Welcome to Inkbunny...
Allowed ratings
To view member-only content, create an account. ( Hide )
AdultFlamingAzalea

Google Chrome and Incoming Art

First off let me say this:

Dear Mozilla FireFox:

I am writing this to make it official. Due to a recent amount of increasing amount of random crashes in the last few weeks, I am going to discuss with you a certain vocational paradigm shift. You're FIRED, FireFox! I've taken on Google Chrome as my computer's new default browser. Its too bad. You were quite good. If only you didn't slow down my entire computer and constantly crash, especially while I was writing long amounts of text that got deleted upon restart of your browser.
You were a cute looking browser, especially with the lovely theme I chose for you. But, I've decided to go another way. A less crashy more Vulpix-y way. Google Chrome has a cute Vulpix theme.
I'm sorry it had to come to this. Hopefully in the future you can change in such a way that another would gladly accept you as their browser of choice. But, as for the time being, I'm painfully dumping you.

GoodBye Forever. ~Alejandro

P.S.: I am keeping your relative, Thunderbird, around, due to there not being any replacement for him that works for me. No hard feelings.

----------

Now that that randomness is over... I managed to fix my grandmother's scanner-printer, so that now I have a way to post new arts on the slow days where we are doing nothing on the island. Expect a few random arts in the next couple weeks.
Viewed: 7 times
Added: 11 years, 12 months ago
 
Reizinho
11 years, 12 months ago
I still use Firefox, as it has a decent add-on base for privacy freaks like me. But most of the time I'm in Tor Browser.
AdultFlamingAzalea
11 years, 12 months ago
What is this... Tor? O.O
Reizinho
11 years, 12 months ago
https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
Let me explain. While using Tor Browser, a forked version of Firefox grabs your request and sends it to the daemon (which is a program). The daemon encrypts the request three times and sets a random path of routers to send your request. Then, your request is sent to a first computer (entry node). It decrypts the first layer of encryption and sends to the next computer in the path (middle). The next computer decrypts another layer and sends it to another computer (exit node), that decrypts the last layer and sends the request to the server you want to access. The advantage is that your request is routed through three computers around the world while encrypted in different levels and, at same time, hiding your IP address. This enables privacy in a level never seen before (except in Navy).
New Comment:
Move reply box to top
Log in or create an account to comment.