Foreign to who?
Foreign to who?
Holy hell
KDE and Gnome haven’t been stable or usable for the past 20 years, but will become so this year for some reason?
So Copilot Runtime is… Windows bundling a bunch of models like an OCR model and an image generation model, and then giving your program an API to call them.
Do they “give high rankings” to CloudFlare sites because they just boost up whoever is behind CloudFlare, or because the sites happen to be good search hits, maybe that load quickly, and they don’t go in and penalize them for… telling CloudFlare that you would like them to send you the page when you go to the site?
Counting the number of times results for different links are clicked is expected search engine behavior. Recording what search strings are sent from results pages for what other search strings is also probably fine, and because of the way forms and referrers work (the URL of the page you searched from has the old query in it) the page’s query will be sent in the referrer by all browsers by default even if the site neither wanted it nor intends to record it. Recording what text is highlighted is weird, but probably not a genuine threat.
The remote favicon fetch design in their browser app was fixed like 4 years ago.
The “accusation” of “fingerprinting” was along the lines of “their site called a canvas function oh no”. It’s not “fingerprinting” every time someone tries to use a canvas tag.
What exactly is “all data available in my session” when I click on an ad? Is it basically the stuff a site I go to can see anyway? Sounds like it’s nothing exciting or some exciting pieces of data would be listed.
This analysis misses the important point that none of this stuff is getting cross-linked to user identities or profiles. The problem with Google isn’t that they examine how their search results pages are interacted with in general or that they count Linux users, it’s that they keep a log of what everyone individually is searching, specifically. Not doing that sounds “anonymous” to me, even if it isn’t Tor-strength anonymity that’s resistant to wiretaps.
There’s an important difference between “we’re trying to not do surveillance capitalism but as a centralized service data still comes to our servers to actually do the service, and we don’t boycott all of CloudFlare, AWS, Microsoft, Verizon, and Yahoo”, as opposed to “we’re building shadow profiles of everyone for us and our 1,437 partners”. And I feel like you shouldn’t take privacy advice from someone who hosts it unencrypted.
Well you can start by trying on purpose to make an SCP wiki level horror scene. Then the bugs are features!
That should just be the title bar now
But now the windows one is getting scrapped whereas Waydroid is presumably sticking around.
How do snaps make money for Canonical?
shit how do you clean the dispenser tubes
I thought “where the hell does Twitch keep coming up with these absurd sex-related things to ban?” and it turns out it’s just this one lady and inventing them is her shtick and she’s single-handedly keeping like five journalists employed.
There oughta be a law
I don’t think that’s true. For one thing, it’s easy to buy a car from a random person, without granting any permission to any car company to download stuff from your car and sell it. If a car company were to access your car without permission, you could sue for damages (see OP).
Zelda + Scat = Relaxing The Legend of Zelda Jazz Covers
$PIKACHU = $ZELDA + $CAT
“Yeah this sounds like a Phil Nash sort of problem, I’ll just stick him in here.”
The rust compiler produces a flawless understanding of your code, and then quits out because understanding that code is a Nightly-only feature and you’re using the stable build.
LocalSend is nice because you can set it up in a push configuration instead of a pull. I used to set up a server like that where I had the file, then go over where I wanted it and navigate and pull it and wait for it to download. But with auto-accept on on LocalSend I can push the file and by the time I get over to where I sent it it is mostly there already.
One approach here is the Ubuntu CD/DVD images. You can (could?) use the disk as a package source for apt
to install from.
That’s what the BSOD is. It tries to bring the system back to a nice safe freshly-booted state where e.g. the fans are running and the GPU is not happily drawing several kilowatts and trying to catch fire.