Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

Uncategorized
32 18 0
  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin
    > Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.

    I was working on an internal analytics dashboard at some other Very Large Company What Competes With Google and someone pushed a change to fetch and run an analytics package directly from Google servers. I had to spend almost a week ripping out their changes and redoing the analytics using a lib that wasn't directly sourced from our primary competition (also I'm pretty sure the way it was used violated it's license).

    So yea my lack of surprise is palpable.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 can you translate for us older genx non computer folks? thanks

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin lowkey curious about lumo ai by proton

  • @k3ym0 can you translate for us older genx non computer folks? thanks

    @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you β€” what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

  • @cloud @k3ym0 @OlivierBurnier @ublockorigin

    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

  • @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you β€” what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

    @k3ym0 thank you. For your explanation. I will look into it.

  • @cloud @k3ym0 @OlivierBurnier @ublockorigin

    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

    @jakebrake @cloud @OlivierBurnier @ublockorigin i’m fucking terrified to ask why you know that.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin Fascinating and worrisome. For the less technically adept… would uMatrix be as effective? Or are these specific capabilities of uBO?

  • @k3ym0 @ublockorigin Fascinating and worrisome. For the less technically adept… would uMatrix be as effective? Or are these specific capabilities of uBO?

    @QuercusMacrocarpa @ublockorigin uMatrix is unfortunately abandoned β€” development ended in 2021, same developer as uBlock Origin, he just stopped. there's also an unpatched vulnerability in it so I'd avoid it at this point.

    uBlock Origin in medium mode covers most of what uMatrix used to do for this specific threat β€” it blocks third party scripts and XHR requests by default which is exactly what catches the telemetry pipelines I documented.

    one important caveat though: if you're on Chrome, uBlock Origin was gutted by Google in late 2024 as part of their Manifest V3 changes. the full version no longer works on Chrome. for real protection you need Firefox or Brave with uBlock Origin installed. which, honestly, is probably worth a separate post.

  • @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

    @dancingtreefrog @ublockorigin so long as you're using the LLM stuff within a browser, it's all the same ;)

  • @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you β€” what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

    @k3ym0 @sergiodomeyko
    πŸ™
    Your simplified explanation is a godsend, thank you!πŸ†
    Did I understand this thread correctly that Mistral also does the same "bouncer" function as UBlock origin, but with the added advantage of EU ethos?

  • @k3ym0 @sergiodomeyko
    πŸ™
    Your simplified explanation is a godsend, thank you!πŸ†
    Did I understand this thread correctly that Mistral also does the same "bouncer" function as UBlock origin, but with the added advantage of EU ethos?

    @joseph11lim @sergiodomeyko

    Did I understand this thread correctly that Mistral also does the same "bouncer" function as UBlock origin, but with the added advantage of EU ethos?

    Not quite - it's not that Mistral is doing the same "bouncer" function as uBlock, it's that Mistral is built differently than the other AI websites in that it doesn't discretely spy on you.

    In essence, there's very little (or nothing) for the bouncer (i.e. uBock) to do when you're using Mistral.

    either way I highly encourage everyone to use uBlock :)

  • @joseph11lim @sergiodomeyko

    Did I understand this thread correctly that Mistral also does the same "bouncer" function as UBlock origin, but with the added advantage of EU ethos?

    Not quite - it's not that Mistral is doing the same "bouncer" function as uBlock, it's that Mistral is built differently than the other AI websites in that it doesn't discretely spy on you.

    In essence, there's very little (or nothing) for the bouncer (i.e. uBock) to do when you're using Mistral.

    either way I highly encourage everyone to use uBlock :)

    @k3ym0 @sergiodomeyko
    Thank you so much, it's crystal clear now!πŸ™πŸ™
    😊

  • @k3ym0 @sergiodomeyko
    Thank you so much, it's crystal clear now!πŸ™πŸ™
    😊

    @joseph11lim @sergiodomeyko anytime, internet friend :)

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    I only use the free models on offer by duck.ai, and do it sparingly and in a self-contained manner. I decided that if those models are not enough for a problem, then I would probably be better off seeking a source with real authority and intelligence. They can track my anonymous private (network and browser) sessions all they want 😎, if they wish to.

