Did you try changing the timeout time value? I think the default is 3 seconds…
@dukethorion@lemmy.one @dukethorion@lemmy.world
Did you try changing the timeout time value? I think the default is 3 seconds…
Seems like they stonewalled anyone that would want to develop an app.
EU: Allow users to download outside your Store.
Apple: Ok. They just have to register with us two years ago, comply to every spec and be approved by us, and they must have a million installs on our Store last year to qualify.
EU: …that’s not what we meant.
Apple: 😎
100% this. They already got caught sharing your health data with Facebook. Don’t think they (insurance companies)won’t buy DNA data en masse.
And they still recommended two 256mb sticks instead of one 512…
That’s gonna pull right out…
OP wanted a Chromium browser that wasn’t a massive privacy invasion. With Google stuff removed, it’ll be good enough. Add uBO and ClearURLs.
What’s wrong with ungoogled-chromium?
Maybe TOR uses FF because it’s easier to modify for their purposes.
Others would call that “insecure”
You’re wasting your time. Internet Commies skipped/haven’t read the source material
The VPN isn’t generating the requests. Other apps on your device are. Run a VPN for a while and look at data usage by app. I guarantee your VPN app will be the highest (all the other apps data gets funneled through the VPN).
Nobody in this entire thread of FUD has posted a single link to support any claim of Russian data intrusion.
Tomorrow’s news:
7 Indians killed “under mysterious circumstances”
I disagree with the idea that one commenter opined: “Monero is not a savings account”.
Who are you to tell me what to do with my XMR?
That being said, I am not opposed to the idea of implementing some kind of condensing/snapshot that some have outlined here.
The question I’d ask is if it would ever be possible for someone to use that data maliciously?
Stop using the DDG Browser.
Librewolf updates all the time, probably weekly (I don’t watch it that closely).
Sentinel dVPN does/did the same thing. You’d connect to their network, pay a Node operator directly with the network’s coin, and you’d use their connection. Don’t know how safe it was, with respect to seeing the through-traffic, but it did work.
These people are definitely not “the first”
How would this be different from any browser that has Wikipedia search built in?