Removed by mod
@dukethorion@lemmy.one @dukethorion@lemmy.world
Removed by mod
Did you try changing the timeout time value? I think the default is 3 seconds…
Seems like they stonewalled anyone that would want to develop an app.
EU: Allow users to download outside your Store.
Apple: Ok. They just have to register with us two years ago, comply to every spec and be approved by us, and they must have a million installs on our Store last year to qualify.
EU: …that’s not what we meant.
Apple: 😎
100% this. They already got caught sharing your health data with Facebook. Don’t think they (insurance companies)won’t buy DNA data en masse.
And they still recommended two 256mb sticks instead of one 512…
That’s gonna pull right out…
OP wanted a Chromium browser that wasn’t a massive privacy invasion. With Google stuff removed, it’ll be good enough. Add uBO and ClearURLs.
What’s wrong with ungoogled-chromium?
Maybe TOR uses FF because it’s easier to modify for their purposes.
Others would call that “insecure”
You’re wasting your time. Internet Commies skipped/haven’t read the source material
The VPN isn’t generating the requests. Other apps on your device are. Run a VPN for a while and look at data usage by app. I guarantee your VPN app will be the highest (all the other apps data gets funneled through the VPN).
I disagree with the VPN ban, but I understand the purpose.
Isn’t there a better way? Is there a back end that can be added to scan uploads for matching CSAM hashes?
Nobody in this entire thread of FUD has posted a single link to support any claim of Russian data intrusion.
Tomorrow’s news:
7 Indians killed “under mysterious circumstances”
Young progressive activists still believe Biden gives a shit about them?
He doesn’t even remember where he is half the time, and the other half he’s making sure the military-industrial machine keeps rolling.
I disagree with the idea that one commenter opined: “Monero is not a savings account”.
Who are you to tell me what to do with my XMR?
That being said, I am not opposed to the idea of implementing some kind of condensing/snapshot that some have outlined here.
The question I’d ask is if it would ever be possible for someone to use that data maliciously?
How would this be different from any browser that has Wikipedia search built in?