This list organizes both the Junji Ito horror adaptations and the broad spectrum of other anime and OVAs you or the person have watched, reflecting a very comprehensive and eclectic anime-watching journey.
To set up systemwide custom ad-filtering DNS (such as Mullvad’s secure DNS over TLS, including ad blocking and enhanced privacy) on Android, follow these straightforward steps. This ensures safer browsing and blocks unwanted ads across all apps and browsers 🚀.
Android Devices: Systemwide Secure DNS 🌐
Android 9 and newer versions support DNS over TLS (DoT) for systemwide encrypted DNS. Here’s how you set it up with Mullvad’s ad-filtering DNS, for example, extended.dns.mullvad.net.
Step-by-Step Instructions 📱
Open Settings ⚙️
Launch the Android Settings app from your app drawer or home screen.
Access Network & Internet 🌍
Scroll down and tap Network & internet.
Configure Private DNS 🛡️
Tap on Private DNS.
Select Private DNS provider hostname when prompted.
Enter Custom DNS Hostname ✍️
Type in your chosen Mullvad DNS service. For enhanced filtering, enter:
extended.dns.mullvad.net
Other options include:
adblock.dns.mullvad.net for ad filtering
family.dns.mullvad.net for family-friendly filtering
Save Your Settings 💾
Tap Save or OK.
Test and Enjoy 🚦
Once set, your device will use the Mullvad DNS (ad-filtering and secure) systemwide. All apps, browsers, and services will benefit!
To test: Visit Mullvad’s DNS check page (search for “Mullvad DNS check”) to verify your settings.
Useful Tips 📝
If Android can't connect, the DNS server might be too far, causing high latency. Try a different server if needed.
Using custom DNS servers may impact privacy, as DNS requests are visible to the provider you set. Mullvad’s servers, however, do not log requests and prioritize privacy.
You can always revert by selecting “Automatic” in Private DNS settings if you notice connectivity issues.
✨ With these steps, your Android device is now protected by a systemwide, secure DNS—blocking ads and keeping your browsing private! Protect your phone, enjoy ad-free apps, and browse with peace of mind! 🌈🛡️
If you’ve been searching for a privacy-respecting, open-source alternative to the Play Store, Droidify might be your new favorite app! 🎉
Droidify lets you easily browse, install, and update apps from the F-Droid repository — all in a sleek, modern interface. Unlike typical app stores, Droidify is completely ad-free, requires no user account, and keeps your data private. 🔒
💡 Key Features:
Modern UI built with Material Design 3
Fast app search with filters and sorting options
Automatic updates for installed apps
Support for multiple repositories
No trackers, no bloat, just clean open-source code 💚
If you believe in free software and valuing your privacy, Droidify is definitely worth checking out. 🚀
The Electronic Frontier Foundation (EFF) has teamed up with AV Comparatives to test how well major antivirus apps for Android detect stalkerware in 2025. Stalkerware apps are covertly installed to spy on users by exfiltrating data without their knowledge. This test highlights the ongoing battle between antivirus vendors and stalkerware developers.
Key Findings:
Detection Quality Varies: Malwarebytes scored a perfect 100% detection rate in identifying stalkerware, closely followed by ESET, Bitdefender, McAfee, and Kaspersky, each missing just one sample.
Google Play Protect & Trend Micro Lag Behind: Detection rates for Google Play Protect and Trend Micro were 53% and 59%, respectively. Google's low detection is partly due to stalkerware designed to evade its default protection.
Fewer Unique Stalkerware Products in 2025: The test identified 17 unique stalkerware products, down from 20 in 2020 and 2021, pointing to potential effects from regulatory crackdowns and the rise of physical Bluetooth trackers like AirTags as alternatives.
Why It Matters:
These insights help users, especially those vulnerable to domestic abuse, choose antivirus apps that effectively detect stalkerware. It also shines a light on detection gaps, urging antivirus companies to renew focus on this critical issue.
