

It rounds the browser window to the nearest 100x100 window size. Using the default will likely be the biggest dataset to hide yourself in, but maximizing the window will still have some amount of obfuscation.
Sad soy boi beta cuck from the webbernets, planet Erf.
It rounds the browser window to the nearest 100x100 window size. Using the default will likely be the biggest dataset to hide yourself in, but maximizing the window will still have some amount of obfuscation.
Letterboxing has significantly reduced threat presented by window sizing. https://support.torproject.org/glossary/letterboxing/
Pseudonymous, not anonymous. It’s a little difference, but one that can determine whether you land behind bars/dead/doxxed.
Even with that repo it doesn’t come up. Not sure how long it takes for it to appear, GitHub is showing the release was tagged about three hours ago as of this writing.
People democratically sat on their asses and didn’t bother to fucking vote. More people abstained from voting than actually voted for either candidate. The real winner of the election was apathy. We deserve whatever fucked up outcome we get.
Problem is, there’s an entire generation of users that have gotten super used to “discard changes” as a means of signalling “on second thought, don’t do anything”.
The comment that kicked this whole thread off said she was his puppet. Seems like you’re the one that jumped to “consensual and willing Russian asset”.
You recognize that the electoral system is fucked enough that it doesn’t matter if it’s Greens, Libertarians, Communists, they all are relegated to the role of spoiler candidate purely from a game theory perspective? If she actually wanted to enact change her entire campaign would be focused down ballot where it’s viable to get some ground, rather than taking on the role of the dog chasing the garbage truck that is the presidency. Whether she is knowingly helping Trump or Putin doesn’t matter, the end result is still the same.
LET’S ALL LOVE LAIN
I wouldn’t rely on the size of the address space to provide security. It’s possible to find hosts through methods other than brute force scanning. I remember seeing a talk from a conference (CCC? DEF CON? I can’t remember) where they were able to find hosts in government IPv6 address space (might have been DOD?) through stuff like certificate transparency logs and other DNS side channels.
Man, I need to go find that talk now…
Edit: I don’t think this is the one I saw previously but is in a similar vein: https://www.youtube.com/watch?v=AayifEqLbhI
I wouldn’t because I am not a dev. I stay in my wheelhouse and don’t try to pitch features as something they aren’t.
Calling the anti-features indicator a rating system is a biiiiiit of a stretch.
So something changed between then and now. Wish the picture had absolute timestamps instead of the relative ones. I’m on mobile so I’m not about to try to dive into EXIF to find out when that was happening.
You have far more faith in capitalists to do the right thing than I. They’ll put this shit behind user hostile DRM the same that Disney does for drink refills.
Must be fuckin’ nice. - Squirrely Dan
Last I checked, when you try to install from another source it just pops up a message saying this is not currently allowed due to this setting, with a button to take you to the setting. Literally two taps and you are able to install from other sources.
If the link was unique to the email, then it could be a signal to the phisher that is a valid address for further targeting.