Skip Navigation

Search

What browser do yall use?

I want to switch to a more privacy focused browser, would like to hear what yall use currently and why.

Edit: I’m currently using edge.

Edit: Thanks everyone for your input. I have decided to go with floorp (a firefox fork) with betterfox. Here's my decision process,

  1. Firefox based browser
    • To help with browser monopoly
    • I really like the sidebery extension
  2. I chose floorp instead of ff or other ff forks because of the ease of customization
    • I also tried zen browser but experienced a bug just from my short usage so I think it's not mature enough for me currently, but I do like the project.
  3. Betterfox + extensions for better privacy settings
    • Ublock Origin
    • ClearURLs
    • Decentraleyes

Did not choose to go with LibreWolf, Mullvad etc because I'm worried about site breakages.

137

Bringing attention to a music player and two eBook readers for Android

I didn't want to make two separate posts for these, so I am combining them into one. The two hardest apps to find for Android were a music player capable of playing local files, and an ebook reader with a nice design. With some help from the community, I was able to find nice apps for both of those. All apps here are available to install via Obtainium. My goal here is to raise awareness for some unknown but high quality apps that I have found.

Music player: VLC

Credit: @[email protected], @[email protected], @[email protected]

I have tried plenty of music players, and most of them are either copies of each other, are lacking in features, or are just plain buggy. Despite what I expected, VLC is actually the best choice in this category.

Besides being a must-have in general, VLC actually has fantastic support for music management. It has plenty of customization, however I found that the Black theme did not work. Besides that, it has support for folders, creating playlists, playback history, albums, artists, genres, shuffling, queue management, equalizers, sleep timers, playback speed, A-B repeat, and so much more. It is honestly exactly what I was looking for, with a sleek UI and very feature packed. It's nothing like the desktop app.

eBook reader: Book's Story

It was a struggle to find an eBook reader with nice usability. I managed to find two that are very promising. One such reader is Book's Story.

Book's Story offers a completely offline experience to managing and reading eBooks. It's what I would want if I were to code an eBook reader, with a nice Material design and a minimalistic layout. However, there are things I don't like about it. For starters, it doesn't correctly read my eBooks. That's honestly disappointing, since that means the app is currently dysfunctional, but I am including it in this list because I have high hopes for it. There is also no page turning view, which isn't bad, but it's a feature I look forward to. Overall, I don't currently recommend using this, but in the future I can easily see it becoming one of the best eBook readers out there.

eBook reader: Myne

Unlike Book's Story, Myne is able to read all of my eBooks just fine. Myne is an even more polished eBook reader, also with support for downloading eBooks from the internet in the app.

It too lacks in a page turning view, and doesn't allow you to customize which screen is your default. The second one is slightly annoying because if you are offline and open the app the first thing you see is a 404 page. You can still view your offline ebooks, of course, but it would be nice to select which page is the default. Furthermore, while it was able to read my eBooks well enough, there are still a few minor HTML artifacts visible in the book. If I was able to merge the layout of Book's Story with the design and functionality of Myne, it would become the perfect eBook reader.

I'd love to see where both of these projects go, and even in their current state they beat some of the most popular eBook readers in my opinion, such as Librera and KOReader.

9

If you use Instagram/Facebook/Messenger, check the "off Meta technologies" section. Your other apps may be sending data without you knowing

Even if you don't enter data into Facebook/Meta directly, they may be getting data from other games/music apps/etc.

How to check

  • Navigate to the Accounts Center menu.
    • Instagram: open your profile page > 3 bar menu > Settings > Accounts Center
    • Messenger: 3 bar menu > gear icon > scroll to bottom > Accounts Center
  • Your information and permissions
  • Your activity off Meta technologies

There should also be an option for Manage future activity

---

I use some apps to communicate with family, and clearly my privacy protections weren't as good as I thought they were. I set things up a long time ago, so I imagine something changed since then.

I'm considering of either sending the apps to the work profile, or switching to only using them in the browser. If it's because I connected my account to the other service at some point, I don't know how to sever that connection now aside from dropping that other game/app/service

46

I just started caring about my own privacy. What apps should i get rid of, why and what can i replace it with?

!

!

!

!

35

Samsung Gallery app is scanning my photos and creating stories without permission

I am using a Samsung phone and even with all privileges deactivated it creates "stories". This seems illegal. What is your opinion?

I know I should use a different OS than stock or even another phone brand but this is what I currently have.

!

!