For everyone concerned about privacy and security on Android devices, the test results offer invaluable guidance to stay protected against covert surveillance.
Stay safer in your activism with simple, actionable guides to protect your digital life and physical safety. The site “Activist Checklist” takes a harm reduction approach, helping you start where you are and do what you can.
Why It Matters 🚨
Before You Get Deeply Involved: The best time to secure your data is before your activism becomes a target.
Widespread Surveillance: Mass surveillance profiles activists, predicts protests, and targets communities.
Protect Your Networks: Securing your communications protects both you and the communities around you.
What You'll Find on ActivistChecklist.org 🛡️
Simple Checklists: Easy-to-follow digital security and physical safety steps.
Common Misconceptions: Bust myths to better understand the reality of activist data risks.
Latest Surveillance News: Real-time updates with examples like FBI visits to protesters and ICE spying tactics.
New Features: Personal emergency planning checklists, link sharing advice, and printable flyers for spreading awareness.
Recent News Highlights 📰
FBI agents visiting anti-ICE protesters using surveillance data.
ICE spying on WhatsApp communications.
Charges against “Antifa” protesters for constitutionally protected activities.
These stories highlight why digital security is critical for activists.
Get Started Today! 🎯
Start protecting your digital footprint and physical safety now — it’s simpler than you think and essential for your movement’s resilience.
There is no direct Linux terminal command that explicitly outputs the CMOS battery status as a voltage level or detailed measurement. However, Linux provides a basic go/no-go indicator of the CMOS battery status through the realtime clock (RTC) interface.
You can check the CMOS battery status by running:
cat /proc/driver/rtc | grep batt_status
This command shows a batt_status field which will display okay if the CMOS battery is in acceptable condition.
If the battery is dead or failing, it typically shows dead.
This indicator is based on whether the RTC time and date seem reasonable rather than an actual voltage measurement, so it acts as a rough health check rather than a precise reading.
For a more detailed voltage measurement, specialized hardware monitoring tools like lm-sensors might detect the battery voltage if the sensor is supported and labeled (e.g., Vbat), but this is uncommon and motherboard-specific.
In summary, the simplest method to check CMOS battery health under Linux is:
cat /proc/driver/rtc | grep batt_status
— showing “okay” means the battery is working; otherwise, it may need replacement.[1][5][8]
When news stories say WhatsApp and Signal are “hacked” by Paragon’s Graphite, it’s important to know it’s not magic; it’s malware. If installed, it’s like giving your unlocked phone to Paragon and ICE. But, it’s too costly to use widely, and even if you’re targeted you can defend yourself. (2/8)
https://ssd.eff.org/module/mobile-phones-malware
This DOES NOT break end-to-end encryption between devices. Only saved chats are captured on an infected device. That means deleting old or unnecessary chats and turning on disappearing messages can mitigate everyone's risk. (3/8)
https://ssd.eff.org/module/how-to-use-signal#disappearing-messages
You can take other precautions to prevent malware infection in the first place. On iPhone, lockdown mode can block features used to load malware, like opening attachments in the Messages app. (5/8)
https://ssd.eff.org/module/how-to-enable-lockdown-mode-on-iphone
After these steps, Signal and Whatsapp should be safe to use with routine data hygiene, like installing updates and minimizing your number of installed apps. It only takes one malware infected user to compromise a whole chat, so be cautious about sharing sensitive information in big groups. (7/8
https://ssd.eff.org/module/seven-steps-digital-security
Cases like this are reminders that privacy is a team sport. Protect yourself and your community by sharing these tips and our Surveillance Self-Defense guides. (8/8)
https://ssd.eff.org/"
The consensus from experts and digital rights organizations like the Electronic Frontier Foundation (EFF) is that your phone is probably not secretly listening to you through its microphone to deliver targeted ads. There is no verified evidence that companies are covertly recording your conversations without consent for advertising purposes.
