Because your information is what a number of services use to make money. Even before VPNs come into the equation, you’re undercutting the service’s ability to sell you by anonymizing yourself.
That said, as noted elsewhere here, VPNs can be used by bad actors which can get you just put on a massive block list; and in addition, VPNs can be used to circumvent regional protections such as provisions on what countries can watch what content on video streaming services, which those services also want to prevent and so can block known VPN addresses to avoid.


deleted by creator


deleted by creator


A jupyter-notebook like approach, in which commands and history are kept in previous boxes and show outputs in limited boxes and we stop limiting ourselves to pretending we’re still using teletypes but maintain the power pipes bring to unix. Also, all boxes are given filenames in a virtual fs that makes it easy to reference them or their output and treat them like a file, erasing the need to rerun a command to run something on its output because you forgot to save it.


Not just the area south - basically all the area in between the two cities. And yeah, it’s basically like saying “once you’re out of the cities, you might as well be in Kentucky.”
I invite you to meet the awesome jumping spider, whose eyes are very especially needed set up to be forward-facing for depth perception for their jumps, and who hunt other spiders, as well as the wolf spider, who are also a hunting (as opposed to web) spider.
In fact, you can use the chart of spider eye layouts to pretty much identify whether you’re looking at a spider who builds webs and waits or a spider who hunts:
Anyone with two big forward-facing eyes is probably looking around for their next meal; the rest are building a web, trapdoor, or taking some other approach.