11

I need a new phone but I want to do this right

(Please when answering, assume I’m not a beginner at privacy/programming :) I know where the good stuff at)

First off, shameful confession: I’m writing this on a dying yellow iPhone XR I bought second-hand three years ago (189€). I absolutely love the look of it: the screen, build quality, are all amazing. The only problem was the locked ecosystem (sideloading Spotify/Torrent client was sooo hard).

I saw the android phone of my mother dying really fast. She currently has a Xiaomi phone that’s ridiculously big for my hands, there’s advertisements in the stocks apps (?!!), the UX is janky and everything. It looks like a bloat, privacy nightmare.

So… because it’s impossible to find a jailbreakable phone nowadays I need to buy an android and ideally I would want:

  • Good screen (vivid colors)
  • Good build quality (not shitty plastic)
  • Don’t care about the camera (I don’t want those ridiculously big cameras they make nowadays)
  • Would want to install either GrapheneOS/LineageOS

The things that scare me off:

  • I really need my bank app and I need it updated so I have to use Google Play Services but I don’t want it to plague my phone with privacy bullshit (I want to be degoogled)

The things that excite me:

  • Customization possibilities
  • Learning experience
  • Even more privacy than a de-googled IOS phone :)
  • F-Droid!! (Maybe I’ll find a beautiful IRC client)
  • More choices for Mastodon & Lemmy clients
  • Freedom of free software.
  • client for open-source git providers :)

But to get all of that, I don’t want Google, I need shitty apps (non-free software) I have to install:

  • Instagram (for non-technical friends)
  • GitHub (job & open-source)
  • No-Ad Modded Spotify from Balatan
  • Discord (gamer friends)
  • Telegram (cryptobros friends)
  • Steam (because I still love gaming)

Any advices? Phone ideas? I’m so lost in this ocean of choice (freedom ✨)

My current phone:

!

!

69

Finally resolved: Recovering data after wiping metadata is actually possible, but I need you help with some info

I need to ask a small favor from the good people of Lemmy.ml Community.

In short, I accidentally wiped the metadata partition on my Poco F3 and now I can't boot into the OS and access my data. I have a lot of pictures, videos and other stuff that I would hate to lose, because of a mistake. But all that is still on the phone, I just can't boot the phone to access it.

Thankfully, there is a way to fix this by creating a full backup of the phone with adb, then using a HEX Editor to manually look through that gigantic file and try to find the files that were in that metadata partition.

A huge thanks to bluet33th, a user from XDA Forums, without whom I would be helpless and couldn't do any of this. It might be a bit complicated and manual process, but it is possible. He explained everything in great detail here, so check it out, especially if you are facing the same problem, this will help you tremendously: https://xdaforums.com/t/how-to-recover-data-if-metadata-partition-was-deleted.4686789/

In order to find these files and put them back where they belong, I need your help, because I have to know their names, exact sizes and at least part of their content, so that I can search for it. Because I'm searching for a specific text in a text file that is 128 GB in size.

I have already tried this on another Xiaomi phone, to make sure this procedure works on Xiaomi phones and it does, but that phone had HyperOS with Android 14 and since every phone and android version is probably different, in order to be sure, I need this information specifically for Poco F3 with Android 13.

It doesn't take long, but if you don't have the time to look inside your metadata partition and tell me which files are inside of that partition and their sizes in bytes, you can just make a backup of the metadata partition and sent it to me, and I'll do the rest of the work.

Here are the steps on how to create a backup:

  1. Turn on your phone and boot into TWRP, then connect your phone to a PC, type cmd inside Windows search and run cmd, then position cmd into your platform-tools folder (if you flashed your ROM, you should already have the necessary drivers installed for the next steps to work). For example, if your platform-tools folder on Windows is inside C:\platform-tools, all you need to type into cmd is: cd C:\platform-tools

You can also just go inside your platform-tools folder and type cmd in the address bar and the cmd will start already positioned inside that folder.

  1. Then type adb devices and you should see your device, if you do, that means that all the drivers are successfully installed and your phone is detected.

!

  1. Type adb pull /dev/block/by-name/metadata

!

  1. After that, you should see a file named metadata inside C:\platform-tools. That is the file that I'm looking for and as you can see, it takes just a few minutes to get it.

You can skip the next steps (5 and 6), but I'll explain them, just in case someone wants to extract these files for themselves, so that you have them in case something like this happens to you. Of course, you can also proceed to extract the files and tell me their names and sizes.

