I purposely take awful photos from time to time and I didn’t realize I could set the key photo in Apple’s Photos app. Without fail it chose the absolute worst photos of people to the point I cracked up for several hours after seeing the People albums it generated.
I grew up in Iowa and was always curious about driving to Winnipeg on a whim knowing nothing about the place. I don’t live anywhere near there now though.
Yeah, I live in lawsuit happy USA and pirating through i2p has never landed me letters in the mail. They don’t even know what it is you’re looking at let alone where it truly came from.
Again, I really recommend reading about the subject instead of trusting some idiot (me) on the internet.
It’s next to impossible to do this. I think if you read up on the topic you’ll have a better understanding; I’d like to explain more but it’s difficult to do so without knowing your level of expertise, etc.
The TL;DR is that nodes on i2p have no clue which nodes line up with which IP addresses. It’s true that from outside the overly you can see it’s i2p traffic, but you’d need to defeat so many layers of encryption that it’s close to impossible.
Well at least you’re using i2p, I kind of wish more people would. I just don’t like generally using unencrypted communication methods, so discussing even a simple crime like piracy is no bueno for me.
iOS 18 is in beta, which means you should be using the Feedback app to report stuff like this. Apple has actually been very good at responding to me about stuff like this, so I actually encourage you utilize the app.
I’d curl from a machine on the same WiFi network as the phones just to confirm that HTTP is working. That way you’re not dependent on browsers that can be more finicky for debugging.
I’ve noticed that but I thought I just didn’t know how to persist it correctly and never bothered to find out how. If what you’re saying is accurate (which I don’t doubt) that sucks.
If this tech is real, maybe we’ll see it in Los Angeles area apartments in 3050