“Safe” being defined in a user-hostile manier, i.e. with unmodified Google components and not rooted.
“Google-controlled” would be a better word.
“Safe” being defined in a user-hostile manier, i.e. with unmodified Google components and not rooted.
“Google-controlled” would be a better word.
Such is the fate of hypercentralized spaces. The fediverse fixes this.
I don’t see how this is so difficult. Given the choice between a narcissistic billionaire or an independent, accountable government commission that’s bound by the rule of law, I’ll choose the latter every time.
With this approach you would lose the subvolume structure and deduplication if I’m not mistaken.
Obviously acquiring publicly available data is legal
Under the EU GDPR it is often not legal. Controllers need a legal basis, which only exists if there is an appropriate relationship between the controller and the data subject.
No, you got downvoted because you were insulting and incorrect.
The most common physical attacks will be you misplacing your device or some friend/burglar/cop taking it. FDE works great in those scenarios.
The uMatrix add-on for Firefox seems to do what you want.
Do you have experience with Spanish employment law?
You can’t just compare the file sizes without looking at the quality. Each will have different quality loss depending on the exact encodings used.
Key servers can be dishonest, so you need to have another way of verifying that the key you receive is correct.
This is fake
Yes, it is generally a good idea to put internet-facing servers on a network that is separated from the local network. The point of this is not to minimize their attack surface (since they are already connected to the internet after all) but to prevent them from being used as a stepping stone for attacks on your internal network. To make this effective, you should block traffic from the internet-facing network to the rest of your network and treat it as potentially untrusted.
“Gen Z simply uses technology more than any other generation and is therefore more likely to be scammed via that technology.”
raid is essential anyway
Why? If there are offsite backups that can be restored in an acceptable time frame, what’s still the point of RAID?
It seems like this order is rather limited and the IA can continue almost all of their work.
“A brief search showed that the applicant gave false statements in their VISA application form, in violation of 18 U.S.C. §1546. Lifetime ban applied.”
If you turn the fan up high enough it will blow the heat from outside into the house. Trust me, I’m a scientists.
Why not?
This doesn’t advocate for any substantial improvement of data protections. It’s merely a convenience argument to legitimize banning Chinese cars for economic reasons. American car manufacturers will continue to harvest and sell all your data, just with less competition.
Of course, this isn’t a surprise coming from the CFR, the lobbying organization for US imperialism.