• 0x0@programming.dev
    link
    fedilink
    arrow-up
    4
    ·
    2 months ago

    besides not using Google?

    That’s a bit oxymoronic, isn’t it? And the answer always depends on your threat model, so start there.