Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

Uncategorized
32 18 0
  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin And how do you block all that in uBlock? Thanks.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin What about Mistral ? This is the one I use.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 I get no trackers and no fees with KoboldCPP. 🤪

  • @k3ym0 @ublockorigin And how do you block all that in uBlock? Thanks.

    @dancingtreefrog @ublockorigin download the browser extension! it will work with the default config :)

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 oh man, is all of this just in the js console? i wanna see :D

  • @k3ym0 oh man, is all of this just in the js console? i wanna see :D

    @Viss ask and you shall receive.

  • @k3ym0 @ublockorigin What about Mistral ? This is the one I use.

    @OlivierBurnier @ublockorigin

    Mistral: two blocked requests.

    Cloudflare Insights ("is the site up") and a single Intercom beacon POST that didn't even retry.

    that's it. no Statsig. no tracking GIFs. no Google Analytics. no distributed tracing. no proof-of-work challenge. no KETCHUP_DISCOVERY_CARD. nothing.

    a French AI company nobody talks about is running the cleanest frontend in the entire field by a factor of roughly 150x and we're all sleeping on it

    les français ont tout compris

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin
    I don't understand all of that but it sounds worse than what Snowden told us!

  • @dancingtreefrog @ublockorigin download the browser extension! it will work with the default config :)

    @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0

    I use Claude Code, which runs outside the browser. Do you think pihole can block disproportionate requests as well as uBlock blocks browser requests?

  • @k3ym0

    I use Claude Code, which runs outside the browser. Do you think pihole can block disproportionate requests as well as uBlock blocks browser requests?

    @siklist pihole can block requests by fqdn, but as you’ll notice, a lot of the third-party tracking infra was being proxied through other non-tracking infra to get around this. If Claude code is somehow loading in JS artifacts (idk if it can or not) it could bypass pihole.

  • @k3ym0 @ublockorigin I have uBlock Origin, been using it for many years. I didn't know it blocked all that LLM stuff. Thanks.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin
    > Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.

    I was working on an internal analytics dashboard at some other Very Large Company What Competes With Google and someone pushed a change to fetch and run an analytics package directly from Google servers. I had to spend almost a week ripping out their changes and redoing the analytics using a lib that wasn't directly sourced from our primary competition (also I'm pretty sure the way it was used violated it's license).

    So yea my lack of surprise is palpable.

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 can you translate for us older genx non computer folks? thanks

  • You're paying AI companies a monthly subscription fee to be fingerprinted like a parolee.

    I got bored and ran uBlock across Claude, ChatGPT, and Gemini simultaneously.

    Claude:

    • Six parallel telemetry pipelines.
    • A tracking GIF with 40 browser fingerprint data points baked into the URL, routed through a CDN proxy alias specifically to make it harder to block.
    • Intercom running a persistent WebSocket whether you use it or not.
    • Honeycomb distributed tracing on a chat UI because apparently your conversation needs the same observability stack as a payments microservice.

    ChatGPT:

    • proxies telemetry through their own backend to hide the Datadog destination URL from blockers.
    • uBlock had to deploy scriptlet injection — actual JS injected into the page to intercept fetch() at the API level — because a network rule wasn't enough.
    • Also ships your usage data to Google Analytics. OpenAI. To Google. You cannot make this up.
    • Also runs a proof-of-work challenge before you're allowed to type anything.

    Gemini:

    • play.google.com/log getting hammered with your full session behavior, authenticated with three SAPISIDHASH token variants, piped directly into the Google identity supergraph that correlates everything you've ever done across every Google product since 2004.
    • Also creates a Web App Activity record in your Google account timeline. Also has "ads" in one of the telemetry endpoint subdomains.

    When uBlock blocks Gemini's requests, the JS exceptions bubble up and Gemini dutifully tries to POST the error details back to Google. uBlock blocks that too. The error messages contain the internal codenames for every upsell popup that failed to load.

    KETCHUP_DISCOVERY_CARD.
    MUSTARD_DISCOVERY_CARD.
    MAYO_DISCOVERY_CARD.

    Google named their subscription upsell popups after condiments and I found out because their error handler snitched on them.

    All three of these products cost money.
    One of them is also running ad infrastructure.

    Touch grass. Install @ublockorigin

    @k3ym0 @ublockorigin lowkey curious about lumo ai by proton

  • @k3ym0 can you translate for us older genx non computer folks? thanks

    @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you — what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

  • @cloud @k3ym0 @OlivierBurnier @ublockorigin

    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

  • @sergiodomeyko every time you open one of these AI chat websites, before you type a single word, the website is secretly making hundreds of connections to other companies’ servers in the background.

    those connections are sending those companies information about you — what browser you use, what computer you have, your screen size, your timezone, sometimes a unique digital fingerprint that can identify you specifically.

    you’re paying a monthly subscription for these AI tools, and they’re ALSO selling information about how you use them to analytics companies, ad companies, and in Google’s case, adding it to the giant file they already have on you from Gmail, Search, Maps, and everything else.

    uBlock Origin is a free browser extension that blocks all of this. it’s like a bouncer for your browser. Lmk if you want some help installing it :)

    hope that helps. welcome to the modern internet - it’s a mess out here.

    @k3ym0 thank you. For your explanation. I will look into it.

