Show newer

Comunicación pública, P2P y conservación de datos. El TJUE y el caso MIRCOM International:

derechoynormas.com/2021/06/com

@barefootstache maybe partially: the key of this kind of fingerprinting is your set of installed applications, and that set of apps is equally traceable within a virtual machine; on the other hand, the potential advantage of using a virtual machine is that you could keep just the default set of applications, the way that you apps set's fingerprint would be so generic. I hope I've been able to explain it right...

Cross-browser tracking vulnerablity in Tor, Safari, Chrome and Firefox - FingerprintJS

fingerprintjs.com/blog/externa

Cómo saber si alguna operadora tiene planes para llevar la fibra hasta tu hogar en los próximos años

bandaancha.eu/articulos/como-s

"Un mal día para Internet": Europa permitirá censurar contenidos en menos de una hora sin pasar por el juez con su nueva ley contra el terrorismo

xataka.com/legislacion-y-derec

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.