Instead, the feeling that your phone is listening comes from advertisers and data brokers using extensive profiles built from other sources of data collected in covert ways. These data brokers gather information about you online and offline—such as your age, location, browsing history, device identifiers broadcast over Bluetooth and WiFi, and your behavior on websites. They then use this detailed information to make educated guesses about what products or ads might appeal to you. If you see a targeted ad that seems eerily linked to a recent conversation, it's more likely due to this complex tracking and profiling across various platforms and devices rather than actual audio surveillance through your microphone.
There have been cases of apps or malware misusing microphone access, but those are against the law and subject to enforcement and fines. Also, some smartphones use microphones for voice commands or assistants with user permission, but this is distinct from secret listening.
Overall, the problem lies in pervasive and often invisible tracking methods rather than audio surveillance, involving an entire ecosystem of data brokers and advertising networks compiling and sharing detailed user profiles.[2][4]
The EFF advises users to:
– Use privacy tools like browser extensions to block trackers
– Review and limit app permissions asking for microphone or data access
– Manage data collection on smart devices
– Support stronger privacy laws and regulations against data broker practices.[4]
This explanation aligns with recent discussions and research on the topic showing that the myth of phones secretly listening is largely a misunderstanding of how targeted advertising works.[3][6]
The website 404 Media hosts a popular, more legible PDF version of the “Simple Sabotage Field Manual,” a World War II era guide originally created by the Office of Strategic Services (OSS) to train ordinary citizens in acts of simple sabotage against fascist regimes. This manual was declassified by the CIA in 2008 and describes ways to annoy and disrupt enemy operations through everyday acts that do not require special equipment or training.
The manual surged in popularity recently, becoming one of the most accessed books on Project Gutenberg, with over 230,000 downloads in 30 days, reflecting renewed interest in its tactics for resistance and sabotage. The PDF version shared by 404 Media was reformatted by a reader to be more readable and searchable, improving on an older, blurry CIA release.
The guide includes tactics for disrupting bureaucratic work, lowering morale, creating confusion, and more direct acts of physical sabotage, targeting roles like telephone operators, train conductors, managers, employees, and even movie theater patrons. The guide emphasizes simple, low-risk actions that ordinary people can take to resist oppressive systems or administrations.
You can find the reformatted PDF through 404 Media, which shares it openly to allow wider access and use. The manual's resurgence has been linked to current sentiments about organizational and governmental frustrations, inspiring some to explore these historical sabotage tactics as subtle acts of resistance.[4][6][8]
How the Internet Really Works: An Illustrated Guide to Protocols, Privacy, Censorship, and Governance is a comic book-style, illustrated introduction designed to explain the technical workings of the Internet in an accessible, jargon-free way. Written by ARTICLE 19, an international non-profit focused on freedom of expression, with contributions from experts like Mallory Knodel, the book breaks down how data moves through the Internet, the protocols involved, how security and privacy function under the hood, and issues related to censorship and governance.
The book uses playful illustrations and the narration of a cat character named Catnip to guide readers through topics such as:
How the Internet is networked, including nodes, packets, and protocols
Cryptographic techniques that secure data secrecy and integrity
How censorship is implemented, monitored, and circumvented
Algorithms, cybernetics, and machine decision-making on the Internet
Centralization of Internet power and its impact on democracy and human rights
Internet governance and ways for civil society to engage with it
It aims to give readers enough technical understanding to advocate for their digital rights and privacy, empowering them to safeguard their security and participate in shaping internet laws and policies. The tone and style make it suitable for non-technical audiences seeking a foundational grasp of how the Internet really works from both a technological and socio-political perspective.
The book also serves as a call to action for a digitally inclusive and rights-respecting internet future. It is valuable for citizens concerned about online safety, civil servants addressing censorship, advocates of freedom of expression, and anyone curious about Internet infrastructure.
In summary, this guide combines education on Internet protocols and infrastructure with a focus on privacy, censorship, and governance, all conveyed through clear language and engaging visuals for general readers.[1][3][5][7][8][9]