![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
Yeah the colors come from the os, my keyboard shows the monochrome one when I pick it. That was all very interesting!
Yeah the colors come from the os, my keyboard shows the monochrome one when I pick it. That was all very interesting!
Third and fifth result are about the correct one
Here (didn’t find the right one, almost)
deleted by creator
deleted by creator
Here are the same queries with Kagi (I was interested to see the difference)
Something like this is a good start! I use transmission as the torrent client instead of deluge. Also added a service for my vpn and use that as the network for the tranmission service so all traffic is routed through the vpn. https://ochoaprojects.github.io/posts/PlexAutomation/
deleted by creator
Personally love Piped and the LibreTube app. I’m using the smnz.de instance for steaming and adminforge.de for authentication. Been super stable over the last few months. AFAIK Piped acts as a proxy between you and the yt servers so they have no chance to gather data about you. Not sure invidious works the same.
Just use an alias, it’s anyway a good idea to find a provider that lets you create unique aliases for each account.
Been using DuckDuckGo for a long time but I recently trialed Kagi and have been quite impressed! It’s not free but hopefully it keeps the enshittification away for a bit longer.
Got in touch with ProtonVPN support and asked about this. Here’s their reply:
Our engineers have conducted a thorough analysis of this threat, reconstructed it experimentally, and tested it on Proton VPN.
We concluded that:
- The attack can only be carried out if the local network itself is compromised
- Our Windows and Android apps are protected against it
- For iOS and macOS apps, you are completely protected from this as long as you’re using a Kill Switch and a WireGuard-based protocol (our apps use them by default, and if a user wants to use something other than WireGuard derivates, they’d have to manually set it up). Note that Stealth, WireGuard TCP and Smart protocol on iOS/macOS are all WireGuard-based.
- For our Linux app, we’re working on a fix that would provide full protection against it.
Have you seen how fast printers with stepper motors can get? They print benchies in less than 3 minutes. The bottleneck is not the motion system, it’s either the hot-end or the part cooling. Also stepper are super accurate and very flexible. Drivers are advanced and can tune for torque, speed, sound etc. Collision detection and skipped step detection is also a thing.
Can we get image upload back?
Rust or bust