Here is what you need to do:

  1. Extract the content of the metadata file, you can use a software like 7-Zip. Go inside that extracted folder, then into vold > metadata_encryption > key

  2. Inside of that key folder, you should see a few files. These are the important files and save them somewhere safe in case you ever need them. Since I don't have them anymore, in order to recreate them, I need to know their exact names and sizes in bytes. You can check the size of every individual file by right clicking on the file and choosing Properties. Then look under Size, not Size on disk, and in parenthesis, you should see the size in bytes.

!

Please, if you could check the size of every file and write down which file has what size. I would really appreciate it.

I'm specifically looking for someone who has a Poco F3 with Android 13 and MIUI, because I'm not sure if HyperOS changed something, so maybe the number of files or their size is different. But feel free to post the information even if you have HyperOS, but please mention that, so that I am aware of it.

Thanks a lot for your help, it really means a great deal.

1

Company creates "solution" to address school "vaping incidents".

Some of the LinkedIn Responses are direct and on-point, and also hilariously/depressingly based depending on how you look at it:

!

!

EDIT: In hindsight, I think I should've looked into posting this in a different community.. It's closer to a silly "innovation".. soo.. is this considered FUD? I also don't support smoking or vaping, especially among kids. Original title had "privacy-violating" before the "solution".

271

PSA: Git exposes timezone metadata

Git records the local timezone when a commit is made [1]. Knowledge of the timezone in which a commit was made could be used as a bit of identifying information to de-anonymize the committer.

Setting one's timezone to UTC can help mitigate this issue [2][3] (though, ofc, one must still be wary of time-of-day commit patterns being used to deduce a timezone).

References
  1. Git documentation. git-commit. "Date Formats: Git internal format". Accessed: 2024-08-31T07:52Z. https://git-scm.com/docs/git-commit#Documentation/git-commit.txt-Gitinternalformat. > It is <unix-timestamp> <time-zone-offset>, where <unix-timestamp> is the number of seconds since the UNIX epoch. <time-zone-offset> is a positive or negative offset from UTC. For example CET (which is 1 hour ahead of UTC) is +0100.
  2. jthill. "How can I ignore committing timezone information in my commit?". Stack Overflow. Published: 2014-05-26T16:57:37Z. (Accessed: 2024-08-31T08:27Z). https://stackoverflow.com/questions/23874208/how-can-i-ignore-committing-timezone-information-in-my-commit#comment36750060_23874208. > to set the timezone for a specific command, say e.g. TZ=UTC git commit
  3. Oliver. "How can I ignore committing timezone information in my commit?". Stack Overflow. Published: 2022-05-22T08:56:38Z (Accessed: 2024-08-31T08:30Z). https://stackoverflow.com/a/72336094/7934600 > each commit Git stores a author date and a commit date. So you have to omit the timezone for both dates. > > I solved this for my self with the help of the following Git alias: > > ``` > [alias] > co = "!f() { \ > export GIT_AUTHOR_DATE=\"$(date -u +%Y-%m-%dT%H:%M:%S%z)\"; \ > export GIT_COMMITTER_DATE=\"$(date -u +%Y-%m-%dT%H:%M:%S%z)\"; \ > git commit $@; \ > git log -n 1 --pretty=\"Autor: %an <%ae> (%ai)\"; \ > git log -n 1 --pretty=\"Committer: %cn <%ce> (%ci)\"; \ > }; f"

---

Cross-posts:

  • https://sh.itjust.works/post/24495744
  • https://sh.itjust.works/post/24495795
16

Increase privacy by using nginx as a caching proxy in front of a map tile server

pierre-couy.dev Increase privacy by using nginx as a caching proxy in front of a map tile server

A tutorial featuring two examples showing how you can increase your privacy using nginx to proxy third-party services.

Increase privacy by using nginx as a caching proxy in front of a map tile server

This is a guide I wrote for Immich's documentation. It features some Immich specific parts, but should be quite easy to adapt to other use cases.

It is also possible (and not technically hard) to self-host a protomaps release, but this would require 100GB+ of disk space (which I can't spare right now). The main advantages of this guide over hosting a full tile server are :

  • it's a single nginx config file to deploy
  • it saves you some storage space since you're only hosting tiles you've previously viewed. You can also tweak the maximum cache size to your needs
  • it is easy to configure a trade-off between map freshness and privacy by tweaking the cache expiration delay

If you try to follow it, please send me some feedback on the content and the wording, so I can improve it

13

Chat control is back on track.... again

Chat control is back on the agenda again and the works is kept in secret.

