• 9 Posts
  • 85 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle








  • T: "Tay" (a mythical creature from Scottish folklore, often described as a small, elf-like being)
    U: "Ufi" (a legendary creature from Native American folklore, said to resemble a small humanoid figure)
    V: "Vim" (a mythical creature from Hindu mythology, sometimes depicted as a bird-like being)
    W: "Wyy" (inspired by the Wyvern, a legendary creature similar to a dragon but with only two legs)
    X: "Xin" (a mythical creature from Chinese mythology, often depicted as a lion-like beast)
    Y: "Yen" (a legendary creature from Vietnamese folklore, resembling a large, serpent-like creature)
    Z: "Ziz" (a mythical creature from Jewish mythology, described as a giant bird)
    












  • Windows Telemetry at first. Then Windows browbeating various products - “Edge please download Firefox” - Edge: “Why, I am better than Firefox” Me:“Do as I say” Edge: “But -blah blah nah” and so on. I know there are ways around it, but if someone can force an update against my will on my machine, it is not my machine. This leads to questions of what else can they do without my permission. Linux is my machine. I control when and how and what. Also customization.