zaplachi

@zaplachi@lemmy.ca
0 Post – 11 Comments
Joined 13 months ago

Many CSAM detecting services already use image hashing to compare to a central database.

https://www.thorn.org/blog/hashing-detect-child-sex-abuse-imagery/

You can use the WebKit (Safari’s engine) wrappers made by Firefox and Chrome - but can’t use truly independent browsers

Something something Skyrim horse armor something something….

Well it sure is a good thing they are making everything smart nowadays….

But seriously I can’t believe how fast the car industry locked previously free features behind a subscription

What about rogers center? Or even Roger’s place?

God there are so many of them

Does anyone know if there is a nottheonion community on lemmy?

Just wanted to add this link explaining how to use tunnels in a more privacy respecting way

https://help.nextcloud.com/t/is-cloudflare-tunnel-safe-privacy-focused/150268/2

Problems with TLS (free option of routing on cloudlfare tunnels)

interception (or HTTPS interception if applied particularly to that protocol) is the practice of intercepting an encrypted data stream in order to decrypt it, read and possibly manipulate it, and then re-encrypt it and send the data on its way again. This is done by way of a “transparent proxy”: the interception software terminates the incoming TLS connection, inspects the HTTP plaintext, and then creates a new TLS connection to the destination.

There isn’t a way to check if you’re connected to a Bluetooth device through automations :/.

The best you can do is set an action after you connect/disconnect from a known Bluetooth device

This is a solid song to do drugs to

You should be able to assign that vlan to a port (ex. eth0, eth1)

For something that “just works”, DDG is still probably the best. If you don’t mind some technical work something like Searx seems to be more private.

https://docs.searxng.org/own-instance.html#how-does-searxng-protect-privacy