Hi I’m Holly! My pronouns are they/them, and she/her.

Extremely opinionated and can write walls of texts for very small passions.

I’m also anxious so if I interact with you and then disappear, I’m sorry I got overwhelmed!

hajkey: @hollyberries@blahaj.zone pfp: https://marupanda.art/

  • 1 Post
  • 37 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle








  • Maybe some program that wipes the computer’s drive after a period of inactivity? Some other tools or some tips I didn’t consider?

    I’ve been toying with the idea of writing a dead man’s switch in the form of a telegram bot that monitors my profile for automatic account deletion, if thats even possible. I’d have it send my partner an email with everything she needs to get into bitwarden and to cash out hidden assets. Having it trigger a mass deletion instead would fit your use case.



  • hollyberries@lemmy.blahaj.zonetoLinux@lemmy.mlEndeavouros alternatives?
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    1 year ago

    1&2 - Can be solved by your DE and disabling notifications altogether with a toggle. XFCE4 panel has a notifications plugin that I have switched to DND when installing the system and haven’t turned it off since. It’s been 3 years :)
    3- I can’t comment on as I use #4. When it works, it works. When a bad update is pushed, it really doesn’t work
    4 - Garuda

    edit: WM -> DE







  • I personally like to show how easy it can be to cyberstalk someone.

    I pulled up a friend’s LinkedIn and pasted their bio text into Google line-by-line until I got a trail to a very old LiveJournal which had links to a NSFW Tumblr (before the purge). What led me there was a phrase that they used frequently in conversation and on the bio. It was their “bone apple tea” moment that made it VERY easy to pin down. I also followed the username trail to some fanart on DeviantArt, and a snapshot of an old website on archive.org.

    I present that, then tell them if I can build a profile like this with less than an hour’s work, imagine what data processors can do with the amount of data harvested from voluntarily accepting an “invasion” policy, especially if they (the data processors) are able to automatically match speech patterns to users!