

It’s now just Ubisoft slop in it’s purest form, but it gets attention for the expensive and extensively researched historical open world
It’s now just Ubisoft slop in it’s purest form, but it gets attention for the expensive and extensively researched historical open world
It’s a fair enough requirement from the union
I’m not judging (that much) but you can do pretty well with just telescope, undo-tree and the LSP stuff, no? Debuggers can make it very bloated, at that point I’d just fire up a real IDE just for debugging and get back to Vim to program
Oh so it’s your fault then. Please stop ruining instances
Source on the first statement?
It hasn’t, it’s just that good opsec is impossible in the long run and everyone is bound to be deanonymized eventually. For example, if you’re using a clean account on a CP sharing forum, it’s possible to track your mannerisms and post history (content, timezone, etc) to get an estimate of where you live. Then they can subpoena the ISPs for IP traffic in that region and figure out who is using Tor. That subset of IPs may then be cross referenced with the time that suspect’s account posted, that can be used as probable cause for a warrant… That sort of stuff. Sounds super complicated but most of it can be automated and bypassed these days (I don’t think you actually need to subpoena for example).
Where did the suspect fail? He should have used multiple accounts, spaced out the interactions more randomly, used stolen WiFi, ran his comments through a translator and back, etc. At no point did Tor fail at securing his IP address end to end
It doesn’t ever get better. We are stuck until we mercifully die.
No matter what I do it will always be an endless cycle of unmanageable chores and work, ever-changing medication and dumb productivity tips while I watch other people do everything effortlessly because they weren’t born a disabled retard like myself. My achievements went from getting a good grade to being able to wash the dishes
deleted by creator
The tokens can’t be traced to the account and are batch generated so you can’t be deanonymized by correlation. They aren’t stored in the account, but locally, in fact Kagi can (and they say they will) just sell the tokens directly, as they aren’t linked at all to an account
You can use privacy pass and pay in crypto
First off, Google has made agressive deals with phone manufacturers to ship spyware with their phones by default, and some of the stuff can only get taken out by rooting/jailbreaking the phone. By doing so, they acquired nearly 100% of the app store market share, and then used it to make “useful features” such as integrity checks that are tied to the Play Services app (which is an always on spyware background app).
The end result is, even if you manage to root your phone and install a custom ROM (which is not always available to every model), a bunch of apps will refuse to work properly because you fail the Google Play fingerprinting steps and are assumed to be a security vulnerability. If I’m not mistaken there’s also some shady stuff with certificates, too
Google already does precisely that with their “open source” mobile OS. People underestimate how easily these guys can ruin stuff
Ohio is ancient, nay! Prehistoric compared to tralalero tralala