Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
542 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
https://unixdigest.com/articles/the-main-differences-between-openbsd-freebsd-netbsd-and-dragonflybsd.html

The main differences between OpenBSD, FreeBSD, NetBSD and DragonFly BSD
Published on 2023-10-30.
People who consider trying out one of the different BSD variants, OpenBSD, FreeBSD, NetBSD or DragonFly BSD, often ask about the main differences between the four projects. In this article I am going to address that issue.
Even though all the four BSDs share a common ancestry with the Berkeley Software Distribution (BSD), and even though all the BSDs can serve as a multi-purpose operating system, they are independent projects and they are very different.
None of the BSDs are distributions, they are all complete operating systems.
https://12bytes.org/the-firefox-privacy-guide-for-dummies/

You're aware that unethical companies such as Facebook, Instagram, Google, YouTube, advertisers, your ISP and governments are spying on your activities and selling the data they harvest or using it to profile you, even if you may not be aware of how they're doing it. You're concerned about this invasion of your privacy, but you're wondering 'yeah, but what can a tech-challenged dummy like me actually DO about it wise guy???'.
Welcome to the 'dummies' edition of the Firefox Configuration Guide for Privacy Freaks and Performance Buffs!!!
The goal here is to provide a simple guide, to the extent that's possible, which will yield a privacy enhanced configuration of the Firefox web browser whilst breaking as few websites as possible. That said, be prepared to put a little more effort into your surfing activities, at least until the dust settles. The pay-off will be a much faster, cleaner, less annoying web that is less able to track and profile you. Note that i said "less", not "not".
WARNING: This guide is not intended for use with the Tor browser which is an already hardened version of Firefox. Configuring the Tor browser as outlined here would likely result in DOOM!

Table of Contents
Introduction
Catching the Fox
Profiling the Fox
Training the Fox
Pestering the Fox
Fattening the Fox
Training the Foxineer
Importing stuff from an old profile
What to do when the Fox bites
The Fox hole
WHAT THE FOX!
The last word (i promise!)
Further resources
Revisions
https://12bytes.org/the-military-intel-foundations-of-social-media/

Feds and social media

Documents leaked by Snowden show that Facebook, Google, Microsoft, Yahoo, PalTalk, AOL, Skype, YouTube and Apple give the NSA direct access to its users' information. According to the documents, Dropbox also joined this list (one of the many reasons we recommend our readers stick with secure alternatives to this service).
Privacy + Secure Tech Corner Channel 🛡️
Search engines https://digdeeper.club/articles/search.xhtml
Quote
You might be wondering as to why I didn't review the Cloudflared engines properly. That is because using Cloudflare is such a big flaw that the other qualities of the search engine don't even matter. Cloudflare is a third party that MitMs your connection and steals your search query and all other sent data, blocks TOR, and is also able to rewrite the served page without you knowing. I can't see anything possibly worse than that.
Forwarded from ATT • Tech News (aan (placeholder))
Thought the Intel Arc B580 was insane enough? Well, Maxsun Intel Arc B580 is even more insane.

What does it offer? 2 M.2 slots. No, I'm not joking, one wasn't enough. The GPU seems to be based off of the recently announced iCraft Arc B580 12G, with both of these GPUs using the same PCB. In fact it pretty much seems like Maxsun just soldered the M.2 slots on the motherboard.

Arc B580 is going REALLY crazy.

🔗 Read more!

👨‍💻 @agamtechtricks
Forwarded from vx-underground
Ransomware payloads often skip over executable files to save on time and performance.

Replace every file extension on your computer with .exe, .dll, or .sys to prevent ransomware attacks.
Forwarded from It's FOSS
A better Thunderbird? Let's take a look!

https://news.itsfoss.com/betterbird/
Forwarded from Hacker News
Twtxt is a decentralised, minimalist microblogging service for hackers
Article, Comments