okay now ive seen it all. im deleting
I honestly hope I get hit by a bus today
WHY IS NO ONE TALKING ABOUT THIS MASTERPIECE
SERIOUSLY, WHY THE FUCK ISN’T THIS ALL OVER MY DASH?!
PRESS PLAY RIGHT THE FUCK NOW. THEY COVERED DAFT PUNK AND IT’S AMAZING!!! HOW THE FUCK…
this is really cool
So MA, 2nd least courteous, but we won’t curse at yah.
10 Amazing Abandoned Places Around the Globe
- Spree Park, Berlin, Germany
- Hotel del Salto in Colombia - featured previously on Curious History
- Gulliver’s Travels Park, Kawaguchi, Japan
- Abandoned mill in Sorrento, Italy
- Mirny (Mir) Mine is a former open pit diamond mine located in Mirny, Eastern Siberia, Russia - The second largest man-made hole in the world
- The abandoned flats in Keelung, Taiwan
- Holland Island in the Chesapeake Bay, Maryland, United States
- Craco is an abandoned commune and Medieval village in Italy
- Dadipark Dadizel in Belgium
- Abandoned train depot in Czestochowa, Poland
Where do you get your ideas from?
This fucking show
This looks like a nightmare. Is this like a Turducken except from another layer of hell?
good lord no.
Octopus stuffed king crab? God that is horrifying.
Governments have transformed the internet into a surveillance platform, but they are not omnipotent. They’re limited by material resources as much as the rest of us. We might not all be able to prevent the NSA and GCHQ from spying on us, but we can at least create more obstacles and make surveilling us more expensive. The more infrastructure you run, the safer the communication will be. Download installation software for these programs. You can read detailed installation and setup instructions here.
Includes all you’ll need to access the Tor Network.
Makes it more difficult to trace Internet activity: Web browsing, online posts, instant messages and other communication forms. Cannot prevent monitoring of traffic entering/exiting the network. While Tor protects against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation).
2. BLEACH BIT
Many features to help you easily clean your computer, free-up space and maintain privacy.
A live operating system. Start on almost any computer from DVD/USB stick. Preserves your privacy and anonymity.
Comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite and more.
Create virtual hard drives which encrypt any files you save onto them. Many types of encryption.
Chat software that allows use of existing instant messaging accounts. Supports Facebook, Google Chat, AIM, MSN + more.
A simple plugin for Pidgin. It encrypts all conversations held using the software.
Free email software. Add your existing mail account to it.
A security extension to Thunderbird. Write/receive emails signed and/or encrypted with the OpenPGP standard.
Free implementation of the OpenPGP standard. Encrypt and sign your emails.
Relevant to our recent episode “Collect It All: America’s Surveillance State.”