#youbroketheinternet (YBTI)https://youbroketheinternet.org/
obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet
NLnet; 55 New Projects Awarded NGI0 Grantshttps://nlnet.nl/news/2023/20231123-announcing-projects.html
for smartphones, computers, and servers alike. For more details see : https://nlnet.nl/project/WillowSync Layer 8 Data and AI AI Horde — Collaborative infrastructure for running g
Archivehttps://jxself.org/archive.shtml
digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software
Athena's blog - Athena's Sitehttps://www.alm.website/blog/
How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
Stop Using Discordhttps://usemumble.neocities.org/
with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc
NLnet; Current projectshttps://nlnet.nl/project/current.html
ARM-based single board computers AtomicServer Local-First AtomicServer Local-First Headless CMS Authlib Reliable OAuth and OIDC handling in Python Autogram 2.0 Create and validate
Bypassing the privacy chasehttp://digdeeper.love/articles/bypassing.xhtml
tuned to. There are no computers in the jungle, after all. Civilization has allowed privacy violators to hide behind devices (such as CCTV cameras) and avoid triggering our biolog
~hlhttps://www.devever.net/~hl/
20221029 computing Computers are an inherently oppressive technology 20220612 computing The Demise of the Mildly Dynamic Website 20220502 computing Website redesign and editorial
The Social Consumerhttps://denshi.org/blog/the-social-consumer/
to help people use computers, with the added benefit of being able to engage with my fans. This best manifested in the form of the tech support channel, which was actually quite s
For anyone who keeps up with my channel and site, you’d likely already be aware of the DenshiVideo chats. These were group chats available on Matrix, XMPP and Discord that le
NLnet; All projectshttps://nlnet.nl/project/
ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent
Find more...