Tech? I would really love to join reverse engineering community or two.
Tech? I would really love to join reverse engineering community or two.
If you log in w/ tor to account you’ve logged it w/o it you deanonymise yourself and it makes no sense.
Why didn’t anyone mention burning it to ashes?
It’s not, i’ve got two non-tech friends on my private instance, biggest issue was me nuking wrong folder on server. You just need a good client, i go with Dino for desktop and monocles chat for android. My non-techies are mobile-only and i and my techy friend are on Dino on desktop, only feature it lacked is group calls which i’ve monkeypached with a feature for my bot that generates Jitsi invites.
Tried and can confirm almost every webpage even static ones which could be simple as rock needs truckload of bloat js code to be loaded from ext servers.
To add to Possibly Linux’s precise and correct answer: Those leaks are made by hackers taking over organisation’s servers and publishing what they found, noone can control it not even orgs in question.
torrents have trackers, special servers that keep track of who’s got which parts of a file.
In fact it improves search results, when you have multiple search engines turned on searxng does some sorting or filtering thing and manages to filter out lots SEO crap and ads from search.
You need optimus or bumblebee to do that. Just beware those are pain to install.
Aside from reverse image search Yandex is wonderful for obscure things like software reverse engineering.