www.federated.computer/content/urllist.txt

258 lines
15 KiB
Plaintext

https://www.federated.computer/
https://www.federated.computer/description/
https://www.federated.computer/email/
https://www.federated.computer/nextcloud/
https://www.federated.computer/jitsi/
https://www.federated.computer/elementmatrix/
https://www.federated.computer/baserow/
https://www.federated.computer/wordpress/
https://www.federated.computer/castopod/
https://www.federated.computer/gitea/
https://www.federated.computer/comparison/
https://www.federated.computer/support/
https://www.federated.computer/documentation/
https://www.federated.computer/merchandise/
https://www.federated.computer/blog/
https://www.federated.computer/projectswelove/
https://www.federated.computer/stackernews/
https://www.federated.computer/purchase/
https://www.federated.computer/blog/embrace-digital-sovereignty/
https://www.federated.computer/blog/empowering-sovereignty/
https://www.federated.computer/blog/zoom-tos-problems/
https://www.federated.computer/developers/
https://www.federated.computer/careers/
https://www.federated.computer/partners/
https://www.federated.computer/privacy/
https://www.federated.computer/team/
https://www.federated.computer/contact/
https://www.federated.computer/blog/small-business-seeks-blockbuster/
https://www.federated.computer/blog/unveiling-the-dark-side/
https://www.federated.computer/blog/cancelling-my-history-on-facebook/
https://www.federated.computer/blog/page/2/
https://www.federated.computer/blog/page/3/
https://www.federated.computer/blog/page/4/
https://www.federated.computer/blog/page/5/
https://www.federated.computer/blog/page/34/
https://www.federated.computer/blog/introducing-federated-core/
https://www.federated.computer/blog/bitcoin-time-fourth-revolution/
https://www.federated.computer/blog/stop-being-a-bitch/
https://www.federated.computer/blog/digital-sovereign-toolbox/
https://www.federated.computer/blog/federated-founders-and-our-joyent-history/
https://www.federated.computer/blog/the-future-of-cloud-computing/
https://www.federated.computer/blog/dandelion-root-recipes/
https://www.federated.computer/blog/in-praise-of-thunderbird/
https://www.federated.computer/blog/we-built-federated-using-federated/
https://www.federated.computer/blog/dark-side-of-centralization/
https://www.federated.computer/blog/power-of-free-and-open-source/
https://www.federated.computer/blog/google-2fa-sync-service/
https://www.federated.computer/blog/fbi-watching-internet/
https://www.federated.computer/blog/nostr-daily-stats/
https://www.federated.computer/blog/who-wef-un-digital-id/
https://www.federated.computer/blog/dont-drink-to-health/
https://www.federated.computer/blog/saying-goodbye-to-github/
https://www.federated.computer/blog/seven-books-for-the-self-sovereign-individual/
https://www.federated.computer/blog/page/6/
https://www.federated.computer/blog/gmail-is-breaking-email/
https://www.federated.computer/blog/bill-to-ban-tiktok/
https://www.federated.computer/blog/bill-to-ban-tiktok-patriot-act-2/
https://www.federated.computer/blog/front-matter-cms/
https://www.federated.computer/blog/kyc-not-me/
https://www.federated.computer/blog/fednow-payment-system-launching/
https://www.federated.computer/blog/page/7/
https://www.federated.computer/blog/google-has-most-of-my-email/
https://www.federated.computer/blog/cypherpunks-manifesto/
https://www.federated.computer/blog/page/33/
https://www.federated.computer/blog/page/30/
https://www.federated.computer/blog/page/31/
https://www.federated.computer/blog/page/32/
https://www.federated.computer/blog/proton-mail-review/
https://www.federated.computer/blog/google-drive-file-limits/
https://www.federated.computer/blog/central-bank-digital-currency-video/
