Florencia (she/her)
- 5 Posts
- 15 Comments
Florencia (she/her)@lemmy.blahaj.zoneOPto
Privacy@lemmy.ml•Republican plan would make deanonymization of census data trivial
19·6 days ago
Florencia (she/her)@lemmy.blahaj.zoneto
Asklemmy@lemmy.ml•What are your preferred alternatives to Amazon?
17·14 days ago-
Ebay
-
Craigslist
-
Biting the bullet for Facebook marketplace
-
Ordering directly from manufacturer
-
Florencia (she/her)@lemmy.blahaj.zoneto
Privacy@lemmy.ml•"We need to go beyond Signal" – How today's AWS outage shows the weaknesses of centralized apps | TechRadar
313·14 days agoToo late. OP is now noted as a google plant. I’ll stick to more reliable source like the other people on this sub
Florencia (she/her)@lemmy.blahaj.zoneto
Asklemmy@lemmy.ml•What's your favorite accent spoken in English?
2·15 days agoGerman accent
Florencia (she/her)@lemmy.blahaj.zoneto
Asklemmy@lemmy.ml•Is it possible the US is quietly supplying Ukraine with something as good or better than the recent missiles they rejected Ukraine's request to supply?
1·15 days agoIf they are making their own then they aren’t using them. I refuse to believe that they wouldn’t if they could. Therefore the US has probably told them to not use them in exchange for steady re-supply or intelligence access.
Florencia (she/her)@lemmy.blahaj.zoneto
Privacy@lemmy.ml•Which 2FA physical key do you prefer?
1·16 days agoYubico keys. Never had an issue after years of dangling on my keychain. They get replaced with upgrades to the key before they can break.
Florencia (she/her)@lemmy.blahaj.zoneto
Asklemmy@lemmy.ml•Is it possible the US is quietly supplying Ukraine with something as good or better than the recent missiles they rejected Ukraine's request to supply?
1·16 days agoNo. Too many eyes on the area. Not even counting hungry journalists trying to break a story.
Florencia (she/her)@lemmy.blahaj.zoneto
Privacy@lemmy.ml•ELI5: Is browsing on 4g/5g networks less secure than on your own wifi?
1·16 days agoUsing a VPN makes the original question redundant. The VPN would have everything super encrypted for either home wifi or home 4g/5g. Your question transforms into “can i trust this vpn company”
Florencia (she/her)@lemmy.blahaj.zoneto
Asklemmy@lemmy.ml•If a block some user/community/instance on Lemmy, do we become invisible/incommunicable to each other, or we just won't see each others posts on the feed?
0·16 days agoFrom a technical point, blocking would only be obvious to the blocker. The server would remember your settings and not show you anything related to the person you blocked.
The blocked being unable to see you would require a lot more technical work. Easy if you are both on the same server as the server could register the block. If they blocked is on a different server then both servers would have to accept the block registration. And then another server needs to spend resources making sure that their blocked user gets content filtered out that contains your name from seeing them.
Florencia (she/her)@lemmy.blahaj.zoneto
Privacy@lemmy.ml•ELI5: Is browsing on 4g/5g networks less secure than on your own wifi?
1·16 days agoDecrypting the 4g/5g network will require a key from the telecommunications company. I argue it’s insignificantly less secure because a malicious actor can intercept it and decrypt it if they manage to steal the key from the company.
Practically, only your government would be able to get a copy of the key. But they’d also be able to watch your actual cable internet as well. And when your government gets interested in you then you fucked all the way up.
Florencia (she/her)@lemmy.blahaj.zoneto
Asklemmy@lemmy.ml•How many hours spent on video games is an addiction??
0·17 days agoAs a general rule when it starts interfering with your “higher priorities”, ususally career/family/friends. Calling off work using personal leave for a video game you waited 3 years for is ok. Using the last of your sick leave to get another day of gaming isn’t. Missing events with people you want to have a good relationship with isn’t.
Honestly, pedos & terrorists get the whole world cooperation on doxing them. So if they’re not using a tool or method then it’s not proof against nation states.
Why the need for complete anonymity though? Literally only pedos operate at that level so that nobody can squeal on the others if they are busted (they inevitably need to mess up a real kid because their CSAM isn’t good enough).
SimpleX is currently the best one possible.
All the security of signal without needing a phone number.
Everything can be through tor. Contact link can be formed with a one time use code that you DM someone privately.
Anything more advanced and you’re basically in internet dead drop territory. An encoded message on a pastebin through tor. Congratulations, you’ve entered pedophile/terrorist level security realm.
Florencia (she/her)@lemmy.blahaj.zoneto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•How do I get started if I am in the Apple ecosystem?English
1·1 month agoNot so fast sailor! Do this first
✔️ Recommended: Use Firefox + uBlock Origin. Firefox is the top non-Chromium browser, offering nice security and privacy features. It also boasts the best compatibility with uBlock Origin for effectively blocking ads and other harmful web content. ✔️ Recommended: Change your DNS settings. DNS can enhance the browsing experience by increasing speed and bypassing restrictions, as your Internet Service Provider (ISP) usually offers a slower default DNS that may censor websites according to their preferences. 🧲 For torrenting: Install a reputable torrent client such as qBittorrent. Torrent client is a separate program that is essential for downloading files via torrent files, which is a method distinct from direct downloads. 🧲 For torrenting: Set up a VPN network such as AirVPN or ProtonVPN. VPN enhances online privacy and security by encrypting the connection and masking the IP address, making it ideal for torrenting as it protects your identity, and allows access to restricted content. 🧲 For torrenting: Bind the torrent client to the VPN interface. Ensures torrenting only happen when the VPN is active, lowering the chances of a leak of the IP address to essentially zero.
Florencia (she/her)@lemmy.blahaj.zoneto
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Seedbox: how to start?English
1·7 months agohttps://whatbox.ca/ has been decent for me so far.
They have wiki guides for everything.




