End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
Excellent point! Yet another reason why Linux isos should always be torrented!
Less that the meme is older than them, probably more so they don’t realize why we torrent Linux iso’s.
I can pull down an ISO in seconds over torrent, whole it takes minutes over https. Also it’s nice to add some of the good stuff to the traffic, if only to pad all the illegal traffic with some legitimate stuff.
Someone tried to send me a picture they took and it looked like hot garbage until they sent it over email. Not because it couldn’t be sent without feeding it through a potato first, because Apple wants a worse experience for anyone not in their ecosystem.
When they are the oddball in the group though, it just makes iPhone’s look like a worse option.
deleted by creator
deleted by creator
deleted by creator
deleted by creator
All those examples have the company (the ISP in this case) choosing to hire someone, this would be more similar to:
If someone rents a hotel room, and then gets busted by the police for prostitution, is the hotel liable?
I’ll admit I didn’t open the article, as far as I’m aware the best way to sidestep silly requirements like warrants is to just purchase data intended for advertising. Databrokers really have an amazing wealth of info ready to be tapped into, all you gotta do is pay.
90 days is standard for “you’re code is fucked when someone presses this…”; if the issue is Dave left the keys in the parking lot and someone copied them, two weeks is more than enough time for them to recieve the notice, create a ticket to rotate the keys and a ticket to trigger an investigation (gotta document anytime an org fucks up so it doesn’t happen again, right?). Maybe I’m over simplifying it though, I don’t know how their org operates.
Oh they aren’t shared, he is holding out because he believes he’ll have gaming issues; my wife on the other hand, just doesn’t want to make the switch yet.
I probably could have phrased it better.
Edit: when I had said ‘his last computer’, meant that he just has one left on Windows.
Because she still like the familiarity of Windows. She doesn’t do anything specific to Windows, just doesn’t want to leave it yet.
Been doing that for the past 15 years or so, being able to use group policy is essential with Windows. I’m pretty sure my son really wants to upgrade his last computer (to Linux), but I may have more work to convince the wife.
I always just bought grey market keys (for Pro/Enterprise), in nearly 20 years I never had one fail or quit working randomly.
I don’t disagree they are their games, but is it their emulator, or did they just download one of the many online? Really doesn’t matter, just love to see companies bitch about something, then turn around and do it themselves.
Thank you good sir, now I have coffee on my robe!
Debian is always my first choice, but I’m not playing the newest stuff (Far Cry 5/7D2D/Ark/etc), while it hasn’t been ‘smooth sailing’, I haven’t found anything that just refuses to play.
Track-me-not, automobile edition.
It was originally a joke I found online, after reading through the list it honestly just feels like I want a simpler life one day. The site isn’t mine but it came up when I searched for a couple items from the list (like “Goats security is checking the fence, not sitting in a room listening to someone for hours.”)
I’m pretty sure the key is stored on the device, which is backed up to Google. I cannot say for sure if they do or don’t backup your keyring, but I feel better not using it.