https://www.federated.computer/blog/lets-build-a-chrome-extension-that-steals-everything/
https://www.federated.computer/blog/tools-to-combat-surveillance/
https://www.federated.computer/blog/building-arm64-server-hard-way/
https://www.federated.computer/blog/page/8/
https://www.federated.computer/blog/self-hosting-in-2023/
https://www.federated.computer/blog/wading-into-nostr/
https://www.federated.computer/blog/how-to-delete-yourself-internet/
https://www.federated.computer/blog/lastpass-breach-gets-worse/
https://www.federated.computer/blog/top-ten-privacy-podcasts/
https://www.federated.computer/blog/apple-checking-images-rebuttal/
https://www.federated.computer/blog/page/9/
https://www.federated.computer/blog/financial-information-facebook/
https://www.federated.computer/blog/computer-that-i-own/
https://www.federated.computer/blog/dropbox-is-watching-your-activity/
https://www.federated.computer/blog/your-identity-owned-by-email-provider/
https://www.federated.computer/blog/nsa-worked-to-track-bitcoin-users/
https://www.federated.computer/blog/outlook-com-discarding-messages/
https://www.federated.computer/blog/fediverse-is-inefficient-thats-ok/
https://www.federated.computer/blog/the-story-of-your-enslavement/
https://www.federated.computer/blog/torbox-release-040/
https://www.federated.computer/blog/tracking-every-cash-transaction/
https://www.federated.computer/blog/miliatary-captures-internet/
https://www.federated.computer/blog/why-decentralization-matters/
https://www.federated.computer/blog/page/29/
https://www.federated.computer/blog/page/28/
https://www.federated.computer/blog/company-risk-assessment/
https://www.federated.computer/blog/zero-data-app/
https://www.federated.computer/blog/have-i-been-pawned/
https://www.federated.computer/blog/protonmail-bridge-problems/
https://www.federated.computer/blog/icloud-for-windows-problems/
https://www.federated.computer/blog/rise-of-user-hostile-software/
https://www.federated.computer/blog/why-self-hosting-is-important/
https://www.federated.computer/blog/verified-onion-sites/
https://www.federated.computer/blog/understanding-email/
https://www.federated.computer/blog/tor-only-bitcoin-lightning-guide/
https://www.federated.computer/blog/screw-it-ill-host-it-myself/
https://www.federated.computer/blog/sky-secure-global-indictment/
https://www.federated.computer/blog/apple-checking-images-evidence/
https://www.federated.computer/blog/old-phone-no-good/
https://www.federated.computer/blog/what-happens-web-loses/
https://www.federated.computer/blog/marshall-mcluhan-surveillance-riff/
https://www.federated.computer/blog/privacy-is-ok/
https://www.federated.computer/blog/create-your-own-bitcoin-giveaway-card/
https://www.federated.computer/blog/page/10/
https://www.federated.computer/blog/lastpass-security-incident/
https://www.federated.computer/blog/social-credit-score-to-access-internet/
https://www.federated.computer/blog/2022-year-of-desktop-linux/
https://www.federated.computer/blog/time-and-attention-as-currency/
https://www.federated.computer/blog/gmail-encrypted/
https://www.federated.computer/blog/breaking-google-maps-monopoly/
https://www.federated.computer/blog/page/11/
https://www.federated.computer/blog/scrub-yourself-from-the-internet/
https://www.federated.computer/blog/self-hosted-podcast/
https://www.federated.computer/blog/self-hosted-saas-tools/
https://www.federated.computer/blog/sha256-algorithm-explained/
https://www.federated.computer/blog/smart-phones-fragment-attention-span/
https://www.federated.computer/blog/surveillance-state-making-a-list/
https://www.federated.computer/blog/page/27/
https://www.federated.computer/blog/private-secure-lora-messaging/
https://www.federated.computer/blog/nsa-collects-data/
https://www.federated.computer/blog/qubes/
