![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
uBlock Origin is a must. Then Stylus with a global-dark userstyle. Very light on resource than Darkreader.
uBlock Origin is a must. Then Stylus with a global-dark userstyle. Very light on resource than Darkreader.
deleted by creator
deleted by creator
deleted by creator
Bottleneck Bandwidth and Round-trip propagation time (BBR)
What services do you run on FreeBSD? Does using FreeBSD limit you in the number of apps you can have, as most of them target Linux?
Apart from replicating the pixel experience on devices not sold by Google, it was a ROM that enabled people to upload unlimited images/video in any resolution to google photos cloud storage (as it could disguise itself as OG Google Pixel).
I don’t know if it worked well and how google didn’t stop it, but it was one of the highlight of this project.
I bought Designer last year as a one off. But there’s no point in mastering it anymore. That’s just going to suck you more into their ecosystem, then a subscription, then raising price, and then whatever they want.
seems like the profanity filter messed up the link.
Futo repo for Futo Voice Input App. Totally free open-source offline speech to text engine. Works better than I expected (for English).
Fork it, Learn to build it, Forget it.
P̶r̶o̶f̶i̶t̶
Blame Firefox when a security exploit passes through
I hope you don’t mind some questions.
I am curious about selfhosting an instance for a community but am afraid federation will consume too much time/resource/money for a side project.
“Please drink verification can to continue emotional support for another hour”
If he likes RTS, Project Celeste is a revival of Age of Empires Online by the open-source community. And you can install it on Linux with Lutris.
IPv6 usually have unique IP addresses (non-local) for every device in the network. does that mean it will malicious actors can target a device specifically inside a network?
deleted by creator
has been formally verified for its robust security properties.
How do they formally verify these?
This is going to lead to a lot of harassment and stalking. The sender or receiver could use the numbers to find people on whatsapp, signal or any other social media app that allows users to link their contacts.
This is scarily creepy.
It is safer than not updating at all. Unsupported devices have a lot of exploits and vulnerabilities.
Scoop for me. 1 more layer of audit, 1 additional layer of trust. There are occasional hiccups but they haven’t broken my trust yet.