Exactly. I was surprised to see my unique named throw-away email being found in the leak, despite having changed it to an uniquely generated throw-away account alias in the year prior. But i don’t mind that much.
However, bad security practices must still be pointed out regardless of it being applied to something important or large. I do still can criticize my friend decision to expose his local server at home, unsecured, even if in the grand matter of things, it is unlikely it will be exploited or impact him in any way.
Now, the only issue having my throw-away address, is that i will have to throw it away once i start receiving spam on it. As far i know, the pirated database wasn’t shared nor necessarily conserved outside of prooving the original clowns hacktivists group involvment, outside of confirmed security analyst.
Mint is a good choice ! They have a decent help forum where you could ask for such help. Like this one for example. https://forums.linuxmint.com/viewtopic.php?t=228884 Feel free to give more details here too, maybe i, or someone else here could help you with your specific Mac problem.
You’ll get plenty of answers with different suggestions, so I’ll suggest checking in that community for plenty of previous answers. I would say to stick with “main” known distribution and to ditch specialized ones. https://linux-myths.pages.dev/Single-Maintainer https://linux-myths.pages.dev/Distros
I’m on Nobara but despite the fantastic work of GloriousEggRoll, it did had it’s lot of breakage which made me want to switch to the suggested uBlue Fedora atomic builds, per those criterias.
What I don’t get, but maybe because of the lack of information I have on the topic
Exactly. That’s also the issue there. It was opt-out by default AND didn’t seemed to give enough info to the end-user about what it does, and why it would be better to keep it enabled. Most people, complain about the forced default decision without any notice, and without any appropriate info to understand if it was a decent change or not. You should only enable it, IF you understand and ablige to what it does.
(You can also downgrade manually, instructions at the bottom of the page. https://fallout4london.com/release/ There’s also instructions on how to manually install the mod if you are having issues with the GOG Installer, there’s ways to extract the raw files from GOG installer executables)
Well, on my ESTA, they said the social medias disclosure is optional. Just a tool to help you confirm your intents visiting the US (or to be withheld against you as well) https://esta.cbp.dhs.gov/faq?lang=en&focusedTopic=Privacy and Security&answerToDisplay=How will CBP use my social media information collected through the additional question that was added to the ESTA application in December 2016%3F
Register a new account over that phone number. They can’t get into any previous accounts register with that phone number. They could potentially manage to find the pin if the previous user really used a guessable one, but then again, they won’t be able to check the previous messages and the linked owner of that account will be warned of that new connection.
It doesn’t make use of the games original Discord RPC integrations, and their more-in-depth game details that it can bring. See https://github.com/ValveSoftware/Proton/wiki/Enabling-Discord-Rich-Presence or https://github.com/EnderIce2/rpc-bridge for ways to fix it.
Strongly recommend it. It even automatically fetches icons for the games via SteamGridDB (Even if they could totally just fetch it from Steam). Ain’t really a fix for games using Proton, however, or making sandboxed Discord versions to get those local RPC implementation, just an alternative and more efficient way to show what you play on Steam.
Btw, you can even verify your Lemmy account with it ! https://docs.keyoxide.org/service-providers/lemmy/
What is that “(pretty flimsy) verification method” you are referring to ? Keyoxide is basically a web-interface (and accompanying tutorials) for PGP/ASP proofs. If you and your colleage know how, it’s not for you. I do think having a “web-PGP” passport page is easier to share, especially for just non-techy people.
Would need it’s own submission, but still have to point out. NSA, if you are indeed watched, will try to track you on every other websites. Using a third-party Wikipedia proxy won’t change a thing. Read the actual text on the wikiless README.md, even them just explain that NSA is interested in Wikipedia tracking, and haven’t been known to have compromised it so far.
It is as effective as uBlock with the same settings. The ad-deception “auto-clicking” method shouldn’t and doesn’t have any results to the end-user as it should just confuse the ads companies themselves. Still looking forward to potential documentation on how effective it may or may not be nowadays.
Actually, tracking the extremely unique individual with sometime, nonsensical features is making you hyper-easy to track on websites. Maybe it could be useful per browsing sessions, but every 60 seconds in non-sensical, a compatibility nightmare and defeat even the deception method of faking your browser features.
They do, but it’s still separated from that business. At worse, it’s more an ethical issue of using something that an Ad company own, exactly like using Google with or without proxies services. https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/
If you believe Google is the most reliable, you can still use it in a private way via :
Startpage is a private search engine known for serving Google and Bing search results. One of Startpage’s unique features is the Anonymous View, which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding some network and browser properties.
SearXNG is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself.
There’s plenty of public instances too https://searx.space/
Get Google search results, but without any ads, JavaScript, AMP links, cookies, or IP address tracking. Easily deployable in one click as a Docker app, and customizable with a single config file.
Couple of public instances too. Basically SearxNG with ONLY google as a source. https://github.com/benbusby/whoogle-search#public-instances
That is just Invidious https://github.com/iv-org/invidious And, while it may not be actively blocked, they are still on the risk of being API blocked as it is the case here.
https://addons.mozilla.org/fr/firefox/addon/side-view/ They are working on that. Not as fluid or powerful as Vivaldi one, but one nonetheless. https://github.com/mozilla/side-view/
Depend on many factors, and it’s basically, how each of the extensions can modify your web browsing. From your current configuration, I suppose KeePassXC would be causing no issues, except if it supports any kind of protocol (Like a web button “open in app” button) I could imagine, or maybe a less trivial way to input stored passwords which could differentiate from a user typing it, and copy-pasted it (An user typing automatically, a 64 random character passwords at less than 1ms per stroke is suspicious). Dark Reader, however, should be fine as well, if it doesn’t try to send any “dark mode preferred” headers, as your browser should already handle that (And the Tor Browser should already enforce keeping light-mode to stay common enough) However, That’s more of an issue with uBlock Origin or most Ad blockers, as they tend to directly block any known content types or direct ads domains before your browser can contact them. Which could make a website, easily check on a list of common domains, or content types, if you block it. You can test it here, and yep. uBlock Origin fall for it. https://browserleaks.com/proxy
You can learn more on that in this blog post : https://fingerprint.com/blog/ad-blocker-fingerprinting/
What do you suggest ? Jpeg-xl ? Avif ?