If an app gets pirated they’re going to have thrown out this check too.
If an app gets pirated they’re going to have thrown out this check too.
According to the dumbfucks making the government application of Belgium (to read official communication) trustworthy means having developer mode disabled.
“You don’t have to add ads to your webpage, but if you don’t nobody will find you using our search engine”
They be making everyone “choose” to add their ads/trackers to their website
Didn’t really think about that one but you’re right damn… (Looked it up, and it depends on the bit depth etc, but it’s around 3.2Gbps for the display settings if I’m correct)… So that explains a lot
Gigabit is capable of like 720p@30Hz which it probably should be able to fall back on, but I understand why they wouldn’t do that haha. 1080p@15Hz is also possible :)
One of those cables that don’t work is rated for like 120W, with gigabit transfer speed… But it refuses to transmit display… Like bruh
It gets even better, each function of the port also needs proper support from the cable. Often cables do not support the full spec of usb to cut costs.
While the symbols in the post are often put on computers, for usb cables this is seldom done (only a few brands do).
Source: had to find a cable that supports both DP and PD to connect a portable external monitor after I lost the original cable. (1/9 cables worked)
At least the cars can be updated (at least until the manufacturer says fuck it). A ton of those ‘smart’ devices have no such capability so when a vulnerability is found it won’t ever be fixed.
They’re probably just going to disable it for manual access and add a regkey that you can add to regain access. (They’ve done the same for other ‘deprecated’ features)
I barely see them pop up, if they do it’s for a fraction of a second before a browser extension nukes them.
Didn’t find anything from me… Then again I’m using a private tracker, which should insulate me from that. (Random people knowing, the ISP probs does know… But I don’t think they care)
Btrfs works with different hard drive sizes, with 1 disk failure with no data loss.
Developers deserve to be paid for their time though…
Sure for many it’s nothing but a hobby and they’re happy to create something for free. But that doesn’t mean every developer needs to do the same.
And yes ads are a privacy nightmare and putting them into your app is bad. So either you only use apps from hobbyists or you pay for access (whether that be a set price for a finished product or a subscription for a service).
It’s always been a thing that the only way to completely be safe after malware is yeeting the old system and getting a new one…
And even then there have been actively exploited issues where the system gets re-infected when reloading the data from a backup. (My memory is a bit rusty on that one, but it was just data being restored, nothing that should install anything)
What’s with all the ads here lately
Wait, that’s illegal
What should be done is that every time a new format comes out all images in existence are re-encoded in that format. Hopefully that will cause artifacts, clearing everything up in terms of image age.
The clicking of correct tiles or entering the right text is merely a small part of the test after all
In practice, there are several types of CAPTCHAs: text-based, image-based, audio-based and behavior-based.
Computer scientist writing an article about captchas doesn’t know that proof-of-work captchas exist… Such a joke.
Of course those don’t do much against automated fake form filling, but against DDoS they’re THE solution.
Proof of work (PoW) captchas make the (computing) cost for the attacker exponentially higher than for the website. Basically the website creates a challenge, which has to be solved by the client/attacker before getting access to content. Best of all the website can set the difficulty of the challenge to anywhere from instant to seconds to solve, so normally the users don’t even notice it (as it runs in the background) but once someone starts DDoS’ing the difficulty goes up.
I’d like to do the same, but atm I use nginx to serve all the web interfaces… And keycloak support is either a plus subscription feature or made to work with hacky Lua scripts.
So for now it’s security through obscurity, I got a wildcard cert and the pages are accessed based on subdomain. So afaik nobody has a clue unless they start iterating common subdomain names. (At some point™️ I’m adding proper auth though)