Skip Navigation

User banner
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
0
Comments
182
Joined
8 mo. ago

  • I voted for gay rights without even saying "no homo"

  • The Forbidden Lands??

  • But it's 2024 🤔

  • Yeah so he's still dog whistling at it. Hate to see it but it's not really mask off

  • our national flag has been taken by the far right

    This is the only place in the world where the national flag is a hate symbol.

    Aren't you forgetting someone? 🦅🇺🇸 🍔

  • Prayers

    Jump
  • I would read articles if they wanted to be read lol

  • Maybe it's uncommon to have a climate where you need both.

    My furnace has a humidistat so in the winter we can adjust how much water gets sent into the hot air stream. But it's always maxed out because it's really dry every winter here.

    In the summer, the AC takes care of dehumidifying. Running a dedicated dehumidifier would be a waste of electricity, at that point just turn on the AC and any extra cold is a buffer against running the AC later on.

  • Who is the leopard?

  • It's true that a large adversary with a little money (like the US or Israeli government) could host a huge amount of compromised exit nodes and relays (I don't think compromising exit nodes alone is enough) and de-anonymize users.

    It is also true that you can run a relay right now by running the Snowflake proxy in a normal browser tab: https://snowflake.torproject.org/

    It is safe to run a relay on your home connection, because you aren't hosting any exit traffic. I've never had trouble when I've done it.

    Tor also hosts "hidden services" or "onion services", which don't exit the Tor network. The client and the server agree on a rendezvous node and meet each other there, and the traffic is encrypted from end-to-end. I am pretty secure this is more resistant to the "global passive adversary" type of attack, but nothing is perfect. A GPA can always look at timing and make some correlations based off of it.

    It is true that the network is more secure if more people use it, because that provides cover. It is true that if you pirate stuff through I2P you won't get a letter from your ISP.

    Better practice now before you really need it.

  • 👍

  • yeah that's the sad truth. I was watching a video yesterday about like "All creators should be on YouTube" because Instagram, Twitter, etc., will open your Patreon link logged-out in a WebView....

    I'm the only one watching videos on a desktop I guess

  • I don't see myself ever playing a video game with cards in it.

    I hear "cards" or "deck-building" or "RPG mechanics" and I think oh my god no

  • If I remember right, flash memory is basically based on static electricity and those cheap SD cards might self-wipe after a couple years being unplugged

    but maybe not lol

  • I'd prefer if you didn't, if it throws me off just imagine how hard it is for someone with dyslexia or something

  • Will throttling the CPU use less energy? Phones often do the opposite, they race to idle

  • I like Benn Jordan a lot but I really doubt a bird can sing 2 MB / s. I saw the spectrogram and it looked pretty fuzzy

  • Action news update: Trump is shoveling children into the Torment Nexus Macerator to distract everyone from the Epstein files. Here's why this is bad for Democrats, who aren't doing enough