buckykat@lemmy.blahaj.zonetoPiracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.com•Piracy in ChinaEnglish
4·
1 year agoWhen I was in China my usual VPN I use for piracy and general privacy got through the great firewall no problem
When I was in China my usual VPN I use for piracy and general privacy got through the great firewall no problem
If it was for that, it’d be locked with my keys, not some megacorp’s. The concept of treacherous computing is to let the corpos trust your computer to betray you for their profits.
The treacherous platform module has always been malware
That’s like asking ‘what’s the best nut to get kicked in?’
Bell Riots here we come