Removed by mod
ƊƲƘЄƬӇƠƦƖƠƝ
- 3 Posts
- 38 Comments
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Privacy@lemmy.ml•Tired of lame search engines? And don't have friends to share your instance?
1·2 years agoDid you try changing the timeout time value? I think the default is 3 seconds…
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Apple@lemmy.world•iOS 17.5 Lets EU iPhone Users Download Apps From Websites
25·2 years agoSeems like they stonewalled anyone that would want to develop an app.
EU: Allow users to download outside your Store.
Apple: Ok. They just have to register with us two years ago, comply to every spec and be approved by us, and they must have a million installs on our Store last year to qualify.
EU: …that’s not what we meant.
Apple: 😎
100% this. They already got caught sharing your health data with Facebook. Don’t think they (insurance companies)won’t buy DNA data en masse.
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Showerthoughts@lemmy.world•There was a time when the entirety of the internet would have fit onto the device you're currently browsing on.
31·2 years agoAnd they still recommended two 256mb sticks instead of one 512…
OP wanted a Chromium browser that wasn’t a massive privacy invasion. With Google stuff removed, it’ll be good enough. Add uBO and ClearURLs.
What’s wrong with ungoogled-chromium?
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Privacy@lemmy.ml•Degoogling - can someone ELI5 how certain apps work on Graphene OS?
1·2 years agoMaybe TOR uses FF because it’s easier to modify for their purposes.
Others would call that “insecure”
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Privacy@lemmy.ml•adguard vpn selling user data to third-parties?
101·2 years agoThe VPN isn’t generating the requests. Other apps on your device are. Run a VPN for a while and look at data usage by app. I guarantee your VPN app will be the highest (all the other apps data gets funneled through the VPN).
I disagree with the VPN ban, but I understand the purpose.
Isn’t there a better way? Is there a back end that can be added to scan uploads for matching CSAM hashes?
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Privacy@lemmy.ml•Finally got rid of telegram, congratulations to me
405·2 years agoNobody in this entire thread of FUD has posted a single link to support any claim of Russian data intrusion.
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Ukraine@sopuli.xyz•7 more Indians release video, say forced to fight Ukraine war by Russian army
19·2 years agoTomorrow’s news:
7 Indians killed “under mysterious circumstances”
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Privacy@lemmy.ml•If you use Graphene OS, what web browser do you use?
1·2 years agoStop using the DDG Browser.
ƊƲƘЄƬӇƠƦƖƠƝ@lemmy.oneto
Privacy@lemmy.ml•Firefox is not as privacy-friendly as everyone says
1·2 years agoLibrewolf updates all the time, probably weekly (I don’t watch it that closely).
Sentinel dVPN does/did the same thing. You’d connect to their network, pay a Node operator directly with the network’s coin, and you’d use their connection. Don’t know how safe it was, with respect to seeing the through-traffic, but it did work.
These people are definitely not “the first”
I do the same for desktop machines, just to identify immediately without hostnames.




How would this be different from any browser that has Wikipedia search built in?