https://www.federated.computer/blog/reclaiming-mobile-privacy-grapheneos/
https://www.federated.computer/blog/router-security-howto/
https://www.federated.computer/blog/safing-free-open-source-firewall/
https://www.federated.computer/blog/page/26/
https://www.federated.computer/blog/symptoms-of-fiat-poisoning/
https://www.federated.computer/blog/drowning-in-ai-garbage/
https://www.federated.computer/blog/rediscovery-of-money/
https://www.federated.computer/blog/the-casino-chip-society/
https://www.federated.computer/blog/delhi-rules-telegram-discloses/
https://www.federated.computer/blog/checklist-digital-privacy-security/
https://www.federated.computer/blog/page/12/
https://www.federated.computer/blog/everything-you-need-passphrases/
https://www.federated.computer/blog/21-rules-of-bitcoin-maxi/
https://www.federated.computer/blog/privacy-tools-for-information-age/
https://www.federated.computer/blog/google-being-sneaky-maps-permissions/
https://www.federated.computer/blog/all-eyes-are-on-us/
https://www.federated.computer/blog/unique-visitors-without-cookies/
https://www.federated.computer/blog/page/13/
https://www.federated.computer/blog/acquire-non-kyc-bitcoin/
https://www.federated.computer/blog/rant-about-signal/
https://www.federated.computer/blog/opendesktop/
https://www.federated.computer/blog/orange-pilled-veteran/
https://www.federated.computer/blog/pine-64-project/
https://www.federated.computer/blog/poste-io/
https://www.federated.computer/blog/page/25/
https://www.federated.computer/blog/monitor-brain-activity/
https://www.federated.computer/blog/lineageos/
https://www.federated.computer/blog/microsoft-killing-custom-domains/
https://www.federated.computer/blog/lastpass-hacked/
https://www.federated.computer/blog/mutt/
https://www.federated.computer/blog/dutch-schools-must-stop-using-google/
https://www.federated.computer/blog/page/24/
https://www.federated.computer/blog/france-says-non/
https://www.federated.computer/blog/bitcoin-plugin-wordpress/
https://www.federated.computer/blog/swinging-back-to-open-standards/
https://www.federated.computer/blog/indian-isps-give-givernment-full-access/
https://www.federated.computer/blog/thunderbird-supernova-preview/
https://www.federated.computer/blog/apple-tracks-you-in-ios/
https://www.federated.computer/blog/page/14/
https://www.federated.computer/blog/building-a-self-sovereign-lifestyle/
https://www.federated.computer/blog/tyranny-looms-digital-ids-cbdc/
https://www.federated.computer/blog/apple-tracking-you-in-app-store/
https://www.federated.computer/blog/self-hosting-guide/
https://www.federated.computer/blog/privacy-com-scam/
https://www.federated.computer/blog/invisv/
https://www.federated.computer/blog/page/15/
https://www.federated.computer/blog/working-from-home-surveillance/
https://www.federated.computer/blog/how-to-stack-sats/
https://www.federated.computer/blog/no-kyc-aml-lists/
https://www.federated.computer/blog/what-can-others-learn-scraping-instagram/
https://www.federated.computer/blog/impact-of-lastpass-on-bitcoin-wallets/
https://www.federated.computer/blog/learn-bitcoin-interactively/
https://www.federated.computer/blog/page/23/
https://www.federated.computer/blog/cryptocurrency-question-of-trust/
https://www.federated.computer/blog/automatic-csam-scanning-eu/
https://www.federated.computer/blog/signal-has-a-back-door/
https://www.federated.computer/blog/marshall-mcluhan-future-advertising-information-services/
https://www.federated.computer/blog/grapheneos/
https://www.federated.computer/blog/setup-home-server-bitcoin-node/
https://www.federated.computer/blog/page/22/
https://www.federated.computer/blog/katzenpost/
https://www.federated.computer/blog/basecamp-is-leaving-the-cloud/
https://www.federated.computer/blog/ios-16-leaks-connections/
https://www.federated.computer/blog/apple-ad-business/
