Yes, Croc is AFAIK the best alternative, no man in the middle, but if you can’t be online for the downloads, the best is Sharrr, anyway lightyears better than Dropbox or similar big company crap.
Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’
Yes, Croc is AFAIK the best alternative, no man in the middle, but if you can’t be online for the downloads, the best is Sharrr, anyway lightyears better than Dropbox or similar big company crap.
01101001 00100000 01110100 01111001 01110000 01100101 01100100 00100000 01110100 01101000 01101001 01110011 00100000 01100011 01101111 01101101 01101101 01100101 01101110 01110100 00100000 01110111 01101001 01110100 01101000 00100000 01110100 01101000 01100001 01110100 00100000 01101011 01100101 01111001 01100010 01101111 01100001 01110010 01100100 00100001
01001110 01101111 00100000 01110000 01110010 01101111 01100010 01101100 01100101 01101101 00101100 00100000 01101001 01110100 00100111 01110011 00100000 01100110 01110101 01100011 01101011 01101001 01101110 01100111 00100000 01100101 01100001 01110011 01111001
A real Geek only need this one
Since Musk has turned it into a private Blog, it won’t be worth more than anything else made with Blogger.
It would be very desirable. AlternativeTo is perhaps the best and most complete service to find Software and services, for any OS and license. It shouldn’t be missing from anyone’s bookmarks, even so, a shortcut in Lemmy wouldn’t be bad. Community driven, most with user reviews and ratings, warnings if a soft or service is discontinued, with Malware or Bundleware, all links to the corresponding Homepages for use or download.
It is a matter of education, it must be taught from a young age.
Fireworks in Gaza, Ukraine, Yemen, Ethiopia, Somalia, Eritrea, Djibouti, Congo… to celebrate 2024. Champagn for Weapon industries.
These are my thoughts regarding FOSS for a long time. The sense of facilitating the development and freedom of the project has been distorted years ago, when large corporations put their hands on this project, controlling it. Just look at the amount of “OpenSource” soft and services controlled by Google, M$, Amazon, FB … Yes, they are free to distribute and modifiable by devs, but mostly full of APIs from these corporations, not controllable by the user, subtracting their sovereignty and only modifiable with effort by people capable of understanding the scripts and redirects they contain. For a normal user it is increasingly irrelevant whether the project is FOSS or proprietary, while these products and the internet in general are in the hands of these companies.
A simple question is enough, which one do you prefer to use? FOSS projects from large corporations, or Freeware from small independent startups, if you don’t have the knowledge to review the script anyway, almost impossible in millions of lines, with external references from large apps and services? It becomes decisions of mere trust, perhaps with the help of external services, such as WebKoll, Blacklight, Unfurl and similar, where in the end the license that the product has is irrelevant, with respect to security and privacy, often in question or not, in some like others. In the end only the intentions and ethics of the developer matter.
Yes, of course, the concept of OSS, FOSS and FLOSS requires a profound review and update, so that it does not become a destroyer of what it aims to protect and promote, a free internet.
Do you mean Android?
Very indicated because of the US History
Merry Christmas
(It’s because of Communists, Zombies and Canadiens)
I never opted in, no DropBox, OneDrive nor GDrive.
deleted by creator
Smartphones by definition are Spyware, at least if you use the OS as is, because in them all aspects are controlled and logged, either by Google on Android or by Apple on iOS. Adding the default apps that cannot be uninstalled on a mobile that is not rooted. As COX alleges, they also use third-party logs and therefore can track and profile the user very well, even without using this technology that they claim to have.
Although they feel authorized by the user’s consent to the TOS and PP, the legality depends directly on the legislation of each country. TOS and PP itself, to be a legal contract, must comply in all its points with local legislation to be applicable to the user. For this reason, I think that these practices are very different in the EU from those in the US, where legislation regarding privacy is conspicuous by its absence, that is, that US users should take these COX statements very seriously in their devices, although in the EU they must also be clear that Google and Apple know exactly what they do and where users live, although they are limited from selling this data to third parties.
Basics:
– READ ALWAYS TOS AND PP
0118 999 881 999 119 752… 3 is the Pastor, not confuse
Well, real privacy don¡t exist in the same moment you goes online. Google controls half the internet and MS and Apple the rest, direct or indirect. Even the Dark web isn’t so private as people think.
An advanced user can reduce the privacy holes, gutting Windows, leaving it in an OS as is, the same with Google products, but also only up to a certain limit so as not to turn navigation into pure text or get blocked in most the pages. For this reason, we must focus on which data deserves to be protected or hidden and which are of a purely technical aspect that ensure the proper functioning of the sites we visit.
I don’t care that the page knows what country I live in, but if it has to be avoided that it knows my address, I don’t care that it knows the OS I use and the exact resolution of my screen, since this helps the pages not to be out of order or download links take me to downloads for another OS.
This is all data that matches millions of other users and is not a privacy issue. These problems arise with data that identifies the user directly, such as email addresses, which are unique and perfectly traceable, personal photos published on the Internet, bank details in these very convenient mobile payment apps, posting on Fakebook until when are we going to go pee or when we go on a vacation trip (surely some of the 5637 followers are very interested when your house is empty)…
There is a lot that the user can do to have a certain privacy at the computer level, but the worst security hole is always the user themselves and the lack of common sense…