These may be depressive symptoms. It may be a good idea to find someone close to you to talk to, and keep them up-to-date about the situation. Make sure it's someone you trust and can open up to. It may also help to seek professional help if you feel it is getting worse or if you experience physical symptoms as well. We all have a need for genuine human connection, and talking to someone can help. It may make it easier for you to get back in touch with your more positive emotions, to 'snap' back into that positive or happier state of mind where things make sense like they usually do. Hope this helps. Much love from the Netherlands. ❤️
heisenbug4242
It seems i2pd is a healthy project, judging by the frequency of updates to the docker image as well as the github releases going back 10 years.
If you want a solution that works on every Linux distribution, you can install Docker and run i2pd (a high-performance C++ variant of I2P) as a container. The Docker image is: purplei2p/i2pd Or..., even easier, you can run i2pd via flatpak (also works on every distro). See here: https://i2pd.readthedocs.io/en/latest/user-guide/install/ Hope this helps 🙂
Note that this file hasn't been updated in years and it's not meant as a "stop every exploit" solution. It helps, though.
I routinely skip arstechnica articles. Too much sensationalism (for example the notorious ZFS article). It also collects way too much data about its visitors.
Advertising should be illegal. A good case can be made for this. A short documentary: https://m.youtube.com/watch?v=McsqJnRF_XQ
Pinchflat looks good indeed! Self-contained, no dependencies, unlike Tube Archivist which depends on Elastic which has a shitty licensing model (not in the spirit of OSI open source).
Verify the SHA-256 or SHA-512 hash after downloading. Most Linux distros publish such hashes.
If you say it quickly enough it may sound plausible to some but this is not how battery technology works, as explained by @[email protected]
Perhaps CryptPad fits your needs. It's an open-source privacy-aware collaborative office suite and storage solution. It's end-to-end encrypted, so even if it gets hacked no usable information is leaked.
If you're willing to learn, look up apktool and ghidra, as well as the Dalvik bytecode reference. Some apps can be relatively simple to crack using one-liner Dalvik modifications. Others may require analysis and patching of the binary libraries. Some Unity games include debug symbols, which can be inspected using Il2CppInspector which makes the binary code easier to understand and easier to find the proper point for a crack. Start by extracting apks, and try something simple like removing the INTERNET permission from the AndroidManifest, to see if the app still works if you rebuild the apk. That improves privacy. After that, try removing more permissions or making Dalvik patches or even binary patches. A great game to start with is Terraria, as it can be cracked purely by modifying Dalvik bytecode. I'm not in a position to help further but felt I wanted to share this for educational purposes. Learning these internals is fun. You can even learn to degoogle your current Android ROM by applying a signature spoofing patch and include microG instead as a replacement alternative to google apis. Hope this helps. 🙂
/dev/disk/by-id/xxx works for me. Never made a mistake.