=== ANCHOR POEM ===
═══════════════════════════════════════════════════════════════════────────────────
 I'll give ya a hint - encrypt the return IP address WITHIN the packet's data
 package repository area itself, rather than trusting your "router" to return
 it to sender.
 
 YOU DON'T KNOW WHO IS SENDING A PACKET
 
 that's the whole point of udp
 
 (actually udp is when it doesn't matter if it got snatched in transit. Usually
 used for more analog data streams like netflix or hulu prime.)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════════════───────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/5913 ---
══════════════════════════════════════════════════════════════════════════─────────
 Did you know that any wifi chip can be used as both a sender and a receiver?
 how do you think you'd get data in and out of the device?
 
 trick is... you don't actually need a router. How fun is that!
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #2 fediverse/6061 ---
═══════════════════════════════════════════════════════════════════════════────────
 what if (hear me out)
 
 what if instead of TCP we just did a constant stream of UDP packets until the
 recipient said "OKAY OKAY I GET IT"
                                                           ───────┐
 similar                        chronological                        different═════════════════════════════════════════════════════════════════════════════───────┘

--- #3 fediverse/5977 ---
══════════════════════════════════════════════════════════════════════════─────────
 apparently you can use network sockets for inter-process communication if you
 just set the network to your home and the ports that are set to the defaults
 that people who know what software you use will know to listen on when they've
 hacked any single device on your network. good thing that data is with the
 router, right?
 
 what if there was a stop before leaving the computer?
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #4 fediverse/3351 ---
═══════════════════════════════════════════════════════────────────────────────────
 privacy doesn't mean anything on the internet to me because privacy on the
 internet doesn't mean anything to "them"
 
 gestures vaguely, maybe winks once or twice and/or presents an emphasis face
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #5 fediverse/1611 ---
═══════════════════════════════════════════════════───────────────────────────────┐
 @user-1040                                                                       │
 well, usually in the examples I shared like tumblr posts there's a username      │
 and picture shown. But tumblr users change their names, while on Mastodon (at    │
 least on my client) it shows your permanent handle underneath your regular       │
 changable name. I guess you could migrate accounts to another server if you're   │
 being harassed in one place, but still people have a way of finding you. It's    │
 weird kinda makes me wonder if they track you by ip address haha - did you       │
 know that every computer attached to a router uses the same public IP address?   │
 Then it uses either DHCP or static assigned local addresses for every computer   │
 on the network. That's pretty neat! I wonder why we don't have workstations by   │
 default include a router (and modem)? Seems like pretty important tech that      │
 should be built into the chassis instead of in a small separate unit. Like,      │
 what if you had to throw all your belongings into a van and drive to a motel     │
 somewhere to set up your workstation in a hotel because it's hot and your ac     │
 broke lol                                                                        │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════════────────────────────┴──────────┘

--- #6 fediverse/3470 ---
════════════════════════════════════════════════════════───────────────────────────
 alternatively, when you initiate an SSH session it sends you a randomized
 public key whose private key is the password that you need to login. By
 decrypting the string of text it sent you and sending it back (plus the
 password at the end or whatever) you can ensure secure authentication without
 bothering with the passwordless keys which are wayyyyyy more trouble than
 they're worth and lack the "something you know" authentication method.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #7 fediverse/1810 ---
═════════════════════════════════════════════════════──────────────────────────────
 some people hear words like "datastructures" and "object-oriented programming"
 and think they're made up terms that don't mean anything important.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #8 fediverse/3234 ---
═══════════════════════════════════════════════════════───────────────────────────┐
 ┌────────────────────────────────────────────────────────────────┐               │
 │ CW: ritz-is-fucking-stupid-I-guess-oh-whoops-cursing-mentioned │               │
 └────────────────────────────────────────────────────────────────┘               │
 my understanding is that anyone with my IP address could make my heart bleed     │
 due to a hardware vulnerability on my motherboard. Though you might have to      │
 get past my decrepit ancient linksys EA 3500 router from 2012 first.             │
 unrelated, but does anyone want my IP address? I don't have any remote           │
 backups, so if you hate me now would be a great time to show me how despised I   │
 am. Alternatively you could try searching for anything evil to ensure that I     │
 can be trusted. You're gonna find mostly video games and source-code that I      │
 didn't write though. But also all my notes in directories that are               │
 non-standard, meaning you'll have to look around a bit. I leave little notes     │
 everywhere I go, so that I can remind myself how to do things in the             │
 directories I revisit months later. It's so weird how sometimes the things I     │
 wrote stop working after a while even if I didn't update my system lmao          │
 what is it with artists and self-immolation? "I never thought I'd actually di    │
                                                            ┌───────────┤
 similar                        chronologicaldifferent═════════════════════════════════════════════════════────────────────┴──────────┘

