Kidplayer_666

joined 1 year ago
[–] [email protected] 0 points 3 days ago

You like self checkout because you like stealing.

I like self checkout because beeep boop beep boop.

We are not the same

[–] [email protected] 0 points 1 week ago

This is sort of what TOR does if I’m not mistaken to help you stop getting tracked even if a node is compromised

[–] [email protected] 0 points 1 week ago

Wait, they’re telling people to drink sunscreen? Genius move. They’ll die from poisoning instead of cancer

/s

[–] [email protected] 10 points 2 weeks ago (2 children)

WebKit, isnt it though?

[–] [email protected] 6 points 2 weeks ago (1 children)

Be careful. Suddenly JD Vance couch memes are illegal, cause it’s making fun of someone for something with no basis in reality.

[–] [email protected] 27 points 2 weeks ago (1 children)

How the hell did shareholders even allow such a ridiculous thing? If I owned shares at Starbucks I’d be livid

[–] [email protected] 1 points 2 weeks ago

Compatibility reasons with legacy code, and still more simple than the new beta software. Encourages further propagation of the software downstream through easier reproduction and simpler creation of child processes

[–] [email protected] 16 points 2 weeks ago

Same here. As fun as it might be trying out another gender, it’s far too complicated, and I’d rather mess with NixOS

[–] [email protected] 29 points 2 weeks ago (6 children)

The thing is, faking them went from a State can do it, to a professional can do it, an experienced amateur can do it, to absolutely everyone can

[–] [email protected] 16 points 3 weeks ago (9 children)

I mean, I guess the difference is that Hillary’s emails were made public by wiki leaks, so media are like “who cares, it’s already public” but this time, it’s not public

[–] [email protected] 5 points 3 weeks ago

Apple has had custom chips for years in the earbuds, mostly for ANC, pairing and finding, might be just that

[–] [email protected] 10 points 3 weeks ago

Wrong. Most of the latter kill their kids, not themselves

 

This is a part from an IBM server dated 2008 that I want to reuse in my new computer. It essentially converts from 1 SAS port to 4 SATA ports. I’ll use the raid card to connect to it via SAS, but I do not know what the power port is and what the connector on the top is either

 
 
 

Hello there! Im looking for increased privacy when it comes to my network connections. So far I know of TOR as an almost absolute bastion of security, but how do I ensure the remaining network traffic is encrypted and private? I know of signal for communication, and I’m aware of VPN’s. However I’m not sure whether to trust most providers regarding government interference as their software often isn’t open source. Is there a federated VPN of sorts, similar to how lemmy and other fediverse apps work?

view more: next ›