Yeah but with Linux you have to open up a terminal and input cryptic commands someone on the internet gave you in order to stop the distro from spying on you... /s
UnityDevice
joined 2 weeks ago
Yeah but with Linux you have to open up a terminal and input cryptic commands someone on the internet gave you in order to stop the distro from spying on you... /s
Last year I made a fake twitter account using a temp email just to look at some tweets from an artist's account. The fake account had a random gibberish username, and I only used it for a few minutes and logged out. Then, about 6 months later I needed to use it again to check something, so I logged back in and noticed the fake account now had 200 followers.
Draw your own conclusions from that.