• 0 Posts
  • 8 Comments
Joined 10 months ago
cake
Cake day: April 3rd, 2024

help-circle


  • He really did go through all that shaming and embattlement. Think of the stress and the assassination attempt. There should be a price paid to the victor when the opponent he overcame would have done to him even more than he already went through. He will bring the fight to the Deep State. Listen to the actual policy decisions.

    Just for a couple of examples, tell me you don’t you think that the policy for the IGs to be physically separated from who they are regulating and for Federal institutions to be decentralized from the NW corridor aren’t great ideas in so many ways.



  • tor (TBB) doesn’t work for everything and most people want something fast and convinient that only takes clicking a few buttons to get working. They will think it is too much work.

    I recommend Brave browser which can use tor in private browsing mode but also has a regular browser with encrypted DNS (cloudflare, https strict, and shields) for things like banking, shopping, and online accounts (that might help to have a password manager for).

    Also, Tor browser does not have any passthrough for security keys but Brave based on chromium does. Tor browser does not have a password manager.

    Firejail should work on a profile for Brave as sandboxing is always helpful. TBB can be sandboxed easily, however.

    This “multi-tiered” approach would be better for most people who aren’t just accessing a handful of onionsites that replace or are in opposition to an entirely different set of services than those usually accessed on the conventional internet (online banking, social media, a few publication sites, and a search engine).



  • Do you want to show us what that looks like in assembly, ASCII from machine code? …ha, ha, ha, no!

    Depends on the device, I know. Such a pain without the higher level languages.

    What would it look like for ARM android touch screens? Just for one character…

    But if some characters go missing or are exchanged for others for no discernable reason, then might that be an exploit on a EC or assembly level?