moseschrute

joined 2 months ago
MODERATOR OF
[–] moseschrute@lemmy.ml 1 points 5 days ago

Appriciate you taking the time to try it! If you have time time, could you right click and "inspect element”? Then go to “console”. If possible could you paste everything in console in a DM to me? If you dont see “inspect element” as an option, then there is probably something else going on.

This sounds like it might be an issue with the app itself, not BigSur. Might be able to get it fixed easily.

[–] moseschrute@lemmy.ml 4 points 5 days ago (2 children)

It might actually just work. The build I’m distributing is a universal build that should work on Intel and Apple Silicon-based Macs. I’m not 100% sure what the minimum macOS version supported currently is.

I would say just try it, but I’m curious what macOS version you are on and if it works. I’ll see what I can do to expand support to older versions if people want that.

[–] moseschrute@lemmy.ml 2 points 5 days ago

I will need to have better handling of both error and loading states. Thanks for letting me know about this issue!

[–] moseschrute@lemmy.ml 2 points 5 days ago (2 children)

Try upvoting or clicking login, and it will prompt you to change your instance. Unless the 503 errors are crashing the page

[–] moseschrute@lemmy.ml 3 points 5 days ago

That's what I was going for! Not looking to replace the other Lemmy apps, but I'm happy I can provide an option for people that like this still of client.

[–] moseschrute@lemmy.ml 2 points 5 days ago (2 children)

Tbh, I have no idea how Linux works. But I’m looking at some documention and I don’t see why Flatpak wouldn’t be possible.

[–] moseschrute@lemmy.ml 1 points 2 months ago* (last edited 2 months ago) (1 children)

That’s not what I was talking about. The Tor network (onion routing) is a totally separate thing. Tor as an application has very good anti fingerprint protections. I was referring to that feature specifically not the rest of Tor.

Sure if you really wanna benefit, use Tor’s routing. But I am just admiring that the people that built Tor really knew what they were doing in all aspects of the application including the anti fingerprint protections.

[–] moseschrute@lemmy.ml 0 points 2 months ago

Also get ready to throw your credit cards in the trash. They are tracking you. And while you’re at it, might as well throw away your computer.

[–] moseschrute@lemmy.ml 1 points 2 months ago (3 children)

I wonder if you don’t actually use tor but use their version of Firefox if you still get their anti fingerprint benefits, or if being one of the few tor users not using tor makes you too unique.

[–] moseschrute@lemmy.ml 1 points 2 months ago

I found tor did a very good job of blending you into other tor traffic. But you are only as unique as 1 out of the total number of tor users.

[–] moseschrute@lemmy.ml 12 points 2 months ago* (last edited 2 months ago)

I don’t really know what I’m talking about tbh, but my understanding is the more unique you make yourself, the easier you are to identify. For example, as soon as you use an ad blocker, your browser fingerprint becomes more unique because your average person doesn’t use an ad blocker. Even fewer people use Tor. So if someone knows you are using Tor, then they know you are 1 of maybe 100,000 people instead of millions (idk if those numbers are accurate, but you get the point).

That being said, Tor does do a pretty good job of making you blend into all the other Tor users.

But what I was talking about initially was mostly your ISP identifying your Tor traffic. So you use a VPN, but again you are now more unique than someone not using a VPN, even if your traffic is more encrypted.

[–] moseschrute@lemmy.ml 17 points 2 months ago (3 children)

I disagree. Fucking skibidi toilet living rent free in my head.

view more: ‹ prev next ›