Language Transfer is much, much better than Duolingo for learning a language.
I am learning Spanish using language transfer after having learned four other languages in more traditional ways. Obviously, immersion is the best way to learn. But if you have to learn any other way, this is the one. Far, far better than Duolingo.
It's made up of MP3s, usually about 10 minutes each. You just listen to them and respond to the instructor.
You can use SoundCloud, or YouTube, or the simple but practical smartphone app. The whole thing is run by one guy, and there is no charge but he asks for donations. I have been paying $10 per month on Patreon for several years now, and consider it well worth it.
You can learn French, Spanish, Italian, German, Greek, Turkish, and Swahili.
The problem with Language Transfer is its very limited language selection and its format.
Duolingo allows reading, writing, listening and speech (last two can be disabled if unsuitable in your context), and it does not impose daily limits. I've yet to find an alternative app that does all 5 of those things.
Yes, Language Transfer doesn't have as many languages as Duolingo. Hardly surprising, since the entire system and all the language lessons were created by one man!
For me, the most important thing is to learn to think in the other language. Everything else follows from that.
Language Transfer makes a conscious effort not to get you to memorize things, but to internalize them and understand the system. That works perfectly with my own way of learning.
Your VPS has an ip. All your traffil will go through it if you set it up as a VPN. So your behaviour patterns will be tied to that one IP. You will be the only one on that VPN.
A commercial VPN has many users at the same time on a given Server. So the traffic and behaviour that comes from that servers IP will produce garbage data for analysis.
You could selfhost a VPN on your VPS and let others use it for free somehow to obfuscate your behaviour and patterns, but you as the VPS owner will have to deal with legal stuff then.
I route through my server or my home router when using public WiFi and stuff. I don't care too much about the privacy aspect, my real identity is attached to my server and domain anyway. I even have rDNS configured, there's no hiding who the IP belongs to.
That said, server providers are much less likely to analyze your traffic because that'd be a big no-no for a lot of companies using those servers. And of course any given request may actually be from any of Lemmy, Mastodon, IRC bots or Matrix, so pings to weird sites can result entirely from someone posting that link somewhere.
And it does have the advantage that if you try to DDoS that IP you'll be very unsuccessful.
I'd recommend starting with ANKI and looking up guides for that language. You might find add-ons that make it easier to use. While making your own deck is better, you can also download recommended decks to learn vocab. Otherwise there are open access textbooks and courses if you want more structured learning.
You worry that facebook would associate that static ip with you but the problem is quiet the opposite.
most website will recognize that your IP belong to a hosting company so they often suspect that you are a bot. Wikipedia wont let u edit articls, youtube wont let u comment on videos. Other than that its fine, just expect to pass more captcha.
you could pay little extra and get dynamic IP from your provider. That effectivwly changes your IP. Deleting dynamic IP and recreating it gives u a new one. But I dont do that.
I just hide in the crowed by letting others uss my VPN and rely on service providers often dismissing my IP as bot
Your traffic will be analyzed even when encrypted because information leaks in your traffic patterns and ML can suss out what you're browsing or talking to. If you want to avoid this you need to pad your packets and stuff random data into your packet stream to throw off the analysis.
Ror this one I think they advertised somewhere that the groups would still be available if you download the apk from their website, I did this and I can still see the hamas group
And then I am the one exaggerating... I'll say it again, Proton is just another company that managed to find clever ways to profit from a group of people who value things such as "privacy".
They're just a very large marketing effort with little to nothing to show but everyone is convinced they're actually protecting users while they keep pushing proprietary / half open and non standard stuff as solutions for problems already solved with truly open tools, standards and protocols.
Proton did nothing wrong here; in fact, it is working as intended.
No email content or attachment was provided in this case because they (Proton) have nothing to give. Now, imagine if this user were using Gmail instead of Proton.
The article title is clickbait and is trying to incite outrage from the crowd. Don't fall for it.
“Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,..."
I love that proton kept referring to the user as the "terror suspect" repeatedly so we would know they're really the good guy here.
Exactly. What makes this a bit complicated and maybe interesting from a historical point of view is that this is about Spain. A country which has been very slow with removing some of the "relics" from the fascist Franco era (Franco died in 1975) and at the same time having regions that long for independence like Basque country and Catalunya (and the post topic is related to that, Catalunya aiming for independence). Since the Twin Towers attacks in 2001 the words "terror suspect" and "terrorists" have been used much more often (also by ordinary "normies" people that I knew) and maybe not always rightly so.
Privacy
Hot
This magazine is not receiving updates (last activity 54 day(s) ago).