they honestly have it coming when they get arrested–but it shows that if 4chan is compelled to reveal your information, they will.

    It’s not possible to post under a VPN by default, they’re blocked site-wide to combat spam and automated posts, even though there’s already a captcha when you post? I guess they’re just trying to play it extra safe. You can post under a VPN if you buy the 4chan pass (https://www.4chan.org/pass), however 4chan does not support any privacy-centric options like Monero or even cold hard physical cash, which means even if you post under a VPN, you can still be linked to your posts via payment method.

    Me personally? I lurk on there every once in a while, but I’ve never posted, for these reasons. At least I can post under a VPN on Lemmy.