I can excuse attempting to compromise millions of computer systems worldwide for nefarious purposes but I draw the line at violating the contributor guidelines of an opensource project.
I can excuse attempting to compromise millions of computer systems worldwide for nefarious purposes but I draw the line at violating the contributor guidelines of an opensource project.
The top cat uses ports to sort messages based on application.
Think pigeon holes, applications usually use protocols which are assigned a number by convention. The application gets it’s message out of it’s assigned ports instead of having to sort through all the messages.
Great crime behind every great fortune, only question is whether they did the crime themselves or their parents did.
he’s fired
best guess is the vpn endpoint is blacklisted by google.com with the requests being ignored instead of serving you with a 403 as some sites might. The other geographic google tlds I assume are operating separate blacklists.
here I am feeling guilty sometimes making a comment halfway through a 200 comment thread before scrolling on to find someone else already made the same joke while this mf making smug comments when they’ve not even read half the headline.
Voter registration is public information and sufficient for cold callers.
If you live independently you will inevitably have to make privacy sacrifices for the sake of expediency. Having a bank account is probably going to be one of them. There are many essential services that you use but probably do not think of as an eighteen year old that may share information when you provide for yourself such as your phone carrier, ISP, utilities such as power, water, gas etc, insurance, health services, education or certification providers, employment or recruitment agencies, the list just goes on and you will have to thoroughly evaluate every company you interact with and in many cases there will simply be no realistic privacy respecting option.
Keep fighting to protect your privacy but don’t put an impossible burden on yourself to be perfect. You will make mistakes, you will make compromises, you will probably get spam. Welcome to late stage capitalism.
Android is built on linux yet it is increasingly locked down and many phones are extremely difficult to get root access on.
So Valve could have followed the phone ecosystem path and pushed as much of the feature set as proprietary code as possible (binary blob drivers, proton proprietary instead of bsd), replaced pacman with a valve controlled package manager & repos, setup selinux to give users no power to do anything and made the deck only able to secure boot steamOS signed by Valve. Technical users may be able to jail break such a device but the majority would not be inclined to.
Valve’s wisdom here is in realizing that the majority are going to buy their games anyway but if you don’t lock the device down then most of the technical users will also buy most of their games whereas if you have to go out of your way to jail break a device to install something fun then that device basically becomes a piracy only device from that point on.
Linus Torvalds. He’s making a list.
You only need the app to do ear shape analysis
Does this require the app for operation or can you temporarily install the app for config and then use the feature without the app?
Not all unencrypted apps are equivalent. Not wanting to use something owned by meta under any circumstances is completely reasonable.
From there, rice, in the 90s-00s, referred to the Race Inspired Cosmetic Enhancement: typically bolted onto Honda and Toyota, it moved from that to any cosmetic car customization 10s.
[Citation Needed]
Any acronym other than the name of an organization can be presumed a retronym until proven otherwise
It’s just what cars look like when they are designed for functionality rather than as a statement about the owner’s masculinity.
There are two doors, one is labelled “Leopards that will eat your face” the other “Cat cafe” both lead into the same leopard cage.
This is true and people should always be mindful of this. Additionally you should consider not just the ownership of the companies but also the infrastructure they rely on such as their rented servers, payment processors, on-site staff etc. However commercial VPNs remain a convenient compromise for many use cases. These services are probably fine for your shitposing needs but should not be relied upon for activism for instance.
Notice that despite the presence of many people who grew up with and use the metric system none are complaining about how hard it was to intuit metric units?
If you stop telling people what they should find intuitive for a moment and actually listen to people telling you about their experiences then you might find that this is not an issue.
It’s on there but mislabeled as one of the others.
how did the power user payola compare to xi bucks?
“if” gcc had a Ken Thompson hack how do you secure checks notes anything