Yeah, I don’t think that’s the best selling point for desktop use. For me it’s having all my configs for all my devices in a single place, checked in git, with bits of config I can easily share between my different devices.
Yeah, I don’t think that’s the best selling point for desktop use. For me it’s having all my configs for all my devices in a single place, checked in git, with bits of config I can easily share between my different devices.
Well, first of all you really should not be using Windows 7 anymore. For the TPB, I don’t think they check the torrents, anyone can upload so it’s not a trusted source. It’s in the unsafe sites list on the megathread. And how would you know that you never had a malware on the TPB?
You’re right, I should have explained.
Privacy Badger was known to be able to learn what to block but local learning could be used to fingerprint you so it was removed. Nowadays it’s only a list based blocker, while the list is still automatically generated on their side through learning it mostly overlap with regular tracking protection list used with uBlock Origin.
They also claim other features but they are either outdated (google outgoing link protection last update is 9 months old and is based on the old url schema) or already covered by uBlock Origin (uBlock Origin can now sanitize urls with the removeparam
filter, facebook outgoing link protection is included in the “AdGuard URL Tracking Protection” filter list, for third party widget blocking enable the “EasyList – Social Widgets” list).
It’s also in Arkenfox “Don’t bother” extension list.
Better use Firefox in strict mode with uBlock Origin.
In session sanitising seems pretty useless.
Click fraud is a big thing with a lot of countermeasures, it’s not as easy as adnauseum pretends it is. I doubt it does anything.
Privacy Badger is pretty useless now.
Privacy Badger is pretty useless now.
From what I gathered Amazon is the only one that includes an identifier. Look for a string starting with “atv:kin”.
The DeDRM fork removes it: https://github.com/noDRM/DeDRM_tools/blob/bf2471e65b1f52bb5292caeba70a9aea31bf6653/DeDRM_plugin/mobidedrm.py#L254
Synthetic rubber like SBR: https://en.wikipedia.org/wiki/Styrene-butadiene
Tires and brakes are a major source: https://www.nature.com/articles/s41467-020-17201-9
A security feature: https://www.privacyguides.org/en/os/android-overview/#verified-boot
Isn’t it necessary lock it to get verified boot?
Some have an interview process in place (notably redacted). Once you get in a first one (either through interview, open signup or any other way) you can start climbing the ranks, at some point you should have access to an invite section on the tracker forum where you can find invites to other trackers (not all trackers have an invite forum and they don’t have access to the same invites).
This, of course, can only tell you if an apk is malicious, it cannot tell you if it is not malicious.
I can find the desktop client, am I missing something?