Shocker that Trump is a convicted fucking rapist
I’ve been living under a rock - are you referring to Trump’s civil case against E. Jean Carroll or is there a criminal case out there that’s just not showing up on the first page of search results?
Shocker that Trump is a convicted fucking rapist
I’ve been living under a rock - are you referring to Trump’s civil case against E. Jean Carroll or is there a criminal case out there that’s just not showing up on the first page of search results?
Sauce? I tried searching and couldn’t find anything (at least not on the first page of results). Thanks.
Unlikely.
The in-house scanning service at the Internet Archive (IA) differs from the licensing agreements entered into by other libraries. These agreements see libraries license ‘official’ e-book versions from publishers, who charge for every book that’s lent out to patrons.
Short answer: Mobile hot spot (w/ your own cellular device) is preferable to public wifi from a security perspective.
There are other considerations, such as how much cellular data downloads cost to you, what sites you’re visiting, what you’re actually doing, etc. In general, it’s advisable to avoid public wifi if you can, but if you must connect to public wifi, then you should make darn sure you connect to the right network (watch out for imposter networks w/ a legitimate looking name) and use VPN (ideally a paid service) to encrypt your traffic. Even with both of these measures, you’re best off avoiding sensitive activities like online banking on public wifi. If you must do banking or other sensitive stuff, either do it on your phone or wait until you get home.
Hope this helps.
Editing to add: When I initially responded, I’d forgotten which community I was in. In this context, I believe the other responses are better than mine, but I’ll keep mine up in case it helps other readers.
Aren’t we still vulnerable through VMs, though? I seem to remember reading something about why Qubes OS is safer than a regular VM, having to do w/ zero trust, etc.
Sure, but what’s the claim? I don’t understand playlists for FAST services, nor why an evil corporation would care enough to file a DMCA suit, no matter how frivolous. Is it because these playlists somehow magically block the ads? Do they give non-paying customers access to something normally behind a paywall? Like what am I missing here? Something is not adding up.
I don’t use any FAST services. I know what a playlist is in like Winamp and stuff, but why/how could a playlist be considered a DMCA violation for these FAST services? I read the article, but I’m still confused.
I dunno at what school this photo was taken, but in my day, it was not uncommon for students in dorms to have mini whiteboards on their doors so people could leave messages (often in the form of specific private body parts). Mind you, I went to school before everybody had iPhones.
What I believe we’re looking at here is a photo of somebody’s (presumably Joseph Silva’s) door with a mini whiteboard and someone’s (again presumably Joseph Silva’s) contact info, which happens to be a Lemmy user.
The key word here is Lemmy, which would explain why OP shared this photo on !fediverse@lemmy.world.
Why do people use crypto for what?
+1 for PrivateBin, which has a public instance at https://privatebin.io/.
deleted by creator
On chromecast I’ve been happy with SmartTube, which includes sponsor block and still allows me to log into YT so I get to keep my history.
In Firefox I’ve just discovered an extension called Lib Redirect, which works for YT, Reddit, Twitter, and other sites. Highly recommend.
I use a locally run open source LLM.
How? GPT4All + Llama or something else? I just started dipping my toe in locally run open source LLM.
not fine tuning a LLM to match tone and style counts as either misuse or hobbyist use
You’ve hit the nail on the head with this one. I think the other commenters are right, that a lot of people will misuse the tool, but nonetheless it is an issue with the users, not the tool itself.
I wonder how much of it is Disney thinks this might actually work versus the ole delay, delay, delay tactic. Probably a little bit of both.
Leaked how? No good practice allows any way for a password to “leak”.
Suppose a social media website has a data breach.
What rotating passwords does is ensure people who don’t use a password manager either write their password down more and more frequently, or use a weaker password with some simple changing pattern that doesn’t add anything.
Okay, but suppose I use a password manager like Keepass, then does rotating my passwords not make me any safer in the event a social media website’s data is breached and ends up being sold off on the dark web?
What’s the logic behind this statement? I would’ve thought that if a website’s logins and passwords were somehow leaked, the more often I change my password, the less likely it is for the leaked password to still be usable by bad guys based on the shorter time horizon.
I started out with Memmy and was kinda meh about it. Not bad but not great. Then I found Voyager and never looked back. As a paid Apollo refugee, Voyager makes me almost forget that I’m on a different platform from the days of yore.
Separate but related topic: What controller(s) do you use?
I haven’t dug around too much, but by searching “elite dangerous edmc linux” I found a thread about a year old about a flatpak version of EDMC.
EDIT: Just re-read your post and realized you’re mostly asking about Voice Attack. I’m not sure about that one. Sorry I couldn’t be more helpful. Good luck, Commander! o7
That WaPo article was one of the top search results - thanks for clarifying. I unplugged from the news after the last election, so now I’m playing catch-up.