Perplexica isn’t a plugin for SearXNG, but it’s based on that and it integrates with Ollama
Mastodon | @[email protected] |
---|
Perplexica isn’t a plugin for SearXNG, but it’s based on that and it integrates with Ollama
Change your DNS resolver to one of these https://www.privacyguides.org/en/dns/
Crab Champions is not exactly new (I think it’s been in early access since 2023), but it’s really fun and currently just $7.49
I recommend NextDNS, it allows you to block ads, trackers and other unwanted stuff on the DNS level. Check out this video: https://neat.tube/w/19r4YnE6fpce6e2B9MepnB
Average DB experience
I wouldn’t go to Yandex directly, just enable it in SearXNG
It also has an option to search 1337x, The Pirate Bay, SolidTorrents and other sites directly
There’s AirVPN
Let’s not forget the dozens of big tech companies run by absolute morons that bring products that nobody wants or needs and only stay afloat due to legacy, stealing data & selling it, and/or venture capital.
You just described Twitter/X
Thanks :)
Yeah, as far as I’m aware, it just runs a copy of the NewPipeExtractor locally, that’s the same stuff that’s used in the Piped backend.
You can also disable the Piped proxy at Settings -> Instance -> Disable Piped proxy
I prefer Tailscale Funnel for these kinds of things. NetBird and ZeroTier also work just fine if you don’t want to expose your services to the public.
If you use 9.9.9.9, you should try Mullvad DNS (with adblocking) or AdGuard Public DNS
That’s really cool, how can I learn more about LVM and that kinda stuff?
It works pretty well for me. I don’t have any problems on piped.video, piped.adminforge.de and piped.ngn.tf
You can also just disable the Piped proxy in the settings, effectively making it function like NewPipe
May you have a delightful meal.
Thanks ;)
You can find the full list of instances here, and the list shows whether a CAPTCHA is present on an instance or not
Calyx is unfortunately pretty slow to release security patches, uses privileged apps with root access like microG and the F-Droid privileged extension by default and doesn’t really provide any unique features. All of the privacy features of Calyx are either already present or can be easily replicated in a better form on GrapheneOS. Take Datura Firewall, it’s yet another privileged app with root access which adds unnecessary attack surface, and is less secure than the Graphene equivalent. GrapheneOS implements a network permission toggle, which is embedded in Android’s native permission manager and uses the INTERNET permission to restrict network access. It disables both direct and indirect network access, including the local device network (localhost). GrapheneOS also has a bunch of unique security features, that can’t be found on any other Android ROM, like for example a hardened memory allocator, hardened kernel, secure app spawning, improved SELInux policies, Duress PIN/Password, driver-level USB-C control, Storage Scopes, Contact Scopes and soon App Communication Scopes. GrapheneOS also includes Sandboxed Google Play services, a better GMS implementation than microG, which doesn’t require root and has better app compatibility.