  • @cloud @k3ym0 @OlivierBurnier @ublockorigin

    Huh, free-online Mistral handles COBOL requests better than free-online Claude. At least the code is complete and compiles.

    @jakebrake @cloud @OlivierBurnier @ublockorigin i’m fucking terrified to ask why you know that.


Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    1 Posts
    4 Views
    Daily Digest | 30 January 2026Your daily dose of Privacy, Data Protection, AI & Cybersecurity news.5 stories you should not miss.Read more: https://www.nicfab.eu/daily-digest/#Privacy #AI #GDPR #Cybersecurity #TechLaw
  • 0 Votes
    1 Posts
    8 Views
    In 2025, the German #BSI launched the Year of #Email #Security recommending Tuta Mail.🇩🇪 ❤️In 2026, we call for a year on end-to-end encryption in email - so they stop recommending Gmail & Co as well. 🔒 #privacy #security
  • 0 Votes
    1 Posts
    15 Views
    In today's video I chat about using Newsboat RSS reader with the Lynx command-line browser. Bread on Penguins' channel: https://www.youtube.com/@BreadOnPenguins A minimalist workflow: My desktop setup is built around i3, and everything I do is handled by simple scripts and terminal tools. There’s no taskbar, no desktop icons, and no visual clutter. My email runs in aerc, my RSS feeds in Newsboat, and my web browsing in Lynx. Everything is fast, predictable, and distraction-free. When I open Newsboat, it immediately loads my RSS subscriptions, a mix of Linux blogs, news sites, and personal journals from friends. It’s not the neatest list in the world (I really should organise it one day), but it gives me exactly what I want, information without noise. Unlike some feed readers that throw everything into one endless list, Newsboat groups feeds cleanly by source. That matters because some sites post dozens of articles a day while others might only update once a month. Separating them lets the quieter voices, personal blogs or smaller projects, actually be seen. Organising information: Newsboat’s tagging system is one of its best features. I’ve got tags for friends, games, news sources, politics, podcasts, and more. One of my favourite feeds is “TheyWorkForYou”, an RSS service that updates whenever UK MPs speak in Parliament. I highly recommend it for anyone in the UK. It’s an easy way to see what your representatives are actually doing, and I think it’s good for democracy to stay informed like that. Some of my other feeds include Boiling Steam, GamingOnLinux, FreeGamer, and a handful of personal blogs like Ghosty’s and Drew’s. Newsboat makes it easy to jump between them depending on what I’m in the mood for, Linux, games, or just something thoughtful to read with coffee. Why I browse with Lynx: When I want to read a full article from an RSS feed, I usually open it directly in Lynx. It’s a text-based browser that runs right inside the terminal. For most of the content I care about, blogs, reviews, essays, or news articles, Lynx is perfect. It loads instantly, displays cleanly, and keeps me focused on the text instead of ads, autoplay videos, or pop-ups. Sure, modern websites are built like web apps now, but that’s exactly why Lynx is such a breath of fresh air. It strips the web back to what it was meant to be: information, text, and ideas. For sites that really need a full browser (say, something JavaScript-heavy), I’ve got Firefox set as an alternative, but honestly, that’s rare these days. I experimented with Dillo too, another lightweight option, but Lynx fits more naturally into Newsboat. I can just press a key to open any article right where I am, no switching windows or leaving the terminal. Page Up, Page Down, and I’m reading. It’s fast, simple, and reliable. The beauty of plain text: All of this ties into what I’ve been loving about working in the terminal again: everything is plain text. Config files, notes, RSS lists, scripts, it’s all just text. That makes it transparent, portable, and easy to automate. For example, Newsboat’s feeds are stored in a single plain text file. If I want to back them up or edit them, I just open the file in Vim. If I want to tweak the configuration, it’s one small text file with a couple of commented-out lines for the browsers I’ve tried. That’s also the philosophy behind how I manage my dotfiles and scripts. I used to use GNU Stow for symlinks, but I’ve replaced it with a few simple bash scripts of my own. Same with address books, why use a complex app when a CSV or tab-separated file does the job perfectly? The more I build my own little tools, the more I enjoy the workflow. It’s like rediscovering the old Unix philosophy: simple tools that do one job well. Where it’s all going: I’ve been spending more time writing lately, both on my blog and in text posts across platforms like the Fediverse and PeerTube. You can find everything at chriswales.wales, which links to all my current projects, podcasts, and social channels. If you’re curious about minimalist computing, or want to see what life looks like when you move away from 'apps' and back into 'tools', I’ll be writing more about this approach, from plain-text note-taking to terminal calendars and to-do lists. And if you’re just starting to tinker with RSS, I can’t recommend Newsboat enough. Pair it with Lynx, and you’ve got a distraction-free reading environment that’s faster, cleaner, and infinitely more satisfying than the modern web.
  • 0 Votes
    1 Posts
    15 Views
    Murena lancia HIROH, lo smartphone che protegge davvero la tua privacy. Kill switch fisici, niente Google, e /e/OS integrato. #Murena #HIROH #Privacy #LinuxMobile #eOShttps://www.linuxeasy.org/hiroh-smartphone-murena-privacy/?utm_source=mastodon&utm_medium=jetpack_social