Removed by mod
ƊƲƘЄƬӇƠƦƖƠƝ
- 3 Posts
- 33 Comments
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Privacy@lemmy.ml•Tired of lame search engines? And don't have friends to share your instance?1·1 year agoDid you try changing the timeout time value? I think the default is 3 seconds…
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Apple@lemmy.world•iOS 17.5 Lets EU iPhone Users Download Apps From Websites25·1 year agoSeems like they stonewalled anyone that would want to develop an app.
EU: Allow users to download outside your Store.
Apple: Ok. They just have to register with us two years ago, comply to every spec and be approved by us, and they must have a million installs on our Store last year to qualify.
EU: …that’s not what we meant.
Apple: 😎
100% this. They already got caught sharing your health data with Facebook. Don’t think they (insurance companies)won’t buy DNA data en masse.
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Showerthoughts@lemmy.world•There was a time when the entirety of the internet would have fit onto the device you're currently browsing on.31·1 year agoAnd they still recommended two 256mb sticks instead of one 512…
OP wanted a Chromium browser that wasn’t a massive privacy invasion. With Google stuff removed, it’ll be good enough. Add uBO and ClearURLs.
What’s wrong with ungoogled-chromium?
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Privacy@lemmy.ml•Degoogling - can someone ELI5 how certain apps work on Graphene OS?1·1 year agoMaybe TOR uses FF because it’s easier to modify for their purposes.
Others would call that “insecure”
You’re wasting your time. Internet Commies skipped/haven’t read the source material
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Privacy@lemmy.ml•adguard vpn selling user data to third-parties?101·1 year agoThe VPN isn’t generating the requests. Other apps on your device are. Run a VPN for a while and look at data usage by app. I guarantee your VPN app will be the highest (all the other apps data gets funneled through the VPN).
I disagree with the VPN ban, but I understand the purpose.
Isn’t there a better way? Is there a back end that can be added to scan uploads for matching CSAM hashes?
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Privacy@lemmy.ml•Finally got rid of telegram, congratulations to me405·1 year agoNobody in this entire thread of FUD has posted a single link to support any claim of Russian data intrusion.
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Monero@monero.town•The case for dropping old blocks to keep Monero blockchain size under control and future proof5·1 year agoI disagree with the idea that one commenter opined: “Monero is not a savings account”.
Who are you to tell me what to do with my XMR?
That being said, I am not opposed to the idea of implementing some kind of condensing/snapshot that some have outlined here.
The question I’d ask is if it would ever be possible for someone to use that data maliciously?
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Privacy@lemmy.ml•If you use Graphene OS, what web browser do you use?1·2 years agoStop using the DDG Browser.
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto Privacy@lemmy.ml•Firefox is not as privacy-friendly as everyone says1·2 years agoLibrewolf updates all the time, probably weekly (I don’t watch it that closely).
Sentinel dVPN does/did the same thing. You’d connect to their network, pay a Node operator directly with the network’s coin, and you’d use their connection. Don’t know how safe it was, with respect to seeing the through-traffic, but it did work.
These people are definitely not “the first”
How would this be different from any browser that has Wikipedia search built in?