Obey your main
jim3692
my question was not directed at you
Sorry for that, but you could say "it's NoneOfUrBusiness" (their username)
I used to watch The Hated One, who has also made similar recommendations for strikes. He has suggested the use of Briar, as it can fallback to Bluetooth connectivity.
However, I mostly wanted to point out that burner phones is not the answer for everyone. People need to be familiar with their local laws to stay safe.
In some countries, like Greece, you can't use an unregistered phone number.
Since phone numbers are tied to people's identities, does it really matter whether you use a burner or your main?
Σκορδοπατατάκια
Don't let him distract you from the fact that you can't spell "advertisements" without semen between the tits
Finally! Someone said it! My company changed my work laptop to a Mac. It's been a couple of months, and I still haven't got used to the desktop environment. Navigating between open windows with regular mouse/keyboard is a pain.
I find window grouping very annoying (this is also true for Gnome). What makes it even worse, is that the tilde is next to the left shift, instead of being above Tab. I think that's because we have British keyboard.
No, we need massive data centers for LLMs and data analysis for targeted ads /s
There is no such thing as idiot-proof steps to tamper the registry. Most of those registry keys are not documented, and it's very hard to be completely sure about what you are touching.
If you need a debloated experience, install LTSC.
Unless you run a custom ROM, like LineageOS or GrapheneOS, you most probably have some Meta apps installed at system level.
This is Meta Services, as a system app which can only be disabled, on my work Samsung.
An important detail that is missing here is how deallocation works.
When an application tells the system that it no longer needs a chunk of memory, the system does not erase the data from that region. It instead allows other applications to take control of that chunk.
Imagine it like renting a room, but you keep a copy of the key before checking out. You have supposedly left the room, but you still have access to it.
In the software world, this is unintentional behavior. In the real world, it would look like you accidentally return to that room.
Or, like you checkout, but your friend still has a key. Without knowing that you checked out, they return to take a bath. If a 3rd person knows about this miscommunication, they can rent that room, and steal your friend's money during the bath.