this post was submitted on 07 May 2024
519 points (94.5% liked)

Technology

57432 readers
3911 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 4 points 3 months ago
[–] [email protected] 0 points 3 months ago* (last edited 3 months ago) (1 children)

Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.

[–] [email protected] 3 points 3 months ago (5 children)

Well not exactly. They might be reading the metadata of your lower level packages.

Unless you're not using encryption, then wth are you even doing?

load more comments (5 replies)
load more comments
view more: ‹ prev next ›