Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)B
Posts
1
Comments
60
Joined
3 yr. ago

  • Thanks for the explanation

  • Surely the Tokyo tower is a specific product then? 🗼It costs money to visit, aren't the other towers jealous?

  • Yeah their security track record as of late is pretty bad..

  • Oh I didn't catch that my bad. I hope they get a work computer where this kind of stuff doesn't interfere with private life!

  • Sounds easier to switch to another browser at that point

  • Rust or bust

  • Yeah the colors come from the os, my keyboard shows the monochrome one when I pick it. That was all very interesting!

  • Third and fifth result are about the correct one

  • Here (didn't find the right one, almost)

  • Here are the same queries with Kagi (I was interested to see the difference)

  • Something like this is a good start! I use transmission as the torrent client instead of deluge. Also added a service for my vpn and use that as the network for the tranmission service so all traffic is routed through the vpn. https://ochoaprojects.github.io/posts/PlexAutomation/

  • Personally love Piped and the LibreTube app. I'm using the smnz.de instance for steaming and adminforge.de for authentication. Been super stable over the last few months. AFAIK Piped acts as a proxy between you and the yt servers so they have no chance to gather data about you. Not sure invidious works the same.

  • Just use an alias, it's anyway a good idea to find a provider that lets you create unique aliases for each account.

  • Been using DuckDuckGo for a long time but I recently trialed Kagi and have been quite impressed! It's not free but hopefully it keeps the enshittification away for a bit longer.

  • Got in touch with ProtonVPN support and asked about this. Here's their reply:

    Our engineers have conducted a thorough analysis of this threat, reconstructed it experimentally, and tested it on Proton VPN.

    We concluded that:

    1. The attack can only be carried out if the local network itself is compromised
    2. Our Windows and Android apps are protected against it
    3. For iOS and macOS apps, you are completely protected from this as long as you're using a Kill Switch and a WireGuard-based protocol (our apps use them by default, and if a user wants to use something other than WireGuard derivates, they'd have to manually set it up). Note that Stealth, WireGuard TCP and Smart protocol on iOS/macOS are all WireGuard-based.
    4. For our Linux app, we're working on a fix that would provide full protection against it.
  • Interesting, that would confirm the pressure advance as the likely culprit (speed and acceleration are taken into account in the algo). Maybe your slicer has a bug related to this? If changing the value wildly does not improve or worsen it, then it might not be calculating what it's supposed to. Can you try another slicer?