Sal

joined 2 years ago
[–] [email protected] 13 points 3 months ago (4 children)

Check in your settings whether you have disabled the visibility of bot responses. This can happen if bots replied to you and your settings are set to not see them.

[–] [email protected] 6 points 7 months ago

Dragonfruit lemonade (agua de pitahaya) is delicious!

[–] [email protected] 2 points 8 months ago

You can take a lot of control by using search commands. Here is a list of commands for Google, for example: https://www.lifewire.com/advanced-google-search-3482174

By using commands like these you can narrow down your searches to the point that the impact of SEO is small. You give a much greater weight to the conditions that you have chosen.

It can be a bit of work to write a good search query, but the database that search engines search through is massive, so it makes sense that it would take some work to do this right.

[–] [email protected] 30 points 8 months ago (4 children)

Search engines like google aggregate data from multiple sites. I may want to download a datasheet for an electronic component, find an answer to a technical question, find a language learning course site, or look for museums in my area.

Usually I make specific searches with very specific conditions, so I tend to get few and relevant results. I think search engines have their place.

[–] [email protected] 17 points 9 months ago (1 children)

Is the fact that I recognize this comment evidence that I use Lemmy a bit too much? 😅

[–] [email protected] 2 points 9 months ago (1 children)

I will also pay close attention and see if I can catch that happening.

[–] [email protected] 4 points 9 months ago (1 children)

I think we might see one or more “trusted fediverse” groups emerge in the next few years, with instance admins making commitments to security controls, moderation, code of conduct, etc.

There is now at least one system in place for admins to vouch for other instances being non-malicious, and to report suspected instances. It is called the fediseer: https://gui.fediseer.com/

[–] [email protected] 7 points 9 months ago (3 children)

Do you see a random nickname from a stranger, or a nickname of an account that was previously logged into using the same computer?

What is an open account sharing channel?

[–] [email protected] 15 points 9 months ago

You can set up a personalized RSS feed with Feeder. It will take a bit of effort to set up, but you can create a feed that is very well tailored to your interests. You can get news feeds but also subscribe to other kinds of content, like scientific publications and financial statements.

[–] [email protected] 2 points 9 months ago

I have the Tianje MF903 (https://nl.aliexpress.com/item/32719535459.html), which I bought early 2022.

But just now I have done a search and I see many more pocket wifi routers now. Unfortunately I can't tell you if they work well, or if it is also possible to change their IMEI easily. The one I have is functional, but it doesn't have a very long battery life.

[–] [email protected] 5 points 9 months ago

And the audacity to talk about metadata when Telegram accounts still require a phone number today (as they did five years ago when this post was written) is just… 🤯

Not only that, but I believe that they actively try to prevent VoIP numbers from being used to create accounts.

[–] [email protected] 6 points 10 months ago (2 children)

Almost all countries require official authentication to activate a SIM card.

Fortunately not in the Netherlands. I don't think that's the case in the rest of the EU. I can use free sim cards as much as I want!

When communicating with cell towers, a phone will also broadcast its unique IMEI identifier. So, even if you swap the SIM card every day, your IMEI is still being broadcast the same.

Changing the IMEI of a phone in the EU is illegal, unless the manufacturer consents: https://www.legislation.gov.uk/ukpga/2002/31/section/1

So... I have a Chinese 4G mobile router, and the manufacturer gives me the permission to change the IMEI as it is an integrated feature of the device. I use that for my data. The data codes I purchase small quantities in bulk with cash, and I can access the router via its ip from my phone's browser to send the SMS messages to activate the data codes as needed. Since WiFi connections are abundant around here I keep these codes for emergencies. I can go a few months some time without activating data codes. I mostly use them when traveling internationally.

view more: next ›