Lineage OS doesn’t have secure boot which is a huge security issue
Lineage OS doesn’t have secure boot which is a huge security issue
I’m sorry but you are wrong, if there is a CVE it means it works, and “could lead to” means that it literary can lead to that outcome.
All you need it one really bad CVE or a few bad-ish ones to do a lot of damage.
Honestly, brilliant move, even if the commercial sucks this is one of those “no bad publicity” situations since everyone is going to talk about the first AI commercial.
But after watching this ad, it honestly looks pretty good, slight uncanny vibes but if I just took it as “artistic choice” (ironic I know) of actually feels like a really nice ad
Don’t over think it, start small, a home server. Then add stuff, you will see that it’s not that crazy.
I personally have just one home server that locally creates encrypted backups and uploads them to backblaze.
This gives me the privacy I need as everything is on my server that I own while also having the backups on a big reliable company.
It’s not perfect but it fits my threat model
Pockets! So cool! I hope you love it!
That the crust is the healthiest part of the bread
Are you saying that we do?
Mammals often lactate less and less as time passes, for many of them lactation stops even if you continue milking, which is why cows in farms are perpetually impregnated (which is horrific)
It was some weird tablet like UI that I installed on a weak old laptop to use it again.
I have no clue which distro it was but I never came across it again
That makes sense, the MiTM was still going on but you browser was not configures with the company CA
The computer probably has local security tools (such as an edr) that spy on you any way.
You need to assume it is completely compromised.
But… assuming this isn’t in violation of your company computer usage policy (which it very much might be and can put you in trouble) you can install any VPN (avoid spyware shit) and a different browser (ideally something a bit obscure, like librewolf) and this will bypass the MiTM as the the device that does the MiTM would be either:
A) a network device that hijacks the HTTPS requests (VPN bypass this)
B) the browser used by the company
C) some other kind of software that atteches itself to all browsers via admin installed extensions (obscure browser might not be recognised by such software, be sure to check the installed extensions after letting the browser run for an hour)
And once you are done you can check the certificate chain in the browser to confirm.
I hate this so much!
My bank is like that and another horrible thing is that after you choose your password (which can be long and complex) you need to choose a 6 DIGIT restore code incase you forgot your password…
Why is is my BANK so bad at security??
I run the official docker with mariadb and it was never an issue for me
I think that what you can do is still have some sort of beans there (food for the mushroom) but let it overgrow to the point where you have a top part that is clean and you can cut it off.
Check this out https://www.youtube.com/watch?v=uznXI8wrdag
True, but until then
I donate ~30$ a month divided over a few projects but I want to donate more once I can and also to bigger things that would donate for me to many projects and not just the ones that I think of (please give suggestions to such projects or foundations!)
They do, but they will earn enough to save some, times 100 it’s a lot
Of it’s naruto style, I would make a 100 of me, have them all find jobs for a year or two, then collapse them all back and never have to work again aince I now saved for 100+ years.
Eat raw veggies (salads)
In the first week or two you won’t feel like it was a real meal since your body still craves sugars, fats and junk. But once you get past the cravings you find out that this huge meal filled with fiber is super filling but the calorie count is really low, and so you start losing weight
Look, when it comes to security statistics, a lot of it is locked behind closed doors in all kinds of big security companies. I can tell you personally that I have worked in such a company and you could see a lot of exploitation (attempts) on Android devices. It was there.
Look once there’s a CVE and there is a POC for it. Usually there comes a Metasploit module for it and then it’s for sure being used by a bunch of people.