

This feature is unique to nym as well, as far as I’m aware:


This feature is unique to nym as well, as far as I’m aware:


In simple terms, duckduckgo does not provide meta with this data, but everything around it does (if meta is granted permission to do so). Cookies, browsing history, analytic tools integrated into the sites themselves, device info, fingerprinting. They infer your search through your other activity.
I admit my wording was poorly chosen in my response.


This right here. If you use any of Meta’s services (spyware), you likely granted it permission to rummage through your data. If you have an open browser tab, it can pull info from it.


Cosmos with Carl Sagan
His voice, the vocabulary he used along with the wonder he radiated as he described the amazing things that exist out there. All of it captured my young mind like a fantasy.
I’m getting all warm and fuzzy just thinking about it.


Agreed. I almost exclusively run scripts.


PowerShell isn’t that bad. Yeah I said it.


Look for dell latitudes with 7th and maybe 8th gen Intel CPUs. Those are solid machines that aren’t considered upgradable to win11. They also have removable RAM (DDR4 IIRC) so many can be upgraded to 32GB max.


This is well said. Hadn’t thought of it this way. Makes for a much better experience overall.


I use it. Got the early bird special they’ve been running. It’s pretty good once you get a feel for the exit nodes. It’s much more prone to being blocked by sites like YouTube than other big name VPNs I’ve used, but as time passes it’s getting better. It’s rare I can’t find one that works eventually. No account needed and the mixnet feature are great for the privacy minded.


I probably wouldn’t have said anything if it wasn’t already mentioned.


Just watched this a few weeks ago. I searched for a list of hacker movies and this was one of the very few I hadn’t seen. Pretty good movie overall. Has heist movie vibes. The comparisons to Mr Robot and Fight Club will become apparent in the climax.


Keep your eyes on Linux phone developments. That’s likely where the future lies for any semblance of privacy on a cell phone.
https://itsfoss.com/linux-tablets/
This list is pretty good
I agree, but this comment would hit much harder if you were to provide an alternative solution.
That’s kind of what I meant. Implementing both of those things together on a VPN is unique AFAIK.
I would imagine if you could trust the entry node that would also mitigate a significant amount of risk, no? I’m not deeply knowledgeable on the subject just FYI