If I threaten a politician to kill them
Implies that the threat itself is what kills them. Or that the intention of making the threat is that they will die as a consequence of receiving the message.
English is a Subject-Verb-Object language. What you should have said was:
If I threaten to kill a politician
With all the suffering that they’ve been inflicting upon Windows serfs, he’s more than earned it. If it were up to me, I’d up his pay tenfold. I can’t wait to see what MS has in store for the tech cattle in 2025!
You won’t do it.
The approach once worked, but that was back before browsers began including the likes of things like advertiser IDs and other extremely high entropy attributes that no average person would ever think to disable. Contemporary hide-in-the-crowd strategies are mostly curated within efforts like Tor browser where everyone is encouraged to use the exact same configuration. But then it’s still a numbers problem. If only two attendees decide to hide their faces with party masks to a soiree of 100 people, one (large scale observer) only need check the guest list and use process of elimination to determine the identities of the 2% “hidden” attendees.
Somebody can, and probably will, come along and refute this assessment. I am not entirely convinced myself that it is a losing strategy yet. I’m open to hear opposing takes.
Privacy Badger: IIRC Privacy Badger operates by logging third party domains connections on a per-site bases, and only begins to actively block connections once a domain seen across multiple visits fits the profile of a likely tracker.
Nvrmnd, they’ve changed how PB works and it is now closer to a list-based tracker blocker (enumerate badness):
So they’ve since corrected one of the core issues with PB. Still it is weak. To see why, please glance through The Six Dumbest Ideas in Computer Security.
uBlock Origin in advanced mode, with default-deny rules (only allow assets by exception) is going to be much stronger at blocking crap.
Personally, I use uMatrix with pretty much all asset classes blocked by default. I never see popups. I never see banners begging “please allow our cookies, pleeeeaaase!”.
In addition to the code being freely available, as others have pointed out, the developer has attended some number of software conferences at which his knowledge of this subject matter and this project makes itself evident.
What I like is that JShelter doesn’t try to “hide in the crowd” with its spoofed attributes which is IMO a failing strategy as the crowd increasingly becomes atomized by adtech.
Even they don’t realize that what they spout is just a safe proxy cover for the real issues they are unable to articulate.
No, that would be weird.
I sit facing the toilet so that I don’t have to turn around to push the flush handle.
The same country that has mobile euthanasia vans?
Is the part about being able to socialize also a mythic fantasy? Where ever do people work that they find the time to have conversations?
It does make sense from the perspective of “destroy the public’s perception of ‘unsafe’ USB storage so that we can push them to use our ‘safe’ cloud storage (on our terms) instead”.
…with usbguard installed and configured with a default-deny policy.
You were on the right track with the HTPC. It just needs an appropriate input device. I recommend:
The best “TV remote” in the world.
TIL jump hosts are an existing concept
I do use ClamAV. Most users just run some sort of daily scan, but this is remedial and not preventative.
In order to truly harness clamav’s potential, you need to configure clamonacc on-access scanning. It passes items off to clamd with lowered privileges and prevents file access through inotify until its realtime scan has cleared.
I would consider major centralized social networking platforms to be equivalent to television today as it holds captive the masses in much the same way, but with even finer grained control.