

It’s better to avoid re-encoding as it lose quality.
It’s better to avoid re-encoding as it lose quality.
I’ve never seen the !0
and !1
, it is dumb and indicates either young or terrible devs.
Boolean(window.chrome)
is the best, !!window.chrome
is good, no need to test if it’s equal to true
if you make it a boolean beforehand.
Brave does farbling: https://github.com/brave/brave-browser/issues/11770
JShelter is a nice extension that tries to implement the same things in other browsers, it’s a bit limited by the fact that it’s an extension.
I’ve yet to see a serious review of Duckduckgo browser, the only thing I saw was that because of it’s agreement with Microsoft for their search engine the browser, for a time, had rules to avoid blocking Microsoft tracking.
Sadly Firefox has no tab sandboxing on mobile so yeah, it is less secure.
And while I agree the Brave company is shady, the browser has good security features.
I don’t know, if your goal is security Pixels have the best hardware and GrapheneOS the best software. It makes a lot of sense.
I don’t see what you can do at the protocol level to improve availability, you still need people storing the file and acting as peers. Some trackers try to improve that by incentivizing long term seeding.
Like the 13.1 torrent being only a patch to the 13 one and listing it as a dependency? Downloading the 13.1 torrent would transparently download the 13 if it wasn’t already, then download the 13.1 patch and apply it. But I don’t think any of this needs to be at the protocole level, that’s client functionality.
And what about the person the thieves sells it to?
It’s not worthless but it’s on only an indication, an example.
Isn’t the score change similar to the one you have when toggling Apple safebrowsing? (whatever that is)
A probable explanation is that your VPN client is somehow changing some of your browser settings. The VPN client, not the VPN itself.
Just check the detailed results to see what’s changed between the two. Whatever it is it could be changed manually, it’s does not require a VPN to change. But you probably don’t want to change it because your score with a VPN is worse than without.
But this has nothing to do with a VPN being the best or the worse.
That’s side effects, the difference is irrelevant anyway.
I insist because I think it’s important to understand this, both for you and for people reading these comments. The whole point of fingerprinting is to be able to track users without relying on cookies or IP. Changing IP does not protect against fingerprinting. I don’t want people to be mislead by your comment and think they are going to avoid tracking by just taking a better VPN.
You can read more here:
https://coveryourtracks.eff.org/about#browser-fingerprinting
“Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies.
And you can check the source code to see there is no mention of IP address:
https://github.com/EFForg/cover-your-tracks/blob/master/fingerprint/fingerprint_helper.py
It might have a side effect but it’s still unrelated and useless for the purpose at hand.
Tails uses the Tor Browser which does a lot to minimize fingerprinting, for example by letterboxing so the screen size (one of the most unique information in my case) is rounded as to not be as unique.
A VPN is unrelated, it changes your IP but the IP is not used to fingerprint.
But then they can know a lot more since they don’t even need to drop a cookie to track you. But that’s a different threat model.
It has been blocked and will be blocked again soon.
Did you actually look at it? video13.ts
is just a split of the video. If you go the manual way as you suggest you need to find the video.m3u8
playlist file, and download all splits listed in the playlist (video01.ts
to videoXX.ts
, depending on the video length and split length) and then merge them all together to get the full video.
yt-dlp list gamedev.tv as supported and has an issue about adding zenva support with a comment suggesting it might not be hard.
You’ll need to pass the auth cookie you got after login to yt-dlp.
It isn’t completely right either. Browsers, extensions and, only in some cases, VPNs can save you from being tracked by some. You are describing first party tracking but the point is mostly to prevent third party tracking. An adblocker and an email relay goes a long way.
I agree with the rest though. Regulation is the only way.
https://github.com/arkenfox/user.js/wiki/4.1-Extensions