Ahaha we’ve got you now!
Ahaha we’ve got you now!
That doesn’t sound safe. I hope you sent this message with your phone. If you did it from the old computer and happen to have valuable data please feel free to share your IP address, someone might appreciate it…
I personally enjoy knowing that the communities I’m a part of are decentralised and don’t exist to show me ads. I also like being able to use an open source app to access them.
This is why I don’t like Reddit and wouldn’t call this a clone.
Honestly I think an emulation would be a better analogy.
Then perhaps the qualification to be a Trekkie should be watching the original series. We’ll loose the VFX loving pew pew people.
Searxng throws together results from different engines as far as I know.
Not sure how a federated search engine would work though.
Edit: hash0772 (is there a correct way address someone’s username on Lemmy?) already mentioned this but it’s generally best to use an existing instance, there’s also some on tor. (they obviously still only search the clearnet)
At least FOSS doesn’t try this. At least not as part of the program (I think there’s some childish behaviour from devs but generally it doesn’t make it to the code).
I’m guessing it’s the one on the left that’s new.
Tor acts as a proxy Tor browser is shipped with tor but using a different port. Tor is not the browser.
So as long as you set up what you want to use with tor and remember to start it, it should work. Otherwise I’m sure you could setup a pi or local server to route everything through tor if you wanted to.
Edit: I believe the tor network is a VPN though. Your data is sent privately through the virtual tor network. Not all VPN connections have to work the same, after all Hamachi is also a VPN.
Fair enough
Signal published their reply to a court subpoena that was funny.
Tor doesn’t because the server that you contact passes it to another and encrypts the data further the exit node can then decrypt it and perform the web request on your behalf without knowing where it’s coming from.
If you care about privacy you should use tor/the tor network:
I’d like to see them find out why a server crashes if that is true. If someone actually cares and knows enough I think an admin or someone from the government could determine a lot of browsing data and link it with users just through the DNS cache and time. I’m also very sure they have some kinds of logs, even if they don’t log what each user is doing.
It’s just practice is what I tell myself. One day you might need something to scale and then you’ll regret it not having made it scalable. If you have a previous project to copy that’s probably good too.
Huh I always thought most people got that somewhere in their head…
Wait why didn’t they keep unpacking the recursive acronym further? GNU’s Not Unix’s Not Unix’s Not Unix’s Not Unix I’d say that’s a pretty good amount although if there’s a mathematical way of formulating the unpacking of acronyms in a text I’d like to see the that repeated until infinity.
The “an” was the only thing not capitalized.
You’ve got make sure you program the time machine correctly though…