• 0x0@programming.dev
    link
    fedilink
    arrow-up
    3
    ·
    1 month ago

    besides not using Google?

    That’s a bit oxymoronic, isn’t it? And the answer always depends on your threat model, so start there.