Skip Navigation

ƊƲƘЄƬӇƠƦƖƠƝ
ƊƲƘЄƬӇƠƦƖƠƝ @ dukethorion @lemmy.one
Posts
3
Comments
35
Joined
2 yr. ago

  • How would this be different from any browser that has Wikipedia search built in?

  • Did you try changing the timeout time value? I think the default is 3 seconds...

  • Seems like they stonewalled anyone that would want to develop an app.

    EU: Allow users to download outside your Store.

    Apple: Ok. They just have to register with us two years ago, comply to every spec and be approved by us, and they must have a million installs on our Store last year to qualify.

    EU: ...that's not what we meant.

    Apple: 😎

  • 100% this. They already got caught sharing your health data with Facebook. Don't think they (insurance companies)won't buy DNA data en masse.

  • OP wanted a Chromium browser that wasn't a massive privacy invasion. With Google stuff removed, it'll be good enough. Add uBO and ClearURLs.

  • What's wrong with ungoogled-chromium?

  • Maybe TOR uses FF because it's easier to modify for their purposes.

    Others would call that "insecure"

  • The VPN isn't generating the requests. Other apps on your device are. Run a VPN for a while and look at data usage by app. I guarantee your VPN app will be the highest (all the other apps data gets funneled through the VPN).

  • I disagree with the VPN ban, but I understand the purpose.

    Isn't there a better way? Is there a back end that can be added to scan uploads for matching CSAM hashes?

  • Nobody in this entire thread of FUD has posted a single link to support any claim of Russian data intrusion.

  • Young progressive activists still believe Biden gives a shit about them?

    He doesn't even remember where he is half the time, and the other half he's making sure the military-industrial machine keeps rolling.

  • Lemmy.world Support @lemmy.world

    Can't post on LW with LW account

  • Librewolf updates all the time, probably weekly (I don't watch it that closely).

  • Sentinel dVPN does/did the same thing. You'd connect to their network, pay a Node operator directly with the network's coin, and you'd use their connection. Don't know how safe it was, with respect to seeing the through-traffic, but it did work.

    These people are definitely not "the first"

  • I do the same for desktop machines, just to identify immediately without hostnames.

  • Privacy Guides @lemmy.one

    Google DRM / WEI

    Futurama @lemmy.world

    Crimes of the Hot