PirateJesus
Philip answered him, 2 books is not sufficient for them. And Jesus took the books; and when he had given thanks, he distributed to the disciples, and the disciples to them that were set down. Therefore they gathered them together, and filled twelve baskets with the new copies, which remained over.
OMG. Every other post is saying their disgusted about the images part but it’s a grey area, but he’s definitely in trouble for contacting a minor.
Cartoon CSAM is illegal in the United States. AI images of CSAM fall into that category. It was illegal for him to make the images in the first place BEFORE he started sending them to a minor.
https://www.thefederalcriminalattorneys.com/possession-of-lolicon
Different purposes. Tor was intended so you could access the real web anonymously.
I2p the whole thing is an anonymous web. Everybody is a node. Tracing a packet never ends because you can’t be sure you found the origin of the packet. Which only gets worse the longer somebody remains connected to i2p. And it even can handle torrenting, a torrent client is built in.
I2P sadly gets a lot less funding/support.
Anybody remember when the fucking optical disks were locked to certain regions?
SSDs still have component bottlenecks that can kill the whole drive, same as hard drives.
Also, 3-2-1 is far superior to RAID, but having RAID on top of that is nice.
- Maintain three copies of your data: This includes the original data and at least two copies.
- Use two different types of media for storage: Store your data on two distinct forms of media to enhance redundancy.
- Keep at least one copy off-site: To ensure data safety, have one backup copy stored in an off-site location, separate from your primary data and on-site backups. https://www.veeam.com/blog/321-backup-rule.html