

I personally find it easier to use a separate browser for anything I don’t need to be logged in for. It deletes all cookies when closed. No need to trust the untrustworthy.


I personally find it easier to use a separate browser for anything I don’t need to be logged in for. It deletes all cookies when closed. No need to trust the untrustworthy.


I assume Valentine’s Day.


I don’t think so? Just looked up the definition of a parasite and it needs to live at the expense of the host. Gut bacteria are beneficial I assume, so they aren’t parasitic.


It would only be parasitic if a round table was forced to be square against its desires. If a table wants to be square, the corners are being helpful.


http://mymindblewup.com/ for all your cow stacking needs.


I always assumed that every one of them had made out or had sex with her at one point.


Snowden showed us ages ago that all phone conversations are recorded. This is fact.
Do phones record what we say outside of phone calls? If you have voice control enabled, yes.
Do phones listen even if that isn’t enabled? Probably sometimes, but I don’t know that for sure.


If a specific guy was following you everywhere, that wouldn’t bother you? Having a stalker wouldn’t be a big deal?
I see no reason why it’s less disturbing if it’s done by my own phone.


There are a lot of Linux distros. Capitulation to age verification is a good way to know that a distro is compromised generally. Now I need to figure out how not to use systemd.


If full body transplants become possible, the most obvious way forward is growing bodies in vats. When you hit 30 or 40, you start up a new body using your own DNA and swap over at age 50 or 60.


I used to invert x and y. But at some point I realized that all modern games seem to support non-inverted, but only some support inverted on both axes, so I just learned to play non-inverted to save myself the hassle.
Remember that woman who was arrested because her phone indicated she was at a house that was burgled at exactly that time? Police just do a dragnet. Turns out she just drove by the house as it was happening.
In the above example, imagine someone did an anti Israel terror attack in the area. Everyone mentioning such things will be found via dragnet searches and who knows if you just happen to have been nearby when it happened while also making suspicios SMS messages.
Dragnets are profoundly likely to catch innocent people. Protect yourself from them however you can. That should be in everyone’s threat model.