a “reverse bribe”, as is typical of nintendo
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
a “reverse bribe”, as is typical of nintendo
System on Chip. Basically the CPU, and a lot of other hardware often including the sensors and wireless adapters. So, a very important, core component of any modern device.
actually its not perfect with comments either. I keep 4 notifications in my inbox unread in case I could find out where I got them, 2 of which is inaccessible because they themselves were deleted and I can’t go back to see what was its parent thread
or rather: oh silly you were so clumsy that you disabled recall by accident again. let us be so kind to re-enable it for you
probably this is it’s manifestation: https://github.com/LemmyNet/lemmy/issues/4204
I think Dessalines has had some similar idea he has mentioned multiple times a few weeks ago
I have a few hundred public torrents active, and they all have peers, even the “fringe” ones. maybe your statistics is right, but even then it has value. I don’t care about leechers if it improves the service for us too
thanks Microsoft for hiding extensions by default!
and over public DHT. we can share magnet links in this community, and why keep it to us only? if we keep it public, the survivability of torrents can even improve
because it is not a free service, you are watching ads.
I may accept it if it was not bundled with data mining. and if they wouldn’t constantly increase prices
they don’t have any business with my fucking personal phone! where do you live, in the USA? if I only use an old dumb phone, they have no business about it! they can reach me when necessary, and that’s all they need to care
there is 0% risk until your country makes a law that prohibits any and all P2P communication. That would not only break torrents, but would thwart signal/telegram/whatsapp calls too, Jitsi meetings, probably google meet and zoom too, as all those use P2P traffic for performance.
So far there are only such laws in far east countries, and the official java I2P router is smart enough to not participate in routing when you are in such a place.
Also, I think for routing to work you need to open a port, without it that won’t be done.
as a node
I know nothing about seedboxes, but on a computer you can point multiple torrents to the same directory. If you make it read-only, by permission or mount options or whatever, the torrent client can’t even fuck it up
yeah take it up with a blackholed email address, while being locked away from public transport and a lot of otherbasic services that’s literally needed for life, for saying hard no to literal malware on my phone? I think you’re a little backwards.
my employers have never specified any requirements for my phone, sorry but wtf is that?
you are totally right, it was created for the baby, in the name of her
I understand you. But I think what I recommend can be implemented very simply: not uploading anything anywhere. that’s really the simplest, and friends should not feel entitled to anything, because they aren’t. if they (the friends) don’t understand it, that is a people problem of selfishness
Obviously I didn’t talk about the wife’s age, but of the newborn for whom the wife has made a google account
I guess the hypercapitalist definition of failed is that people bought them, and then sales & revenue dropped. Like it would happen with a quality product.