

This section is almost worthless. It’s wholly reliant on the app developer self-reporting accurately, and honestly. We know how effective self-regulation is…
Just assume ALL apps are data harvesting, and take measures to block or sabotage that.


This section is almost worthless. It’s wholly reliant on the app developer self-reporting accurately, and honestly. We know how effective self-regulation is…
Just assume ALL apps are data harvesting, and take measures to block or sabotage that.


Good plan, just ensure you isolate that VM from your home network, too. I don’t trust my company at all, so their laptop only connects to my guest wifi.


Some surveillance tools use DNS queries for tracking. Until this can block that, too, having a DNS-based blocker will be crucial for privacy protection.


I think you are missing the part of the intent of the question. Multicast is wasteful in a large chunk of IPv4 range. If it were a smaller range, the leftover IP’s would be available for general use.
You’re correct in that it wouldn’t help for the other reasons OP noted, since CDN’s do all that heavy lifting already, and do it better than pure multicast could (geo-location, for example).
Agreed, not a fan. The hand would look better if it wasn’t aiming for realistic contours, and instead was more cartoon-ish
Rover
I donate to my instance.
If you are getting something for free, you are generally the product, not the consumer.
300K is nothing but a taste, for normal usage. I’ve been using NextDNS on my home network for a few years. I average 1.2 million queries/month. And that’s with cache boost (forced minimum TTL) enabled.
$20/year is worth every penny. The amount of time you save in blocking all the ads and surveillance marketing services is worth 10x that.


Fro recurring ones, the surgery is followed up with an acid treatment that kills part of the nail bed, so the nail stops growing so wide. I have had it done on both big toes, on both sides. Haven’t had any issues in over 15 years.


Signal is E2EE. While it does use notifications, there is no meaningful unencrypted content in them. The content of the notification you see is decrypted on-device.


The “record” is a SMS verification code. All that will tell the government is that you registered for Signal, nothing else.


Signal doesn’t use SMS at all, once you have enrolled. The phone number is used to validate people and exclude bots, during registration. As others have noted, you can hide your number from other users, as well.


They can “request” it all day long. Signal doesn’t store them beyond the time needed to deliver to the end user device, and while (temporarily) stored, it’s encrypted in a way Signal’s service cannot read.


Google’s default implementation IS proprietary, so while the spec isn’t, the mass-adopted deployment is. Google is in the middle, unless you use a different app (if that’s even possible, I don’t know as I don’t Android).


How would they find that info from the outside, though? Or are you saying they are hooked into Amazon’s internal data harvesting ecosystem?


What are they monitoring on Amazon, the fake reviews?


Try to only tackle one project at a time. It gets exponentially more stressful trying to juggle a bunch of incomplete projects. Also, you’ll never be “done”. That’s not the point. The point is shelter and comfort.


If you’re East Coast, I think you’ve just given up too early. Plenty of pests on the West Coast, too. There are also plenty of organic ways to keep them in check. Will you have perfect harvest? Never, but that doesn’t mean you can’t have anything at all.
Think lower level. They own your device keyboard, so they can technically read whatever you type. Whether they send that to the mother ship, I don’t know, but it’s a risk. That’s one example, but same holds true for anything low level, like mic, camera, etc.