--- #9 fediverse/4296 ---
═══════════════════════════════════════════════════════════────────────────────────
 @user-1655 
 
 why don't we just weaponize email and send json to each other that ends up
 parsed, interpreted, and presented on the end-user's computer using whatever
 client we want?
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #10 fediverse/3631 ---
════════════════════════════════════════════════════════───────────────────────────
 ┌────────────────────────────────┐
 │ CW: re: computer-toucher-stuff │
 └────────────────────────────────┘


 @user-883 
 
 I have a different port for my desktop and my laptop just in-case the router
 forgets to check the postmarked address on the packets it receives... at least
 it'll know which port to send it to!
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #11 fediverse/4900 ---
════════════════════════════════════════════════════════════════───────────────────
 if you wanna trick systems administrators just put a bunch of sleeps in your
 code so your computer programs don't use up all the mainframe's resources all
 at once
 
 [statements dreamed up by the practically deranged]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #12 fediverse/2622 ---
══════════════════════════════════════════════════════─────────────────────────────
 what kind of linux user are you if you don't even like reading terminal
 output? it's USEFUL and INTERESTING information!
 
 WHY ELSE WOULD THE PROGRAMMER OUTPUT IT???
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #13 fediverse/836 ---
══════════════════════════════════════════════─────────────────────────────────────
 my question is if my IP has an address then how come my address +1 doesn't
 point to my neighbor
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════────────────────────────────────────┘

--- #14 fediverse/3454 ---
════════════════════════════════════════════════════════───────────────────────────
 deleting messages is pointless.
 
 it's always better to assume that they'll be screenshotted before you post.
 
 anything you say on the internet can and WILL be used against you
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #15 fediverse/3574 ---
════════════════════════════════════════════════════════───────────────────────────
 @user-1564 
 
 I love the concept of this! Maybe if HTTP is too complex, you could try
 another simpler server? I don't know the complexity of the programs I use
 every day, but I'm sure there's one that's very simple. Even just a simple IRC
 style chat server that just... sends text from person A to person B depending
 on their username (like a glorified Router or Switch)
 
 Reminded of this video tbh...:
 
 https://www.youtube.com/watch?v=gGfTjKwLQxY
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #16 fediverse/3178 ---
═══════════════════════════════════════════════════════────────────────────────────
 ┌─────────────────────────────────────────────┐
 │ CW: uspol-revolutions-and-stuff-or-whatever │
 └─────────────────────────────────────────────┘


 nothing you do on the internet will matter after the revolution. I don't care
 how many backups you have, there's a zero percent chance that we'll be able to
 figure out whose computer is whose after we've all moved around and given each
 other names that don't correspond to the names of our family in states that we
 lost.
 
 it doesn't mean the internet is useless right now, it just means that you
 should act as if you might not have it in the near future.
 
 also, like... every computer has a password. which basically means that it's
 useless unless you reflash it.
 
 pain is temporary, and it is an excellent teacher. there will be pain, but...
 we'll get over it.
 
 don't give up. there are brighter things in our future than what we have today.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #17 fediverse/1870 ---
═════════════════════════════════════════════════════──────────────────────────────
 why would I want other people using my computer? They don't know how to use my
 computer! They might break something or mess something up or automatically
 read/edit my files that are stored in standard locations through the usage of
 a script which automagically scans and ransomwares machines on the internet
 who store their files in specific standardized locations! no thank you.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #18 messages/1245 ---
═════════════════════════════════════════════════════════════════════════════════──
 BRB, if you want to talk to yourselfs, I recommend opening a port in your
 router and exchanging HTTP packets that create messages on each other's
 computers. Can be done in a couple hundred lines of C code that can be 90%
 premade or auto-generated. Then, once it's made, you don't have to think about
 it again because it's so simple. It's not trying to scale, it's just...
 designed for a small, focused, human oriented mindset.\
                                                           ─┐
 similar                        chronological                        different═══════════════════════════════════════════════════════════════════════════════════─┘

--- #19 messages/542 ---
═════════════════════════════════════════════════════════──────────────────────────
 if you tell them not to keep your data that just means "don't keep my name on
 my data"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════════─────────────────────────┘

--- #20 fediverse_boost/2965 ---
◀─[BOOST]
  
  i will use CW for #USpol if computer people start using CW for tech computer boring linux software posting. i said what i said  
  
                                                            
 similar                        chronological                        different 
─▶