    (And that annoying non-cross-poster can go fuck itself. I'm deliberately posting this here because of it. So, Mission Accomplished!)

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin What about Lumo from Proton?

  • @k3ym0 @ublockorigin lowkey curious about lumo ai by proton

    @CandlesARG @ublockorigin just checked - lumo comes back clean - 0 blocked requests.

    in case you want to check it out for yourself, here are the docs: https://github.com/gorhill/uBlock/wiki/The-logger

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0@infosec.exchange @ublockorigin@lemmy.ml

    im never using ai already .__.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection β€” actual JS injected into the page to intercept fetch() at the API level β€” because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0@infosec.exchange
    Thats a funny and interesting read, thank you πŸ™‚.
    I've got ublock since ages but deploying custom filters like that is way over my head.
  • oblomov@sociale.networkundefined oblomov@sociale.network shared this topic

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    1 Posts
    3 Views
    So one thing I've done to help me find more things to self host or do is think like a prepper. Like...what if my ISP goes out? How can I remotely control my homelab or even trigger Home Assistant events if my ISP is out? I had no idea how to solve this until about 6 months ago when I discovered Meshtastic. For anyone who doesn't know: Meshtastic is basically an open-source, public mesh-network. You just buy a cheap ESP32 device, flash it with Meshtastic (They have a SUPER easy web-flasher so you don't need to be super technical to do it), and connect to it via Bluetooth with your phone and you're good to go! Then you can send messages to other nodes around you and have fully off-grid communications! Well, while Meshtastic supports MQTT, that does require at least one end of the connection to have internet access. I wanted a way to SSH into my servers and diagnose or fix things without needing to rely on my ISP at all. Or even trigger things in Home Assistant without having access to any ISP. So, that naturally gave way to the idea of MeshExec. [image: b3053a7f-822a-4878-a932-239121635d19.jpeg] [image: a3f958fe-4e6b-4fd8-b906-6b670eae9e98.png] [image: b31e930b-fc53-4b84-a01e-6bdc683f15c8.png] MeshExec is a little binary that attaches to your serially-connected Meshtastic node, and looks for messages in a specified private channel for aliases to execute. Then it will execute whatever commands you specify and automatically chunk them and send them back through the mesh in a staggered fashion. This chunking is done to both fit inside the max message size that Meshtastic supports, and so that the mesh is not overwhelmed with messages and drops them. You define the aliases, the shell used to execute the commands, etc. So you can basically use it to do whatever you want over the mesh! I've set up a handful of aliases to do simple diagnostics on my homelab servers. Things like restarting docker containers, checking the top 3 processes consuming the most memory, etc. I decided to use aliases because I figured direct shell access to a server is SUPER dangerous, especially if you accidentally attach the daemon to a public channel. No idea if this will be useful to anyone else, but I made it as easy to use as possible if anyone does want to use it. Here's the link to the repo if anyone wants to give it a go. I just wanted to share how I've managed to find a way to further reduce my reliance on big corporations and my love for open-source software! If anyone decides to give this a try, I'd love to know your thoughts or answer any questions you have!
  • 0 Votes
    3 Posts
    14 Views
    @msvana 1/3 You raise a valid point! You're right β€” technically, nothing prevents someone from publishing AI-generated content on Gemini.The difference isn't technical enforcement, but rather the removal of incentives and the added friction:1. No algorithmic rewards: On the web, AI slop exists because it games SEO and engagement metrics. Gemini has no search rankings to manipulate, no ads, no analytics β€” so there's no financial incentive to flood it with synthetic content.
  • 0 Votes
    1 Posts
    6 Views
    Ik heb een blog met een aanbeveling voor de Git-werkplaats van de #overheid geschreven:https://developer.overheid.nl/blog/2025/11/11/git-forge-overheidConclusie: vanuit het oogpunt van digitale soevereiniteit en digitale autonomie is een self-hosted #Forgejo de beste keuze voor de overheid.#Git #DigitaleSoevereiniteit #DigitaleAutonomie #GitLab #GitHub #FOSS #OpenSource #GitForge #SelfHosting
  • 0 Votes
    1 Posts
    20 Views
    It's International Smug Self-Hosters Day! Best wishes to all who celebrate. #HomeLab #SelfHosted