![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/2QNz7bkA1V.png)
AI could also research past time and temperature data to add this information to historic photographs that already have time and GPS location embedded.
Not quite sure why you would use ai for it?! When you have the coordinates and the time.
AI could also research past time and temperature data to add this information to historic photographs that already have time and GPS location embedded.
Not quite sure why you would use ai for it?! When you have the coordinates and the time.
Sure there is, most messages are probably too short but in general yes. There is no difference to an online article.
I write a book that gets published. I still hold copyright over it even if it is in someone else’s bookshelf. What rights the copyright holder and the person has is regulated by law. For example a physical book can be resold or lent to someone else, but it is not allowed to copy it and sell the copies.
I can cite text from the boom, that falls under fair use but I cannot use whole chapters in a derived work.
I still hold copyright over my messages online, even when it is public or published, that is basic copyright law in most relevant legislations. If the training of an LLM and later selling access to the LLM with copyright infringed data is fair use is yet to be determined.
You missed the point. It is not about if it is private or not, it is how they use it. You are allowed (on some pages) to read news article. Are you allowed to copy and publish them on your own site? No. You have a Copyright on your posts same as a author has on his books.
If it is legal or not is still to be discussed.
Similar to how data was mined (or even still is) about users without consent. Now there is for example the GDPR.
They would not be able to really. In theory every contributor (or at least the vast majority) would have to agree to that license change.
Yes. But it allows to define a custom storage layout based on user date time filename typ and album.
Absolutely yes. Even if it is not disguised executable.
It could contain an exploit which targets the video player you are opening it with.
No they can’t, that is basically illegal in every jurisdiction. Will not even click on that click bate title.
I self host because i do not trust companies. I will not even consider giving tailscale the keys to my kingdom.
The company Tailscale is a giant target and has a much higher risk in getting compromised than my VPN or even accessible services.
Understand the technology that you use and assess your use case and threat model.
That certificate would not proof anything. Things can be overlooked or hidden enough. More eyes = more better. OS is no guarantee either.
Also, it would be way too expensive, money and time wise. Every new Version would need to be certified.
There are even reported cases where Microsoft support used that tool to activate Windows Licenses when there are problems with the License of a customer.
You can not find that Option via the default Settings menu, you have to search for it or use the outdated control panel.
Also Windows Home edition does not have this option.
Edit: you can find it actually under Windows security.
Still, it never pops up during installation.
Yep but at this point it is obvious to the user that this is not the way it is supposed to be. When you want to shoot yourself in the foot…
You didn’t store the key anywhere but on that disk.
Windows does not let you store the recovery key on an encrypted drive.
The rest only means, we need to deal better with our data. All the above basically also applies when you HDD or SSD dies, which can happen any time.
Backups is what you need, not an unencrypted drive.
Took them long enough. Most Linux distros have a simple toggle for Disk encryption for years. And as far as i am aware Apple has it too. And basically every mobile OS is encrypted by default as well. iOS and Android
Why not file a bug report when it does not find all your photos?
Also may file a feature request to delete photos after set period from your device via immich?
Its like the key in the Chip. But yes fundamentally it is like that. Now the Key needs to be stored somewhere safe like in your Phones secure enclave or in the case of your credit card a so called smart card (or sim card etc.)
The user does not need to understand it. A user does not understand https or hashing and salting. Still, every one of these is important these days for online security.
I am not a huge fan of passkeys themself, especially when the secrets are held by big tech, but they promise better security and protection against command n attacks like phishing.
I am not aware of a phone that has an outdoor temperature sensor. And weather forecasts are not exact enough for this kind of application (fast altitude change)