![](/static/61a827a1/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8f2046ae-5d2e-495f-b467-f7b14ccb4152.png)
“Christian”
no
The Post Ninja
“Christian”
no
The prophecies about the end times, about now. One of them says “and the love of the greater number will grow cold”. This, right here. The last few years.
Mmmmm, Hurricane Season ought to be fun this year, especially since there’s a nonzero chance we won’t have accurate reporting, if any.
Watch this be a 400 IQ move for Musk to cut away the one thing that his Red peers don’t like: icky clean energy things
FORTRAN my man
However, allowing ads means allowing tracking. You got corelation with the ads being served from ad brokers, who can now see what sites you been on and have a record of where you’ve been.
Don’t use your Tor session to sign in. Also banks will probably not let you sign in via Tor.
Yes, turning off adblocker is worse. You should be using Tor browser with default configuration to browse privately, and never sign in to anything to further avoid getting tracked.
Browser fingerprinting takes measurement of things the browser exposes. If a browser exposes installed extensions, this can be used to corelate information. If awebsite checks if the browser loaded something or not, that also can be used to corelate.
Example, you (ip address xxx.xxx.xxx.xxx) visited this website (trackingsite.xyz), with a screen resolution of 1920x1080, using a (Mozilla/firefox) browser. The three trigger pixels did not load, meaning you’re using an adblocker, and the remote font loaded from localhost, not google. Your canvas, microphone, and camera are all blocked. Your browser also responded to an api ping for (useful extension). Interesting. This same configuration was also on (othertrackingsite.xyz) and (definitelyalegalsite.xyz), both of which a browser with the same info navigated to for at least 5 minutes, so we know it wasn’t a mistype. This same browser configuration was seen regularly browsing these sites on [days of the week] at [time of day], indicating a regular habit.
We know who you are and where you have gone.
pony on the front, lol
Ironically, the Aztek is way better, despite its age…
Great news, if it was 2007 when this hardware was actually in use…
And yet, state actors have done exactly what you’ve laid out. This is challenge accepted to a hacker.
Ah, yes, I see the Year to Ierom ratio is heavily stacked in the Ierom end.
Nice AI graph.
The Bible’s track of history is unique in that it doesn’t just show when the people written about did good, it also shows when they did bad. David was good, until he got into that affair with Bathsheba, and indirectly got her husband killed in battle. He was called out on that part by a prophet speaking in behalf of God, and the only reason he lived was that he repented, but he still lost their first child because of it.
Solomon was the king with a thousand wives. He asked God for smarts when presented with an option to ask for anything and be granted it, and he was granted that and more for thinking spiritually and not materially, but then he started getting into the whole wives and concubines thing. Another example of “started out good, but then got sucked into doing bad”, as he was given advance prophecy that Israel would be broken into pieces over this. Which happened when his son took over and made things worse.
If hypervisor security is an addon I can add via a suite of packages, okay. But, I don’t see that. Besides, OP is asking about why it isn’t part of the system natively. What’s the fault in the point?
Incorrect. The difference is not that there’s a server edition or desktop edition (which for many linux distros, there very much are server and desktop editions, even if the only difference is which packages are installed by default), but that when you properly setup a server with internet-exposed services, you usually are smart enough, have gone to school for this, learned from experience, or all of the above, how to secure a linux system for server use, and should have a configuration setup that would be inconvenient at best for a desktop, but is more secure for the purpose of a server. In addition, when running a server, you stick to what you need, you don’t arbitrarily download stuff onto a server, as that could break your live service(s) if something goes wrong.
The average desktop user does not have any of that experience or knowledge to lock down their system like ft knox, nor do they have the willpower to resist clicking on / downloading and running what they shouldn’t, so if most of everyone stopped using Windows and jumped to Linux, you would see a lot more serious issues than the occasional halfass attempt at linux malware.
If a browserjack malware does a complicated zero-click attack to gain root when you accidently typo a website, unfettered access to the system by root is a big problem. This is why SELinux exists. This is why browser sandboxing exists. This is why virtualization of modules and drivers and so on exists. This “security theatre” as you call it is to provide protection. Is protection guaranteed? No, but it’s the difference between locking your door at night and leaving it wide open.
Reaction