then don’t use deezer
/s
notated as ∨
then don’t use deezer
is deezer a “justifiable” (or, in your words, legitimate) use of a vpn?
:/
take a train then?
think of all the possibilities
what do you do with the belt?
plug it in your ass, so the bot can fish you back in after the accident?
take your bikes and ride to a nice place where you can have what you please, instead of wishing for uncomfortable sex in a moving box
adBlock!
In solidarity with the right of the Palestinian people No to genocide in Gaza… No to the killing of civilians No to targeting hospitals and schools… No to misleading and double standards Stop the war…and spread just and comprehensive peace
i can’t see anything disagreeable in that message but i’m sure some would be against that message too 🤷
back in the loop ☞ https://lemmy.world/comment/9738706
have a good day
baclava-wearing hard-core anarchist looking to break stuff
what an image though 😁
you can always modify your tattoos, you can’t modify your face once it’s identified. I saw a man literally draw a face on his face before attending a protest. He looked ridiculous but perfectly “defaced”.
I’ve also read about some blackBlocs getting identified, where i live, through their shoes. Police photographed people before and after the movement and their shoes are used as identifying information.
There is always the oldBloc who put their faces and names behind their words and proudly struggle through unions.
it’s already may 1st here. They will be out in about 10 hours. May the force be with them.
read, listen to people that were spied on using the pegasus software. Easy to find
i don’t know if you’ve met any real activists, militants in your life but they’re rarely geeks. And checking the battery of their phone or reading about battery life isn’t one of their priorities
let’s put aside everything @Aceticon@lemmy.world wrote you; if the French state was trying to legalize exactly this, it must be possible: la validation pure et simple de l’activation à distance des fonctions de géolocalisation de téléphone et autres objets connectés (voiture, balises airtag, montre etc) qui repose exactement sur le même procédé technique que le dispositif censuré : la compromission d’un périphérique, en y accédant directement ou par l’intermédiaire d’un logiciel espion pour en prendre le contrôle à distance.
wasn’t the scandal about the Pegasus spyware all about this imperceptibility?
prompt is “hot blonde mushroom with six fingers and too many teeth”
“They had mushroom structures that don’t quite make sense,” says Trybuch. They were the mycological equivalent of a picture of a hot blonde with six fingers and too many teeth.
🤣
search for a local mycological society or association?
with uBlock muting all 3rd party it scrolls fine here