This is funny but not funny. In my 20s this happened to me… I installed herinux but she wasn’t happy and I couldn’t figure out why 🤷
This is funny but not funny. In my 20s this happened to me… I installed herinux but she wasn’t happy and I couldn’t figure out why 🤷
VSCode + Foam + gitea (+ hexcalidraw if you want to draw)
And this is one of the many reasons that these days I create a @duck.com email address for each website.
My password manager (Bitwarden) happily generates for me both the mail and the password… now instead of having to look up for the unique password for each website I need to look for both the unique password and unique email 🤷
Furthermore if they are incompetent enough to make shitty regexp they are for sure incompetent to keep their db safe from hacking/leaking… and I am fine with a duck.com address being locked, less so with my actual email address
FWIW I use foam. It is a visual code extension so you piggyback on all Visual code features and extensions (e.g. git, md lint, etc). And I sync with my self hosted gitea. It doesn’t have a mobile app but I use obsidian with the obsidian git plugin
Thank god it was cancelled… people would have discovered that china uses ai for controlling their citizens (and possibly others). Something that is totally not known to anyone
Because Google is like 90% of the market.
It’s not the bidding part per se the issue, the issue is that the bidding (and possibly other effective strategies) are so successful that Google is almost a monopoly.
The illegal part is that google is a bit too successful AND it uses these not-merits based techniques 🙂
The idea is that if you really want to become almost a monopoly you should not play these games. And being a total monopoly would be illegal in any case
You need to aumatize any operation… It’s not conceivable that an human look at every device for stuff to steal. It would be even more expensive.
Generally all these bit malware do is 1) using a vulnerability to replicate themselves 2) mine crypto or other kind of crap. Sometimes (1) involves also stealing ssh keys but it’s not the goal, it the mean.
Self hosting password/code/photos/whatever niches you are almost guaranteed that no human will look at hit because the amount of IoT/Routers/etc with nothing valuable beyond themselves generally composes the majority of these compromised bots
This is just the economic incentive
Self hosting is less appealing for criminals, though. Especially if the protocol is “vanilla” like ssh.
When you hack LastPass you know what you’ll find, millions of passwords. When you hack a dude ssh you have one chance over one million that there is one dude password wallet.
It doesn’t make financial sense to hack self hosting (unless it’s specific server software)
The real question is… Are these people repeatidly hurting you or they were one offs?
If it’s repeated… Well that is an issue… You don’t have a defense mechanism.
If it’s one off… Well you just are an optimist person 😃
I guess they may have thought you were there only for the “legal speed”.
I would just try another doctor… I would not take it personally… Albeit it sucks you had the experience 😕
From “free speech absolutist” to “free speech extremist” 😃
I would not pause the history, i would populate the history with balanced contents and then (if you feel like your mother will actively look for radicalized content) pause it.
So that the algorithm will have something"balanced" to work on.
Re not acting immediately: per GDPR they can’t keep deleted data on your activity more than a few months (and probably they do before the deadline)
Can’t remember but at the time I wasn’t drinking alcohol… I was a real celebrity at parties 😂😂