Upvoted because this article was an interesting read.
Upvoted because this article was an interesting read.
“All I did was misrepresent something harmless, done by a company that’s doing so much more horrible things that I shouldn’t be using their product in the first place, and now people are calling me out on it. Clearly, they are wrong.”
Nope, but it will stop the less determined ones.
With no email verification, you can pretty much create dozens of fake accounts per second - as fast as the API can handle.
A NAS is a home storage server, like Synology that you can use to store images, videos and backups, etc on so you can access them from any computer or device in your home. With a couple of clicks, they can easily run applications like Syncthing or Resilio Sync, which are kinda like Dropbox, except you don’t have to pay Dropbox, you’ll just be storing the files on your own service.
If that’s too much to handle, you can still just store your Keepass file in Dropbox, so that it’s available on all your devices. But in the end you’ll still be storing your personal data on someone else’s harddisk.
So in short, is at easy as using a prefab service? No, you’ll have to invest some time, money, and knowledge yourself. But in the end, your data is not gathered in silo together with countless other users, which makes it a lot less attractive for hackers to try and steal it.
…so far.
For those that don’t mind self-hosting, which can be as easy as just running syncthing or resilio sync on your NAS, I can really recommend keepass.
No censorship / unable to delete content? What happens when somebody decides to post illegal content like CP? I know that’s an easy target, but either it has a way to deal with that, or it’s going to attract a very scary crowd, at least as a subset.
The best moment to act was yesterday. The second best moment is now.
It’s not too late.
deleted by creator
Recently, I used it for book/Author recommendations. At first I also used it for coding, but now I just ask it to explain concepts to me (what’s the difference between… / what are some ways to approach…)
Basically how non-tech people thought search engines worked at the beginning of this century.
I’ll give you one reason where Firefox blows chrome out of the water: multi account containers:
Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs. Cookies are separated by container, allowing you to use the web with multiple accounts
That way you can seamlessly have multiple accounts for a specific site open side by side (for example, your work and your personal mail with the same mail provider). Especially amazing if you’re an IT contractor who works for multiple clients.
I’m not defending anyone.
I didn’t expect I had to spell it out for you, but here’s what I’m saying: Until some kind of international investigation force comes out with clear evidence, anyone who tells you “who did it”, is just projecting who they want to be the perpetrator.
The problem with asking “who’s behind this untraceable* attack?” is that you either truthful but useless answers (we don’t know), or just someone speculating that their “enemy” is responsible. I wouldn’t use the word projection so easily in this context, if I were you.
(* unless you consider interpol and the likes)
You don’t become a developer by wishing. Here’s a tutorial if you want to learn
(edit: Rust, not Go)
deleted by creator
Depending on the jobs, also Google, Microsoft, etc…
Why would these people blocking each other have any influence on whether you stay on or leave twitter?
Is this /c/technology or /c/circlejerk?
deleted by creator
Bought my last few laptops from Tuxedo. Their 13" infinibook can be quite noisy, but I’m having a blast with the Polaris I bought last year.
But the article just keeps asking if I’m a robot
At some point you’ll just have to come to terms with it.
Nah, it’s deliberately formulated so it can be pulled out of context, misrepresented and cause outrage. And it works.