End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
Excellent point! Yet another reason why Linux isos should always be torrented!
Less that the meme is older than them, probably more so they don’t realize why we torrent Linux iso’s.
I can pull down an ISO in seconds over torrent, whole it takes minutes over https. Also it’s nice to add some of the good stuff to the traffic, if only to pad all the illegal traffic with some legitimate stuff.
deleted by creator
deleted by creator
deleted by creator
Oh wow, that’s pretty awesome (not the debilitating neural damage part), I was always under the impression that by the first symptom it was a death sentence.
I still never want anything to do with it, but at least it isn’t as bleak as I had been lead to believe.
Just have to chime in and say 100% fatal once symptomatic. I really hope someone corrects me but I’m pretty sure there has never been a confirmed case with a recovery; we have a treatment that works, but has to be given relatively soon after exposure.
Edit: lol, was the downvote for me hoping I was wrong, or being wrong?
deleted by creator
deleted by creator
All those examples have the company (the ISP in this case) choosing to hire someone, this would be more similar to:
If someone rents a hotel room, and then gets busted by the police for prostitution, is the hotel liable?
I’ll admit I didn’t open the article, as far as I’m aware the best way to sidestep silly requirements like warrants is to just purchase data intended for advertising. Databrokers really have an amazing wealth of info ready to be tapped into, all you gotta do is pay.
90 days is standard for “you’re code is fucked when someone presses this…”; if the issue is Dave left the keys in the parking lot and someone copied them, two weeks is more than enough time for them to recieve the notice, create a ticket to rotate the keys and a ticket to trigger an investigation (gotta document anytime an org fucks up so it doesn’t happen again, right?). Maybe I’m over simplifying it though, I don’t know how their org operates.
Oh they aren’t shared, he is holding out because he believes he’ll have gaming issues; my wife on the other hand, just doesn’t want to make the switch yet.
I probably could have phrased it better.
Edit: when I had said ‘his last computer’, meant that he just has one left on Windows.
Because she still like the familiarity of Windows. She doesn’t do anything specific to Windows, just doesn’t want to leave it yet.
Been doing that for the past 15 years or so, being able to use group policy is essential with Windows. I’m pretty sure my son really wants to upgrade his last computer (to Linux), but I may have more work to convince the wife.
I always just bought grey market keys (for Pro/Enterprise), in nearly 20 years I never had one fail or quit working randomly.
I don’t disagree they are their games, but is it their emulator, or did they just download one of the many online? Really doesn’t matter, just love to see companies bitch about something, then turn around and do it themselves.
Thank you good sir, now I have coffee on my robe!
Debian is always my first choice, but I’m not playing the newest stuff (Far Cry 5/7D2D/Ark/etc), while it hasn’t been ‘smooth sailing’, I haven’t found anything that just refuses to play.
I’m pretty sure the key is stored on the device, which is backed up to Google. I cannot say for sure if they do or don’t backup your keyring, but I feel better not using it.