Use i3-wm with linux and it’s gonna be the only key you use :p
Also it is useful in Windows. I find myself using it in combination with D (minimize all windows) and L (lock the screen), or just by itself to search for apps.
Arch Linux is a conspiracy to market neofetch.
Use i3-wm with linux and it’s gonna be the only key you use :p
Also it is useful in Windows. I find myself using it in combination with D (minimize all windows) and L (lock the screen), or just by itself to search for apps.
Can’t say anything about China, but why do you think vpn’s are illegal in Russia? Sure, the big vpn companies inside the country might be influenced by the government to limit your access to some banned websites. However, you can freely use a vpn if you wish.
Again, I remind you that you could always set up your own vpn server for personal use.
I don’t think it’s even possible to for anyone to stop someone from using a VPN. Sure, in theory, they could affect VPN providers’ businesses, but you’re always going to be able to connect to a VPN if you want to. They’d have to block or heavily limit internet access in order to stop users from connecting to some remote server.
Also yes, I do think lawmakers are aware that vpn’s are not a threat to anything, thus there is absolutely no reason to ban them.
Edit: Someone else mentioned a good point. Even if we consider them blocking vpn as a possibility “The uproar would be enough to kill the bill before it gets out of committee.”
How many petabytes?
You can literally host your own vpn, nothing illegal about that. And, as someone else mentioned, work would be impossible for many companies, as almost any company that works with sensitive data uses vpn to some extent.
Idk if this is what you’re looking for but might be worth taking a look
https://github.com/eth0izzle/Needl
“Your ISP is most likely tracking your browsing habits and selling them to marketing agencies (albeit anonymised). Or worse, making your browsing history available to law enforcement at the hint of a Subpoena. Needl will generate random Internet traffic in an attempt to conceal your legitimate traffic, essentially making your data the Needle in the haystack and thus harder to find. The goal is to make it harder for your ISP, government, etc to track your browsing history and habits.”