https://www.federated.computer/blog/whatsapp-messages-intercepted-by-government/
https://www.federated.computer/blog/how-to-stop-google-collecting/
https://www.federated.computer/blog/page/16/
https://www.federated.computer/blog/get-off-gmail/
https://www.federated.computer/blog/cryptography-is-not-enough/
https://www.federated.computer/blog/meta-injecting-code-into-websites/
https://www.federated.computer/blog/us-military-surveillance-on-internet/
https://www.federated.computer/blog/fighting-spam/
https://www.federated.computer/blog/choose-btc-wallet/
https://www.federated.computer/blog/page/17/
https://www.federated.computer/blog/big-batch-of-breaches/
https://www.federated.computer/blog/btcmap-org/
https://www.federated.computer/blog/build-your-own-seedsigner/
https://www.federated.computer/blog/moxie-marlinspike-on-centralization/
https://www.federated.computer/blog/mass-surveillance-app-secret/
https://www.federated.computer/blog/corporate-coalition-wants-digital-id/
https://www.federated.computer/blog/page/21/
https://www.federated.computer/blog/apple-advertising-app-store/
https://www.federated.computer/blog/free-services-an-allegory/
https://www.federated.computer/blog/apple-is-building-demand-side-platform/
https://www.federated.computer/blog/apple-turned-off-airdrop/
https://www.federated.computer/blog/apple-tv-ad-product/
https://www.federated.computer/blog/bisq/
https://www.federated.computer/blog/page/20/
https://www.federated.computer/blog/iphone-equals-privacy-question/
https://www.federated.computer/blog/reply-to-thrown-in-the-towel/
https://www.federated.computer/blog/how-to-be-a-profitable-lnd-node/
https://www.federated.computer/blog/thrown-in-the-towel-email-hosting/
https://www.federated.computer/blog/apple-refuses-to-cooperate/
https://www.federated.computer/blog/how-a-lightning-address-works/
https://www.federated.computer/blog/page/18/
https://www.federated.computer/blog/data-broker-helps-police-see-everywhere-youve-been/
https://www.federated.computer/blog/rights-laws-google/
https://www.federated.computer/blog/embracing-the-kill-switch/
https://www.federated.computer/blog/employers-surveill-employees/
https://www.federated.computer/blog/tmobile-starlink-link/
https://www.federated.computer/blog/email-clients-are-bad/
https://www.federated.computer/blog/page/19/
https://www.federated.computer/blog/awesome-self-hosted/
https://www.federated.computer/blog/iphone-usage-data-anonymous/
https://www.federated.computer/blog/tools-to-protect-macos/
https://www.federated.computer/blog/who-controls-the-internet/
https://www.federated.computer/blog/robosats/
https://www.federated.computer/blog/silent-link-anonymous-esim/
https://www.federated.computer/blog/build-a-gun/
https://www.federated.computer/blog/stop-apple-tracking-you/
https://www.federated.computer/blog/value-for-value/
https://www.federated.computer/blog/dangers-of-digital-identity/
https://www.federated.computer/blog/lightning-wallet-comparison/
https://www.federated.computer/blog/apple-webapps-browsers/
https://www.federated.computer/blog/oracle-worldwide-surveillance-machine/
https://www.federated.computer/blog/we-kill-people-based-on-metadata/
https://www.federated.computer/blog/googerteller/
https://www.federated.computer/blog/bitcoin-seed-phrase-backup-devices/
https://www.federated.computer/blog/email-done-my-way/
https://www.federated.computer/blog/huge-scale-of-us-gov-cell-location-data/
https://www.federated.computer/blog/awesome-privacy/
https://www.federated.computer/blog/personal-security-checklist/
https://www.federated.computer/blog/awesome-oss-alternatives/
https://www.federated.computer/blog/what-is-layer-three/
https://www.federated.computer/blog/redecentralize/
https://www.federated.computer/blog/tracing-cameras/