I use Mull as my daily driver. It works well. It tends to break some sites, so I keep Fennec as a backup.
I use Mull as my daily driver. It works well. It tends to break some sites, so I keep Fennec as a backup.
It might be Mint or an issue with your laptop. I’ve been using Arch for a while and haven’t had major performance issues. Before I used Arch, I used Pop!OS and didn’t have any issues either. What are your laptop specs? Have you already looked into Nvidia Optimus? Have you tried other distros?
Checkout Quad9 and NextDNS. I use NextDNS. The free tier NextDNS account is more than ample; I’ve never come close to exceeding it.
Good point. It seems I wrecked myself before I checked myself.
Frankenstein is a surname. The mad scientist’s name was Dr. Victor Frankenstein. Since the monster wasn’t endowed with a first name, the only name it would have is Frankenstein: the same last name as its father.
That was my issue. Thank you very much!
Thank You! I changed the port settings and used the “d” flag and it’s working.
Password manager like Bitwarden. I’d rather they take care of it for me. The consequences would be too great if I messed it up.
The project would only allow “verified” web browsers. This means that the only web browsers you can use are the ones that Google has allowed: owned by big companies. It would prevent smaller, privacy friendly web browsers from being a part of the internet.
Ferb, I know what we’re gonna do today.
That moment when you can’t get the Catrina face paint off.
Where is the data stored? Is it encrypted at rest?
It’s a balance between convenience against privacy and security. The more private and secure you become, the more inconvenient. If something is too inconvenient, people will just work around it: writing passwords on a sticky note because the requirements were too high. It’s impossible to strike the perfect balance. Threat modeling is important. Threat modeling is where you determine what is OK and what isn’t. I have an Instagram account because my girlfriend likes to send me funny videos. I only use it to watch what she sends me, and I have it isolated from the rest of my apps. I could delete it, but my threat model allows it.
Side note: anything cryptography and computing is basically magic.
In this context, it means praiseworthy. If a person describes something as based, they are commending that thing; however, it is also commonly used in an ironic way. People will praise something that shouldn’t be praised in situations where it would be humorous.