That’s the biggest problem. I used to use a suspension service for Chrome that would change your open links to its own format when a tab was suspended. I bookmarked hundreds of links in their format over the years.
The service was bought out by a third party, then sold to a scammer, leading to it getting banned by Google.
I’ve now got hundreds of links that are obfuscated, and the only way to get them back is to manually edit them and see which ones are important.
but in general, if google can’t read it–few eyeballs will ever see it.
You bring up a good point. The Internet is full of spider bots that crawl the web to index it and improve search results (ex: Google). In my case, I don’t want that any comment I post here or on big platforms like Reddit, Twitter or LinkedIn to be indexed. But I still want to be part of the conversation. At least I would like to have the choice wether or not any text I publish online is indexed.
What’s the best way to circumvent phone number verification ? My burner YouTube account, which has nothing unsavory on it, has been marked for phone number verification or else I can’t login at all.
Of course I’m not giving them my real phone number. What the best way to fake this?
Impossible in some countries, like Germany with mandatory ID validaion. Luckily, our Pirate Party leader, a telecommunications expert, blocked this proposal here.
Gigaset. I am using the GS5. 2 Sim slots and a SD card slot, not those Sim/SD slots that most manufacturers use. Replaceable battery.
made is Germany, run stock android. Stock to the point of I have it bugging me to install Oct 2023 patches for the past 2 weeks. Kinka wish I could talk it I will patch when I get back from holidays.
Pixel w/GrapheneOS. Insane to do anything else when Privacy and Security is something you want, while also having the ability to have a fully functional phone.
Media I don’t take as seriously as other backups. Except for a few hard to find ISO’s, I have a Fractal R5 case that I’ve crammed full of all the rando extra drives I have sitting round, and pool those all together in TrueNAS. So far it’s more than the total storage of my media NAS. It gets a monthly backup automatically.
But if Windows is sending all of your data, including stored files and passwords for some third party like its TOS says it can, than that’s Windows breaching your privacy. Or if the remote management hardware that comes with every computer is allowing some third party to access it with more capabilities than even you have, like they are normally designed, than that’s your CPU’s manufacturer breaching your privacy (but those are supposed to be turned off).
You are looking at the wrong place. The TPM is a very standard piece of hardware, that shouldn’t even need firmware (it would completely cancel the entire point of it). It enables a whole lot of shit, but it isn’t the thing that does the shit.
Now, you can go look at the always-on network enabled uncontrollable management unity that exists inside your computer’s processor… Intel pinky swears they can’t access them in any way and will only activate them if you pay extra¹; AMD AFAIK doesn’t even try to say anything.
1 - Makes sense to you? Well, how do they activate it if they can’t access it?
For anyone unfamiliar and wanting more background, and an explanation of why you may see Jewish people add ((( ))) around their own names on social media,
I have a Synology NAS so I use Hyper Backup and upload my backups in the Synology C2 Cloud. Of course all my files are encrypted first before they get uploaded.
When I entered by beta code to get into Bluesky, I was immediately, instantly followed, which doesn’t sound private, an API that lists new accounts?, by funny blogs, photo bomb accounts, and a profile that said, “This is the trans Witch your mother warned you about”.
It’s a …select community that seems at first glance, all in the same think where cogntive reinforcement is the norm.
privacy
Active
This magazine is from a federated server and may be incomplete. Browse more on the original instance.