![](https://lemm.ee/api/v3/image_proxy?url=https%3A%2F%2Fsh.itjust.works%2Fpictrs%2Fimage%2Ffd7c48eb-c5f8-4cb0-928c-fd96e549751d.jpeg)
![](https://lemm.ee/api/v3/image_proxy?url=https%3A%2F%2Ffry.gs%2Fpictrs%2Fimage%2Fc6832070-8625-4688-b9e5-5d519541e092.png)
In the best case it could automatically reboot into working configuration.
In the best case it could automatically reboot into working configuration.
It doesn’t matter really, one can write any words on a webpage, but show me the proof e.g. an unique and permanent resulting fingerprint.
I see from topics like this that many people don’t understand fingerprinting, just showing a fingerprint, a soft of ID means nothing. A fingerprint must be:
Banning Tor is sus and not wise. I guess I2P traffic over Tor is barely noticeable for Tor, because I2P is much slower. Especially if you need do it by blocking ip addresses and cannot distinguish Tor nodes otherwise then you do it wrong. And now I2P literally has introduced global IP blocklist because of someone’s opinionated decision.
I’m not so sure what is worse. I wish we wouldn’t reimplement statist practices in computers, as it often not goes well in our physical world, and invent more resources into OS/network security, compartmentalization and privilege separation. But yeah, the reality is it’s easier to put a god-like “trusted” agent in a system. Well, the police need have guns, read all private chats, place security cameras with face recognition everywhere… to do their jobs. Otherwise terrorist attacks or whatever could result in way more damages after all. The same story every time.
BTW, if Windows had been an immutable OS the case would not have been so dire.
Probably it runs with privileges of the OS level, what applications should not do. The second problem is monoculture. To run the same software of a single company an all machines is easy, but…
People in anime are like normal people. They can grow up. Now 14, then 18, 30 or 500.
If you avoid Pepsi, for example, what do you turn to instead?
Tea, probably.
They said he searched online for both Trump and Biden. Maybe it wasn’t matter for him whom from them to kill. Just to kill a person of power as big as the president or a candidate of such country as US, with all modern security measures. Like Unabomber, or like in the film The limits of Control. And he was quite near.
Doesn’t work for Tor Browser also: shows different fingerprints after a full relaunch of the browser.
OK, my fingerprint for Tor Browser is 0b8c195e60af3e2c29ebb8adecb340b1. Is it so unique? What is yours?
All twitter users are Musk’s army, even if they don’t think so.
Be younger.
You actually can use I2P with JS disabled as many eepsites work without it.
NixOS not the major inspiration for immutables, consumer OSes like Android and ChromeOS are. But yes, NixOS has some influence even it don’t get the idea of immutable distros well.
GNU Taler is inferior anyway, and it has been existing for many years with exact zero of usage.
Imagine reinventing Chaumian e-cash 40 year later and promoting it as a innovative approach in digital payments.
Only 101?
After using Silverblue for some time I tried to use Arch again, and pacman had failed at installation process. A easy fix for that is to be like: 1. Get list of all the installed packages; 2. Install all these packages again with --force. But after using immutables the situation is just meh.
And also now I dislike package managers which require to be used with sudo, and cannot ask for permissions with polkit.
So. BTW, I don’t use Arch.
Do not use Apple products. -> Problem solved.
A person can decide if they can execute it somehow. Or a person can hide yourself from the decision and say “the state does not allow me”. And personal decisions are overrated. In the light of death usual rules stop working.