[-] [email protected] 1 points 2 days ago

use Tor Browser.

If your concern is fingerprinting, that is undeniably the best there is out of the box.

If you want Tor Browser without having to use the Tor Network, Mullvad is basically just that; Tor Browser without the Network.

15
submitted 6 days ago by [email protected] to c/[email protected]

I've been playing a lot of blazing beaks with a friend of mine, and I've been interested in other indie games which take this arcade approach of being infinitely replayable whilst still being a multiplayer experience that I can maybe take on a goal to play with a friend

Any recommendations?

[-] [email protected] 15 points 3 weeks ago

SimpleX is quite a promising project, uses Double Ratchet End-to-End-Encryption (from Signal), and has a very interesting protocol and model to provide quite strong metadata protection, especially in regards to whom you talk to and groups you're in.

If your threat model requires exceptionally strong Metadata protection, SimpleX is probably going to be your go-to

Though, for a more lenient threat model, where still good, but less laser-focused metadata protection is enough, Signal will probably do just fine.

Personally I use Signal, but I also have a SimpleX Profile, an XMPP Account and Matrix. (preferred in that order)

[-] [email protected] 5 points 3 weeks ago

Yes, they self-implemented that.

So unlike Heliboard, you don't need to import Google's Swypelibs.

[-] [email protected] 5 points 3 weeks ago

Its great, same as their standalone Speech-To-Text Application.

[-] [email protected] 14 points 3 weeks ago

Just FYI, Heliboard (continuation of OpenBoard) has all of the above. Just note that you'll need to import Google's Swype library once to use Swipe-To-Type.

[-] [email protected] 89 points 1 month ago

This is a deliberate decision to force people to turn off tracking protection.

No this is a hilarious fuckup where they forgot to move twitter.com, pbs.twimg.com and more off of the Twitter domains, so Firefox started blocking it because to Firefox it looks like Social Media trackers.

Mozilla already pushed a fix.

[-] [email protected] 1 points 1 month ago

I won't properly reply to this, I'm biased cuz a friend of mine works on this 🥴

[-] [email protected] 3 points 1 month ago

That's just fine.

[-] [email protected] 3 points 1 month ago

If all that you wanna do is download stuff, maybe try https://cobalt.tools

It pretty much just grabs the raw URL to the content for you, without the UI and fluff (in the case of Instagram) so you can just do a little "save as..." and it's worked quite reliably for me to view content my friends sent me.

[-] [email protected] 12 points 1 month ago

The algorithm was neither proposed nor designed by the US government, it was made by (what is now known as) Signal, a 501c nonprofit.

The claims of signal being "state-sponsored" come from assuming how money flows through the OTF - Open Tech Fund - which has gotten grants from government programs before. (IIRC)

It wouldn't make sense for the US Gov. to make such a grant to make a flawed protocol, as any backdoor they introduce for themselves would work for any outside attacker too - it's mathematics. It works for everyone or for no one. Would they really wanna make tools that they themselves use, just to have it backdoored by other state actors?

And again, Durov's claims are entirely assumptions, and that coming from someone that has had [various](https://mtpsym.github.io// different vulnerabilities and weird bugs on their platform

[-] [email protected] 1 points 1 month ago

That already exists, but it's weak in terms of encryption.

[-] [email protected] 23 points 1 month ago

Musk himself hasn't actually provided any sources either, all his statements made on Twitter recently are basically pulled from thin air, almost like vague references

view more: next ›

cyrus

joined 2 months ago