I sounds like you suffer from internalized proprietary.
I sounds like you suffer from internalized proprietary.
To clarify, the term news to me translates to an organization whose purpose is to interpret events that could otherwise be better observed by going to primary sources oneself.
I don’t pay attention to news sources.
Ask her what her favorite steam locomotive engine is.
Get upset when she gives the wrong answer.
Erupt into a heated diatribe about the necessity of good boiler design and make sure she knows why she isn’t allowed to be friends with you.
Yell something unintelligible at her son on the way out.
If she still comes back to you later, then you know you’ve found a keeper.
Minimum requirements to run hello world
in Java
I meant to, but was rudely interrupted by a skeleton swordsman this morning.
My client is configured to reject all non-encrypted peer connections. It sacrifices some potential seeds but is worth the added defense in depth if ever my VPN fails catastrophically. Openvpn client to an obscure VPN service. All media gets passed through clamAV before being accessed.
While on the hunt for treasure, my browser is configured to send DNS traffic over Tor. All web pages only get to load HTML and images, and they (torrent sites) remain perfectly functional without anything else. DDG search with the old tricks ‘1080p’, ‘full’, ‘HEVC’, ‘x264/x265’, ‘ep0_/se0_’, ‘.mkv’ and so on.
I rotate my treasure chests between ships.
I never believed in power outages until I came face to face with one
Settings templates with user.js are Firefox’s saving grace.
Best of luck on your 'nix journey.
I2P eepsite
Web browsers are beginning to feel that way these days.
Routers: anything supported by OpenWRT.
Apparently the ISP modem-routers being supplied these days have virtual assistants embedded (you vill use our spyware and you vill be happy!).
Banjo
His younger sister will be Kazooie
Whole home cleansing. They send a guy out quarterly who assesses each room and blows sage around hot spots. My home isn’t very active but I sleep better at night knowing that there aren’t dark energies in risk corridors.
Horses were domesticated some 6000 years ago. I feel so old!
With all the suffering that they’ve been inflicting upon Windows serfs, he’s more than earned it. If it were up to me, I’d up his pay tenfold. I can’t wait to see what MS has in store for the tech cattle in 2025!
Privacy Badger has historically allowed tracking until it successfully identifies a domain as a likely tracker. Like the air bags going off after you’ve already wrapped your car around a telephone pole. But it’s now been changed and is now closer to a list-based tracker blocker (enumerate badness):
They’ve since corrected one of the core issues with PB by doing so, but it still it is very weak. To see why, please glance through The Six Dumbest Ideas in Computer Security.
uBlock Origin in advanced mode, with default-deny rules (only allow assets by exception) is going to be much stronger at blocking crap.
Personally, I use uMatrix with pretty much all asset classes blocked by default. I never see popups. I never see banners begging “please allow our cookies, pleeeeaaase!”.
Because I frequently use mpv, yt-dlp or a combination of both, the value I find in Invidious is in being able to conduct video searches against Youtube. And luckily that still works on public instances.
The approach once worked, but that was back before browsers began including the likes of things like advertiser IDs and other extremely high entropy attributes that no average person would ever think to disable. Contemporary hide-in-the-crowd strategies are mostly curated within efforts like Tor browser where everyone is encouraged to use the exact same configuration. But then it’s still a numbers problem. If only two attendees decide to hide their faces with party masks to a soiree of 100 people, one (large scale observer) only need check the guest list and use process of elimination to determine the identities of the 2% “hidden” attendees.
Somebody can, and probably will, come along and refute this assessment. I am not entirely convinced myself that it is a losing strategy yet. I’m open to hear opposing takes.
Privacy Badger: IIRC Privacy Badger operates by logging third party domains connections on a per-site bases, and only begins to actively block connections once a domain seen across multiple visits fits the profile of a likely tracker.
Nvrmnd, they’ve changed how PB works and it is now closer to a list-based tracker blocker (enumerate badness):
So they’ve since corrected one of the core issues with PB. Still it is weak. To see why, please glance through The Six Dumbest Ideas in Computer Security.
uBlock Origin in advanced mode, with default-deny rules (only allow assets by exception) is going to be much stronger at blocking crap.
Personally, I use uMatrix with pretty much all asset classes blocked by default. I never see popups. I never see banners begging “please allow our cookies, pleeeeaaase!”.
Ah, the beginner loadout.
Actually, your kids will be taught dependency on proprietary corporate software that spies on them and conditions them into corporate vendors walled gardens in order to a create lifelong customers (+ data mining sources) in order to enrich giant tech corporations.
Ideally, your kids would be taught genuine computer literacy so that they can be digitally self sufficient but that is never going to happen in a school setting.
Here’s an unrelated picture of a North American wood ape: