{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Centium","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/Centium","_microblog":{"about":"https://micro.blog/about/api","id":"1912628","username":"Centium","bio":"","pronouns":"","is_following":false,"is_you":false,"following_count":0,"discover_count":0},"author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://www.gravatar.com/avatar/4ef985487c384db0b930ef90b3b6f99a?s=96&d=https%3A%2F%2Fmicro.blog%2Fimages%2Fblank_avatar.png"},"items":[{"id":"90316699","content_html":"<p><a href=\"https://micro.blog/ChrisJWilson\">@ChrisJWilson</a> You have great ideas. But do you know how to take a project from idea to result? Here you can learn how to do it. <a href=\"https://theceoviews.com/technology-innovation-management-guiding-long-term-growth-from-idea-to-impact/\">click </a></p>\n","url":"https://micro.blog/Centium/90316699","date_published":"2026-05-16T21:25:59+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 21:25","date_timestamp":1778966759,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90316543","content_html":"<p><a href=\"https://micro.blog/Denny\">@Denny</a> As a responsible person on this planet, you will be pleasantly surprised by what is happening in construction. It made me very happy. This is a new level  i find on this <a href=\"https://dailycivil.com/concrete-waste-no-more-planning-measurement-tactics-that-save-every-pour/\">site</a> news. And we shouldn’t forget that it’s not ordinary people who litter the most — it’s factories and manufacturing.</p>\n","url":"https://micro.blog/Centium/90316543","date_published":"2026-05-16T21:20:45+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 21:20","date_timestamp":1778966445,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90316302","content_html":"<p><a href=\"https://micro.blog/adamprocter\">@adamprocter</a> Everything is changing in education right now. For example, they are seriously considering introducing mental health assessments into the education system read <a href=\"https://kstatecollegian.com/2026/04/15/campus-well-being-why-mental-health-access-has-become-an-academic-metric/\">here</a></p>\n","url":"https://micro.blog/Centium/90316302","date_published":"2026-05-16T21:13:25+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 21:13","date_timestamp":1778966005,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90316167","content_html":"<p><a href=\"https://micro.blog/jack\">@jack</a> As a website owner, you might be interested in the development of cloud technologies right now <a href=\"https://itsupplychain.com/supply-chain-surge-how-cloud-platforms-redefine-execution-from-dock-to-door/\">https://itsupplychain.com/supply-chain-surge-how-cloud-platforms-redefine-execution-from-dock-to-door/</a></p>\n","url":"https://micro.blog/Centium/90316167","date_published":"2026-05-16T21:09:40+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 21:09","date_timestamp":1778965780,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90315916","content_html":"<p><a href=\"https://micro.blog/tryllid\">@tryllid</a> I love micro-cities that are created in different locations — there’s something to them. In general, it’s important for a city to be alive and have local events. About the importance of this — here <a href=\"https://gilaherald.com/small-town-connection-why-local-events-matter-more-than-ever/\">click</a>.</p>\n","url":"https://micro.blog/Centium/90315916","date_published":"2026-05-16T21:03:10+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 21:03","date_timestamp":1778965390,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90315756","content_html":"<p><a href=\"https://micro.blog/bryan\">@bryan</a> It’s all for the growth of corporations. Apple doesn’t bring in as much revenue as candy or Coca-Cola. I think soon they’ll be giving out bank cards to children. In some countries, kids already have cards. And in general, banks already have all the data about you and your children — so what’s stopping them? Take a look to better understand on this <a href=\"https://techbullion.com/data-driven-fintech-how-real-time-insight-guides-everyday-money-choices/\">site</a>.</p>\n","url":"https://micro.blog/Centium/90315756","date_published":"2026-05-16T20:58:42+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:58","date_timestamp":1778965122,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90315455","content_html":"<p><a href=\"https://micro.blog/cjhubbs\">@cjhubbs</a> Now is not the time to think about small things like choosing a laptop for work. We will soon be replaced by robots. <a href=\"https://siit.co/blog/why-ai-literacy-is-becoming-a-business-advantage-not-just-a-technical-skill/52819\">Here</a>’s one article on this topic. But this is just one article — there are hundreds like it. Soon all of humanity will be out of work.</p>\n","url":"https://micro.blog/Centium/90315455","date_published":"2026-05-16T20:49:26+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:49","date_timestamp":1778964566,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90315248","content_html":"<p><a href=\"https://micro.blog/ner3y\">@ner3y</a> Yeah, I know the feeling — when you register a business and your phone gets blown up with calls, and you don’t know how to avoid it. I don’t know either, but I’m pretty sure this can help a business — I read about it here <a href=\"https://www.nerdly.co.uk/2026/04/23/what-actually-raises-business-insurance-premiums-the-fastest/\">https://www.nerdly.co.uk/2026/04/23/what-actually-raises-business-insurance-premiums-the-fastest/</a> Good luck with your business and fewer annoying calls</p>\n","url":"https://micro.blog/Centium/90315248","date_published":"2026-05-16T20:44:17+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:44","date_timestamp":1778964257,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90314897","content_html":"<p><a href=\"https://micro.blog/christopherchelpka\">@christopherchelpka</a> Nowadays, advertising in social networks works much more subtly. They launch tons of ads — thousands of them. That’s how even politicians win elections. I found out how they do it without getting banned because of having a thousand accounts. <a href=\"https://www.applegazette.com/resources/why-multi-accounting-browsers-are-the-secret-weapon-of-modern-digital-marketing/\">https://www.applegazette.com/resources/why-multi-accounting-browsers-are-the-secret-weapon-of-modern-digital-marketing/</a></p>\n","url":"https://micro.blog/Centium/90314897","date_published":"2026-05-16T20:35:50+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:35","date_timestamp":1778963750,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90314551","content_html":"<p><a href=\"https://micro.blog/jgordon\">@jgordon</a> Mainstream browsers are fine, but they still track your activity. So for privacy online, it’s better to use special programs — like the one they talk about here <a href=\"https://axeetech.com/proxy-browser-how-to-safely-bypass-web-restrictions/\">https://axeetech.com/proxy-browser-how-to-safely-bypass-web-restrictions/</a> . There are plenty of them. In general, if you’re not using proxies, you won’t have any real privacy.</p>\n","url":"https://micro.blog/Centium/90314551","date_published":"2026-05-16T20:27:06+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:27","date_timestamp":1778963226,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90314244","content_html":"<p><a href=\"https://micro.blog/Bruff\">@Bruff</a> Try a private browser. Here they talk about one of them<a href=\"https://www.fontmirror.com/en/why-you-need-more-than-just-a-standard-browser/\"> https://www.fontmirror.com/en/why-you-need-more-than-just-a-standard-browser/</a></p>\n","url":"https://micro.blog/Centium/90314244","date_published":"2026-05-16T20:19:33+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:19","date_timestamp":1778962773,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90314075","content_html":"<p><a href=\"https://micro.blog/zorn\">@zorn</a> Since you’re thinking about privacy on the internet, this article on the topic — which I just read — might be useful to you <a href=\"https://routerctrl.com/1browser-review-a-simple-proxy-browser-that-tries-to-keep-things-practical/\">https://routerctrl.com/1browser-review-a-simple-proxy-browser-that-tries-to-keep-things-practical/</a> . The microblog algorithms suggested your post to me. Hmm, how did they know this topic interests me?</p>\n","url":"https://micro.blog/Centium/90314075","date_published":"2026-05-16T20:15:51+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 20:15","date_timestamp":1778962551,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90300202","content_html":"<p><a href=\"https://micro.blog/aaronpk\">@aaronpk</a> That’s why it’s important to stay anonymous online and use special software and proxies. How to use them correctly and how to choose them — here’s a tip <a href=\"https://jedok.com/blog/why-picking-the-right-proxy-service-actually-makes-a-difference/2026/\">https://jedok.com/blog/why-picking-the-right-proxy-service-actually-makes-a-difference/2026/</a></p>\n","url":"https://micro.blog/Centium/90300202","date_published":"2026-05-16T15:38:41+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:38","date_timestamp":1778945921,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90299953","content_html":"<p><a href=\"https://micro.blog/bryan\">@bryan</a> You’re quite an experienced internet user — I hope you managed to successfully transfer everything. These days you really need to be careful online. They know everything about us — and I’m not paranoid, that’s just how it is. I was thinking about how to protect myself online and came across an article. <a href=\"https://rocketdigit.com/why-you-might-need-a-proxy-server-or-browser-today/\">https://rocketdigit.com/why-you-might-need-a-proxy-server-or-browser-today/</a></p>\n","url":"https://micro.blog/Centium/90299953","date_published":"2026-05-16T15:33:39+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:33","date_timestamp":1778945619,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90299454","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/hskrk@social.hackerspace.pl\" class=\"u-url mention\">@hskrk</a></span> This knowledge might be useful for you in your work. <a href=\"https://businessandpower.com/when-to-use-a-proxy-server-or-browser/\">click</a></p>\n","url":"https://micro.blog/Centium/90299454","date_published":"2026-05-16T15:26:48+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:26","date_timestamp":1778945208,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90299312","content_html":"<p><a href=\"https://micro.blog/changelog\">@changelog</a> Hackers — are they like the new superheroes? I found an article about how hackers fight the system <a href=\"https://coinarbitragebot.com/blog/how-sybil-hunters-and-shadow-farmers-are-warring-over-web3.html\">https://coinarbitragebot.com/blog/how-sybil-hunters-and-shadow-farmers-are-warring-over-web3.html</a></p>\n","url":"https://micro.blog/Centium/90299312","date_published":"2026-05-16T15:23:54+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:23","date_timestamp":1778945034,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90298723","content_html":"<p><a href=\"https://micro.blog/jdm\">@jdm</a> Only we can appreciate freedom, but we’re already in digital cages — websites and big corporations collect data about us. How is that not a cage? And then the same ad over and over until you buy. We have to fight for freedom, but no one really wants to. It’s easier, like it says on the  <a href=\"https://apps.uk/reclaiming-your-digital-freedom-why-the-right-tools-matter-for-modern-browsing/\">site</a>, to just use these tools and at least get a little closer to freedom.</p>\n","url":"https://micro.blog/Centium/90298723","date_published":"2026-05-16T15:13:51+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:13","date_timestamp":1778944431,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90298371","content_html":"<p><a href=\"https://micro.blog/jarrod\">@jarrod</a> It’s just that there’s some sad statistics — half of the internet is bots, and most of your Instagram friends might not even exist (unless you’ve met them in person). I even found a tutorial on how to create lots of different Instagram accounts without getting banned. So now they’re actually teaching this stuf <a href=\"https://addmagazine.co.uk/understanding-proxy-browsers-and-proxies-for-instagram-a-guide-to-online-privacy-and-security/\">here</a></p>\n","url":"https://micro.blog/Centium/90298371","date_published":"2026-05-16T15:07:39+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:07","date_timestamp":1778944059,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90297992","content_html":"<p><a href=\"https://micro.blog/peterw\">@peterw</a> Have you ever wondered how spies in TV shows stay unnoticed? They use all these top-secret super mega hacker tools. But in reality, there are programs that are freely available on the market. So there’s nothing secret about it, and everything is much simpler in the real world than in the shows. This article actually talks about one of those ‘secret’ tools from the shows <a href=\"https://www.applegazette.com/resources/how-antidetect-browsers-and-web-unlockers-keep-you-invisible/\">click</a></p>\n","url":"https://micro.blog/Centium/90297992","date_published":"2026-05-16T15:00:39+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 15:00","date_timestamp":1778943639,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90297510","content_html":"<p><a href=\"https://micro.blog/sandobox\">@sandobox</a> Yes, you’re right — the internet has changed. Nowadays, either someone is selling you something, or you’re selling something. But in response, incognito browsers have started to appear. They reduce the amount of advertising — or bring it down to zero — and help you stay anonymous. I found information about them on a <a href=\"https://hardwaresecrets.com/how-antidetect-browsers-and-proxies-are-reshaping-the-modern-web/\">site</a>.