Skip to content

You can still enable uBlock Origin in Chrome, here is how

Technology
130 97 2.2k
  • 136 Stimmen
    41 Beiträge
    179 Aufrufe
    E
    Yuck indeed. People tried many ways to get around it, back when I was still using an US variant Samsung Note 9, people went as far as using a leaked engineering/preproduction ROM, which can be flashed using Samsung's official tool because it does have the correct key for the locked bootloader to accept, being built and compiled by Samsung, and because it's an engineering ROM it would give you root and everything despite of the bootloader still being locked. But it was an exceptionally rare leak, and it was only meant for preproduction for a reason, it is very VERY unstable and not exactly usable for a daily driver lol So happy I am leaving all that BS from Samsung behind with my current Sony Xperia 1 VI which is bootloader-unlocked and rooted and deeply modded and truly my own device lol
  • 17 Stimmen
    2 Beiträge
    35 Aufrufe
    T
    Yeah, sure. Like the police need extra help with racial profiling and "probable cause." Fuck this, and fuck the people who think this is a good idea. I'm sure the authoritarians in power right now will get right on those proposed "safeguards," right after they install backdoors into encryption, to which Only They Have The Key, to "protect" everyone from the scary "criminals."
  • 349 Stimmen
    72 Beiträge
    725 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • Bumble's AI icebreakers are mainly breaking EU law

    Technology technology
    18
    1
    184 Stimmen
    18 Beiträge
    198 Aufrufe
    S
    This is just that zizek quote
  • 67 Stimmen
    2 Beiträge
    28 Aufrufe
    1
    Says the same IT group of humanity with their heads buried in code mumbling i hate people into their monitors /s its just a joke. Im describing myself
  • 456 Stimmen
    48 Beiträge
    712 Aufrufe
    L
    That's good to know, thanks.
  • 236 Stimmen
    80 Beiträge
    718 Aufrufe
    R
    Yeah, but that's a secondary attribute. The new ones are stupid front and center.
  • 512 Stimmen
    58 Beiträge
    470 Aufrufe
    C
    Eh, I kinda like the ephemeral nature of most tiktoks, having things go viral within a group of like 10,000 people, to the extent that if you're tangentially connected to the group, you and everyone you know has seen it, but nobody outside that group ever sees and it vanishes into the ether like a month later makes it a little more personal.