@CowUrineCures@mastodon.cloud can you post the direct url? all links count as 23 characters, not more - not less. please don't use url shorteners

Notopygos boosted

@amolith@masto.nixnet.xyz Adguard intercepts all outgoing web requests, also if you use their dns service then its equivalent to running pihole/ other dns based blockers without consuming resources on client side.

Notopygos boosted

Glad you asked!
1. Pages load twice as fast
2. Laptop battery lasts longer
3. My privacy isn't invaded by 50 different douchebro Silicon Valley companies
4. Your fucking site doesn't slow down my computer to a crawl and I can actually read your fucking articles

@sir why not disroot, riseup and cock.li? I think they are the only good free email providers.

Notopygos boosted

11 months ago the CTO of ProtonMail told me that he was "pushing as we can" to open-source the proprietary paid bridge they use as a pathetic excuse for supporting standard, open protocols like IMAP and SMTP. Today it's still paid-only proprietary software.

ProtonMail is a scam.

Notopygos boosted
Notopygos boosted

#2176 "How Hacking Works" 

If only somebody had warned them that the world would roll them like this.

Notopygos boosted

bash vs zsh

the heck is a zsh
can't even pronounce it
not a verb
dumb name

has a meaning
everyone can pronounce it
gonna bash you
has "bourne again" in the name that's cool

answer (?) 

@Algot i think i know this

swiss cheese
ex: my knowledge on this topic has more holes than swiss cheese

answer (?) 

@Algot blank peter?

i'm not american so just a guess

Notopygos boosted


@Algot oops! didn't notice the 'T'

(look @answers) :blobshh:

Notopygos boosted
Notopygos boosted

My life improved dramatically when I finally understood why the sky is blue, like really why.

Notopygos boosted

The OpenPGP keyserver network is at risk of collapse. gist.github.com/rjhansen/67ab9

I've been using OpenPGP for a long time now; at $lastjob I signed 99% of all my outgoing email, for example. I do not now, and never have, used the "web of trust". I directly manually verify every key I have in my keystore. If someone else signs my key for me, I thank them and keep the email, but don't publish the results. (With one exception for a period where it was looking like I'd have to become a Debian contributor).

I've phone up organisations and asked for their key fingerprints (yes, including CERTs). I've printed my fingerprints on business cards. I've used keys from the keyservers, to communicate with people that I know but don't happen to have the current key for.

I have never trusted someone elses' signature on a key, because I don't know if they have the same standards as I do.

Notopygos boosted
Show older

Notopygos's choices:


The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!