</p>\n","url":"https://micro.blog/Centium/90297510","date_published":"2026-05-16T14:52:56+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 14:52","date_timestamp":1778943176,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90297139","content_html":"<p><a href=\"https://micro.blog/peopleforrester\">@peopleforrester</a> To make sure an AI bot knows nothing about you — either don’t share anything, or use an anti-detect browser. It will also be useful for general internet surfing. So think about your online security. Here is some information about <a href=\"https://www.scienceline.net/proxys-datacenter-ou-residentiels-comment-choisir-selon-vos-usages-reels\">here</a> / browsers</p>\n","url":"https://micro.blog/Centium/90297139","date_published":"2026-05-16T14:46:12+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 14:46","date_timestamp":1778942772,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90296947","content_html":"<p><a href=\"https://micro.blog/samgrover\">@samgrover</a> Since you’re interested in the topic of changing your IP to another country, this article might be useful. It explains how to choose them correctly. <a href=\"https://www.scienceline.net/proxys-datacenter-ou-residentiels-comment-choisir-selon-vos-usages-reels/\">https://www.scienceline.net/proxys-datacenter-ou-residentiels-comment-choisir-selon-vos-usages-reels/</a></p>\n","url":"https://micro.blog/Centium/90296947","date_published":"2026-05-16T14:40:41+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 14:40","date_timestamp":1778942441,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90296777","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/Proxy@snouts.online\" class=\"u-url mention\">@Proxy</a></span> I see you’re interested in this. But do you know how to use them for WhatsApp? I didn’t know either until I read an article — I don’t remember exactly which website. I can’t find it anymore — but here, I quickly found something similar to what I read back then. <a href=\"https://linkdegrupo.com.br/blog/como-utilizar-proxy-para-whatsapp-com-mais-seguranca-e-estabilidade/\">https://linkdegrupo.com.br/blog/como-utilizar-proxy-para-whatsapp-com-mais-seguranca-e-estabilidade/#google_vignette</a></p>\n","url":"https://micro.blog/Centium/90296777","date_published":"2026-05-16T14:35:35+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 14:35","date_timestamp":1778942135,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90296598","content_html":"<p><a href=\"https://micro.blog/amerpie\">@amerpie</a> If you don’t want algorithms to decide what you should share on your blog, it’s better to use a special browser. It’s also more secure because you won’t leave a trace on the internet, and algorithms won’t know what to suggest to you. Clean search without algorithms — I think that’s cool. Found out about it here. <a href=\"https://honadi.com/blog/outils/navigateurs-anti-detection/\">https://honadi.com/blog/outils/navigateurs-anti-detection/</a></p>\n","url":"https://micro.blog/Centium/90296598","date_published":"2026-05-16T14:28:51+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 14:28","date_timestamp":1778941731,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90296175","content_html":"<p><a href=\"https://micro.blog/Denny\">@Denny</a> For greater anonymity online and for using multi-accounts, I recommend reading this article — it’s really well written on how to avoid getting banned on websites because of this. The article is in French, but it translates right away in Google Chrome. <a href=\"https://www.mon-expert-digital.com/blog/technologies/meilleures-pratiques-gerer-plusieurs-comptes-en-ligne-anonymement.html\">https://www.mon-expert-digital.com/blog/technologies/meilleures-pratiques-gerer-plusieurs-comptes-en-ligne-anonymement.html</a></p>\n","url":"https://micro.blog/Centium/90296175","date_published":"2026-05-16T14:19:19+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 14:19","date_timestamp":1778941159,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"90296651","content_html":"<p>Africa: <a href=\"https://centium.micro.blog/2026/05/16/africa.html\">centium.micro.blog</a></p>","summary":"","url":"https://centium.micro.blog/2026/05/16/africa.html","date_published":"2026-05-16T12:46:41+00:00","author":{"name":"Centium","url":"https://centium.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fwww.gravatar.com%2Favatar%2F4ef985487c384db0b930ef90b3b6f99a%3Fs%3D96%26d%3Dhttps%253A%252F%252Fmicro.blog%252Fimages%252Fblank_avatar.png","_microblog":{"username":"Centium"}},"_microblog":{"date_relative":"2026-05-16 12:46","date_timestamp":1778935601,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}}]}