wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

for smartphones, computers, and servers alike. For more details see : https://nlnet.nl/project/WillowSync Layer 8 Data and AI AI Horde — Collaborative infrastructure for running g

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

Capability Comparison

https://secushare.org/comparison

somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy

Stop Using Discord

https://usemumble.neocities.org/

with not so amazing computers, but Discord uses a significant amount of RAM (sometimes ~500-800MB). Their client is extremely bloated with unnecessary features such as flairs, soc

NLnet; Current projects

https://nlnet.nl/project/current.html

ARM-based single board computers AtomicServer Local-First AtomicServer Local-First Headless CMS Authlib Reliable OAuth and OIDC handling in Python Autogram 2.0 Create and validate

Bypassing the privacy chase

http://digdeeper.love/articles/bypassing.xhtml

tuned to. There are no computers in the jungle, after all. Civilization has allowed privacy violators to hide behind devices (such as CCTV cameras) and avoid triggering our biolog

~hl

https://www.devever.net/~hl/

20221029 computing Computers are an inherently oppressive technology 20220612 computing The Demise of the Mildly Dynamic Website 20220502 computing Website redesign and editorial

The Social Consumer

https://denshi.org/blog/the-social-consumer/

to help people use computers, with the added benefit of being able to engage with my fans. This best manifested in the form of the tech support channel, which was actually quite s
For anyone who keeps up with my channel and site, you’d likely already be aware of the DenshiVideo chats. These were group chats available on Matrix, XMPP and Discord that le

NLnet; All projects

https://nlnet.nl/project/

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent


Find more...