Link to document

Take Action!

Edit: More information about the meeting

122

AOSP with MicroG vs Nextdns with good lists

AOSP with MicroG vs Nextdns with good lists

How better is AOSP or Graphene OS with MicroG or Sandboxed google services compared to just using NextDNS with some good filters. I mean microg or graphene os will still connect to internet for google stuff I use. Also I can block internet access for a domain using NextDNS which is quite similiar to cutting network access in graphene OS. So how come stock android with NextDNS is less private than MicroG/GrapheneOS. @privacy

4
www.techzine.eu Mozilla removes telemetry service Adjust from mobile Firefox versions

Mozilla will soon remove its telemetry service Adjust from the Android and iOS versions of browsers Firefox and Firefox Focus. It appeared that the

Mozilla removes telemetry service Adjust from mobile Firefox versions

For Android users seeking a privacy-focused browser, Privacy Guides recommends Mull: >Mull is a privacy oriented and deblobbed Android browser based on Firefox. Compared to Firefox, it offers much greater fingerprinting protection out of the box, and disables JavaScript Just-in-Time (JIT) compilation for enhanced security. It also removes all proprietary elements from Firefox, such as replacing Google Play Services references.

>Mull enables many features upstreamed by the Tor uplift project using preferences from Arkenfox. Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid.

15

Telegram founder’s arrest is radical — if it’s a crime to build privacy tools, there will be no privacy

www.crikey.com.au Telegram founder's arrest is radical — if it's a crime to build privacy tools, there will be no privacy

Pavel Durov's arrest suggests that the law enforcement dragnet is being widened from private financial transactions to private speech.

Telegram founder's arrest is radical — if it's a crime to build privacy tools, there will be no privacy

>Pavel Durov's arrest suggests that the law enforcement dragnet is being widened from private financial transactions to private speech.

>The arrest of the Telegram CEO Pavel Durov in France this week is extremely significant. It confirms that we are deep into the second crypto war, where governments are systematically seeking to prosecute developers of digital encryption tools because encryption frustrates state surveillance and control. While the first crypto war in the 1990s was led by the United States, this one is led jointly by the European Union — now its own regulatory superpower.

>Durov, a former Russian, now French citizen, was arrested in Paris on Saturday, and has now been indicted. You can read the French accusations here. They include complicity in drug possession and sale, fraud, child pornography and money laundering. These are extremely serious crimes — but note that the charge is complicity, not participation. The meaning of that word “complicity” seems to be revealed by the last three charges: Telegram has been providing users a “cryptology tool” unauthorised by French regulators.

98

Zen Browser | Privacy focused, open-source, Firefox Fork

zen-browser.app Zen Browser

Download now and experience the Zen Browser

Just stumbled upon this project, seems rather new as my DNS blocked its domain by default for being too new hehe.. Anyone had a chance to try it yet? Its got some hefty promises, like having equally strong privacy features as Librewolf. I'll be giving it ago at least, almost sounds a bit too good to be true...

!

64

Please talk me down: "I'm just doing my job" is the new "I was just following orders".

The only thing worse than an echo chamber is letting a self-created bad idea fester in the head.

I came to the conclusion a few months ago that software developers and coders who worked at Meta, Google, Amazon, etc are as culprit as their CEOs and the company itself. I will lay down my points below, but I understand that this might be a logical extreme of my distaste for these corporations.

Here's my rationale:

  1. Actions of the company they serve: The corporations they serve actively disenfranchise users, track them, sell their private / personal information to unscrupulous parties without any care on how it affects the person, or the society. They thrive on engagement rather than content. They have "commodified" the fundamental right to privacy. This has real world implications that has directly resulted in the spread of misinformation, political unrest, threatened elections, riots, and deaths of thousands of people.
  2. Awareness of the consequences: By virtue of their position, these are people with the capacity to read, and think for themselves. There are news articles: across the political spectrum in all major news sites, that report how the platform/ company they serve negatively affects society. Facebook's Cambridge Analytica fiasco, Snowden's expose, etc are credible and well documented examples that even non-tech people are aware. Yet they choose to ignore all this, and continue working / seek to join these companies.
  3. Cowardice: It is often wrapped in the garb of "self-interest", but they do not raise their voice when they know that the software and platform they're told to develop is going to be used to spy on their brethren. They claim they're trying to make a living, but can use their skills to develop counter products to these horrible companies, or work for those that are sensitive and conscientious towards customer's needs and welfare.
82

: Is it really that easy to hack someone's Discord? Is it the same with: Telegram, Twitter, facebook ...ect ? and does this work if I'm accessing Discord through Firefox ?

