“I dropped my fair share of hard Rs back then”
“I dropped my fair share of hard Rs back then”
Such is the fate of hypercentralized spaces. The fediverse fixes this.
I don’t see how this is so difficult. Given the choice between a narcissistic billionaire or an independent, accountable government commission that’s bound by the rule of law, I’ll choose the latter every time.
peace
(Subject to availability in your area)
I don’t have an opinion on the matter being discussed
You know it’s an option to just… keep scrolling right? This isn’t high school, you aren’t obliged to leave a comment.
With this approach you would lose the subvolume structure and deduplication if I’m not mistaken.
Obviously acquiring publicly available data is legal
Under the EU GDPR it is often not legal. Controllers need a legal basis, which only exists if there is an appropriate relationship between the controller and the data subject.
The most common physical attacks will be you misplacing your device or some friend/burglar/cop taking it. FDE works great in those scenarios.
RCS is walled off by design, so that users are dependent on Google and their phone carrier. If they wanted an open standard they would have adopted something like XMPP.
The uMatrix add-on for Firefox seems to do what you want.
Do you have experience with Spanish employment law?
You can’t just compare the file sizes without looking at the quality. Each will have different quality loss depending on the exact encodings used.
Reserved for future use
Key servers can be dishonest, so you need to have another way of verifying that the key you receive is correct.
This is fake
What is “southern Ireland”? Do you mean Ireland?
A lot of people seem to have forgotten this, but the American constitution was actually written by god and passed down by Moses over 2000 years ago.
Yes, it is generally a good idea to put internet-facing servers on a network that is separated from the local network. The point of this is not to minimize their attack surface (since they are already connected to the internet after all) but to prevent them from being used as a stepping stone for attacks on your internal network. To make this effective, you should block traffic from the internet-facing network to the rest of your network and treat it as potentially untrusted.
“Gen Z simply uses technology more than any other generation and is therefore more likely to be scammed via that technology.”
“Safe” being defined in a user-hostile manier, i.e. with unmodified Google components and not rooted.
“Google-controlled” would be a better word.