Very articulate. Appreciate the post.
Very articulate. Appreciate the post.
I have a feeling it did because I remember watching early rtsp multicast streams of the anime initial D found through winamp in like 1999 at 240p. It’s so long ago that I’m not even sure that’s a correct memory.
After installing mint, and you find a problem, just live boot mint again.
You can do a lot in live boot including mount your permanent copy even the kernel. Whatever is missing you can download put onto the installed hdd or usb storage, and then install.
Ask me how I know. Lol.
100% it’s crazy. I mined 1 btc in 2008(?) on a 9800gx2 over a bit longer than winter in Australia, and I’ve left it in a wallet and watching it flap up and down in value. This announcement was basically “crypto is up so we have enough again”. I mean selling what they must have will crash the market again surely. Or the repayment is over 36 months as they slow sell, but then they risk the value again going down.
Don’t do crypto kids, it’s a game for traders with an appeal to people who want to self host, self sufficient, disconnected from big banks, and all that, but it was corrupted by financially motivated assholes. Therefore it became an investment/wealth vehicle and received the attention of the most morally bankrupt, manipulative people.
Trust is what any currency that has no intrinsic valueis built on. Crypto can’t have that when the fraction of good to bad actors is skewed so heavily.
Yeah since I learned on Windows servers for 20 years, I’m struggling on permissions and groups in Linux in general.
In Windows it’s as easy as enabling ‘children inherit parent’ and then the users can go and create whatever and if they can write, they’ll write it with inherited from the parent permissions. If you change a folder deeper, you can unlink inheritance from the parent and then it could also optionally be the new parent for all children permissions.
I tried a couple of times to do this in Linux and I’ve always struggled due to my own lack of knowledge and understanding. I feel reading it I keep coming to the wrong conclusion too perhaps based on my experience and bias in reading it.
Anyway I know it’s not helpful but I feel the struggle.
Thieves and murderers the lot of em. Just like my great great granddad before he was shipped here.
Think of this:
You find a computer from 1990. You take a picture (image) of the 1KB memory chip which is on a RAM stick, there are 4 RAM sticks. You are using a DSLR camera. Your image in RAW comes out at 1GB. You project because there’s 8 chips per stick, and 4 sticks it’ll 32GB to image your 4KB of RAM.
You’ve described nothing about the ram. This measurement is meaningless other than telling you how detailed the imaging process is.
They took imaging scans, I just took a picture of a 1MB memory chip and omg my picture is 4GB in RAW. That RAM the chip was on could take dozens of GB!
I don’t know man, I’d prefer light rail than a banananana bus, you know Brisbane style 3 segment bus…
My oat milk gymnastics:
Telegram isn’t encrypting chats (only secret chats).
As far as reproducible builds telegram has got instructions and caveats or excuses around builds for the same issues signal does: https://core.telegram.org/reproducible-builds#reproducible-builds-for-ios
Both easily make Android reproducible builds. This Twitter message is a rock being thrown in a glass house, knowing most people who consume Twitter like it’s a firehose, won’t swallow the nuance of the details.
I don’t even, not to complete lengths.
Reasonably sure they mean telegram. Only secret chats are encrypted. Telegrams chat otherwise is basically transport layer encryption.
https://www.wired.com/story/telegram-encryption-end-to-end-features/
Thanks for sharing!
Australian native bees can’t sting, do a great job of pollinating, and make a little honey on the side. They’re very curious from experience with a swarm making a home on my water meter box, but not very scary.
Oh one different situation: because I’ve been on the side of supplying logs to cyber forensic analysts as part of cyber insurance post breach, the level of scrutiny will matter. If they find you’re doing something they don’t want on work equipment near or around a cyber incident you’ll be part of the post breach recommendations. As in, what to remediate.
AGPS probably does work though for location. Many work laptops have sim cards for 5g, and that means connectivity permanence and assisted gps from cell tower triangulation.
However I know from testing things like m365 login just accepts the ip location of vpn endpoint.
My advice is it depends: and it mostly depends on the effort of the sysadmin and the level of logs they look into. The timing of the log from your vpn connection and your location. If they own the networks you did connect to, those networks will know where you are.
Use your personal device for personal things. End of story.
Oh I think I’ve met you! You must be my coworker!
Just joking of course, looking fun of a privacy focused person while making a point my coworkers also don’t read. I’m glad you didn’t delete the post though, I enjoyed the journey. You did read, you’re better than my coworkers.
I’m not sure what to read into tho whole article, it reads like an onion article from a normal place.
Maybe it’s me taking the crazy pills today.
No… It’s malware. It’s not a virus, it’s malicious. It’s malware.