!

35

NSA Asked Linus Torvalds To Install Backdoors Into GNU/Linux

falkvinge.net NSA Asked Linus Torvalds To Install Backdoors Into GNU/Linux

The NSA has asked Linus Torvalds to inject covert backdoors into the free and open operating system GNU/Linux. This was revealed in this week's...

NSA Asked Linus Torvalds To Install Backdoors Into GNU/Linux

repost from: https://falkvinge.net/2013/11/17/nsa-asked-linus-torvalds-to-install-backdoors-into-gnulinux

58

> Google's campaign against ad blockers across its services just got more aggressive. According to a report by PC World, the company has made some alterations to its extension support on Google Chrome.

> Google Chrome recently changed its extension support from the Manifest V2 framework to the new Manifest V3 framework. The browser policy changes will impact one of the most popular adblockers (arguably), uBlock Origin.

> The transition to the Manifest V3 framework means extensions like uBlock Origin can't use remotely hosted code. According to Google, it "presents security risks by allowing unreviewed code to be executed in extensions." The new policy changes will only allow an extension to execute JavaScript as part of its package.

> Over 30 million Google Chrome users use uBlock Origin, but the tool will be automatically disabled soon via an update. Google will let users enable the feature via the settings for a limited period before it's completely scrapped. From this point, users will be forced to switch to another browser or choose another ad blocker.

Archive link

187

Use a password manager

It is truly upsetting to see how few people use password managers. I have witnessed people who always use the same password (and even tell me what it is), people who try to login to accounts but constantly can't remember which credentials they used, people who store all of their passwords on a text file on their desktop, people who use a password manager but store the master password on Discord, entire tech sectors in companies locked to LastPass, and so much more. One person even told me they were upset that websites wouldn't tell you password requirements after you create your account, and so they screenshot the requirements every time so they could remember which characters to add to their reused password.

Use a password manager. Whatever solution you think you can come up with is most likely not secure. Computers store a lot of temporary files in places you might not even know how to check, so don't just stick it in a text file. Use a properly made password manager, such as Bitwarden or KeePassXC. They're not going to steal your passwords. Store your master password in a safe place or use a passphrase that you can remember. Even using your browser's password storage is better than nothing. Don't reuse passwords, use long randomly generated ones.

It's free, it's convenient, it takes a few minutes to set up, and its a massive boost in security. No needing to remember passwords. No needing to come up with new passwords. No manually typing passwords. I know I'm preaching to the choir, but if even one of you decides to use a password manager after this then it's an easy win.

Please, don't wait. If you aren't using a password manager right now, take a few minutes. You'll thank yourself later.

304
Arguments why Telegram is not a good idea for anyone
  • Lemmy thread and link.

    Basically, anyone who can read your home directory could decrypt your Signal database. That's about typical of traditional desktop applications, but questionable for security-oriented software. Mac OS and (sometimes) Linux have more robust credential management options, and Signal signaled (yes, pun intended) its intent to adopt them.

  • German police raid Tor-linked group in bid to uncover Tor network users
  • It's possible that this raid was connected to a current police operation to arrest users of a darknet child abuse website.

  • Switched to GrapheneOS today
  • @swamptin @PullPantsUnsworn Sorry... I don't use my phone for banking :^(

  • Is StormyCloud the only I2P outproxy?
  • You can do multihoming, might be the easiest thing to do for a service: https://geti2p.net/spec/proposals/140-invisible-multihoming

    Multihoming is a pretty simple way of load balancing and i think the way it works is the first router to respond is the one that's used. So ideally the one used by any given client should be the most responsive i2p router.

    It's also used to place i2p routers hosting a service in multiple places so it makes correlation attacks (ex downtime at exact time of a known electric outage in an area) more difficult.

    Backend setup for your service

    If we have a service like an http proxy service or a website available on port 6000, and 2 i2p routers, they'd both need access to that port. An outproxy may do this with port forwarding from a clean outernet connection(s) going through their proxy setup ex privoxy/haproxy/tinyproxy dns. They're less worried about correlation attacks so the routers may be all or mostly in one area using port forwarding over lan or VM's. A website that's concerned about correlation attacks may have separate instances of the website running on each router in different areas, with the website's backend syncing with the other routers in the background through other methods such as an encrypted lease-set.

