Posted inNews

Lilbits: Open source Linux graphics drivers for Apple Silicon, and Winamp plays NFTs now for some reason

One of the key things that makes a Mac computer a Mac is clearly that it ships with Apple’s macOS software. But back when the company was still making Macs with Intel processors it was fairly easy to install a different operating system – Apple even offered its own Boot Camp solution for dual booting […]

Posted inNews

Lilbits: NVIDIA Jetson AGX Orin, Raspberry Pi 4 gets a speed boost, Samsung announces LPDDR5X memory

NVIDIA’s next single-board computer will offer 6X the processing power of its predecessor, while keeping the same small size and form factor. Just don’t expect the new NVIDIA Jetson AGX Orin  it to have a Raspberry Pi-like affordable price tag. NVIDIA positions its Jetson modules as development platforms for robotics, autonomous machines, and other embedded […]

Posted inNews

Lilbits 368: Huawei can’t seem to catch a break

In the days since the US put Huawei on an “entities list” and prohibited US companies from doing business with the Chinese tech company, the implications have kept piling up. A number of companies based outside the US have ceased working with Huawei, including UK-based chip designer Arm since the company uses some technology developed in […]

Posted inNews

Tor Browser goes mobile: browse anonymously on Android

Using incognito or private browsing mode when surfing the web will prevent your device from saving your history. But it won’t stop internet service providers, websites, or other entities from tracking you as you use the web. That’s where Tor Browser comes in. By routing your data through a network of thousands of independent servers, […]

Posted inNews

Tor Browser 8.0 released, makes anonymous web browsing easier

Tor is a tool that allows users to access the internet anonymously by routing data through a network of thousands of relay servers run by volunteers, making it harder for governments, businesses, or anyone else to track individual users. It can be used by political dissidents to shield their communications from oppressive governments, by criminals […]