    Router setup

    Each router needs the same exact key for the actual .i2p address. The easy way to do this is in the java router (i2p+ is good for this, install guide/official site go to service tunnels > make new server http tunnel, enter the port 6000, give it a name like "Outproxy", private key file a name like "outproxy.dat" and make sure optimize for Multihoming is on.

    Other recommended additions in your tunnel config

    • Automatically start tunnel: on
    • 16 tunnels in/out (maximum): 3 hops for good anonymity, outproxies not concerned with their own anonymity could reduce this for more performance.
    • Reduce tunnels to conserve resources: idle period 15-20 minutes, reduced count: low number like 2-3. This usually works well since the tunnels can be built back in an order of ms's on a good i2p router and not wasting resources keeping them open. It could introduce a slight delay though. High traffic situations might make sense to leave that off.

    Then save and start, key file is generated.

    Copy key file and a tunnel config file

    Locations for .config file and key (.dat):

    /i2p/.i2p/outproxy.dat

    /i2p/.i2p/i2ptunnel.config.d/XX-outproxy-i2ptunnel.config

    Then copy the key and config files to the other i2p routers in the same locations. Shouldn't need to go through setup with the config file present. Most important is it has the same key file, so they'll all use the same address.

  • Exposed: How Israeli Spies Control Your VPN
  • I wouldn’t trust anything at MB/FC. I trust Alan Macleod’s work, though. If you want to actually understand the media, he wrote a book on it: Propaganda in the Information Age: Still Manufacturing Consent.

  • Ethernet port being used while PC is turned off?
  • And always use proper protection when surfing online

  • Zen Browser Opinions
    • So far this is the only discussion about its privacy ...

    • I'm currently using it as a daily driver on PC ( switched from Mercury browser ) and even though it's still in Alpha , it works fine and I didn't face any problems with it

  • Is StormyCloud the only I2P outproxy?
  • It does, qbittorrent support is still "experimental" though. i2psnark and biglybt will outperform it.

    If you can run i2p on your seedbox could do it. Simple enough on a plain vps. If i remember correctly though i thought the web interface doesn't (or didn't) support i2p stuff, only gui. Haven't used qbittorrent in a while.

    I'm aware mostly of where to find this info from within i2p:

    I2p wiki- filesharing

    http://wiki.i2p-projekt.i2p/wiki/index.php/Filesharing_and_I2P

    Filesharing forum

    http://discuss.i2p

    Guides:

    How to correctly download torrents from Clearnet using I2PSnark.pdf

    http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=66113

    [TUTORIAL] How to correctly cross seed to make Clearnet torrents available for I2P Network in Postman tracker.pdf

    http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=65809

    [TUTORIAL] How to use I2P in qBittorrent

    http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=72171

    Correct BiglyBT settings for Ultra Fast I2P torrenting.pdf

    http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=66500

    there's irc in i2p, irc isn't everyone's favorite way to do messaging...but it's a good way to get answer to questions from people that know more than i do. i2p folks have a good amount of distrust for the clearnet so some of them stay away from it.

  • Anonymous Torrenting With I2P
  • Reporter: [REDACTED]
    Reason: piracy

    😂 you-wouldnt-steal-a-car.png

  • Ethernet port being used while PC is turned off?
  • I don't know enough about ethernet switches to know if this is common. Though, reading their comment again, I don't really think I'm right about their statement. It's definitely a light that is frequently designed to be on when packets are still being accepted for waking the computer.

    I don't have a background in CE, but I've seen people claim this is sometimes a design used in the past. I think it makes sense that a circuit that is controlled by the computer can be hard wired to turn on both a light and a ethernet port. Though, I don't know how common this design is in reality.

    edit: After searching some, it looks like some port lights can be controlled by a driver. I still think it probably depends on the hardware design though, and this won't be consistent between ports.

  • What browser do yall use?
  • Cromite is a good brave alternative without crypto, built-in adblocking, secure defaults (better security hardening), and cross-platform (Linux, Windows, Android). Best experience is on Android. Cromite is an actively updated fork of Bromite, released by a former contributor of Bromite. Cromite also comes without any proprietary libraries on Android (unlike Brave, Mulch, or Vanadium).

  • What browser do yall use?
  • @EherNicht

    Based on their website i don't see how.

    Firefox with ublock (blokada on mobile), do not track, a few settings tweaks, and using ddg or startpage for search seems to be pretty much what librewolf is.