Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Randall did the math on this one: https://what-if.xkcd.com/31/
He assumes 64 GB microsd cards, if you use 1 TB ones, you could send 16 times more.
Easiest and most secure way? Mail (or hand deliver) a flash drive. That’s how they transfer data between super computers and data centers. (AWS even has dedicated trucks to do it)
No one’s gonna talk about how they turned referral links into a piramid scheme?
These services, like most companies will store your data indefinitly, and can be hacked. You cound end up with your name, what ever infromation the service gave you, and contact info on the internet. This is not the end of the world, but something to be aware of.
If it’s local, try using over-the-air TV, if your close to a transmitter, you can get away with a fairly cheap antenna. (Or even just a paperclip.)
It has nothing to do with the ethanol, the uncured resin simply covers the surface and fills small holes, hiding them
I would guess it’s something funny with the 3d model, air bubbles in the tank wouldn’t be consistent between layers. Try inspecting the problematic layers on your slicer.
Almost looks like the slicer might be trying to add FDM style infill, make sure it is not.
It pings out to google constantly regardless of where you are. You should be able remove it with adb, or use an app like NetGuard to block it from acessing the internet.
Its all just weird physics and RF stuff, all they would find out is that I am a giant nerd. Some examples: common base colpitts oscillator, inductance calculator, temerature PIN detector FWHM.
I don’t think so, unless the pirate left a calling card. If you want to make sure, just make the same sheet in pirated and non pirated versions, and compare the file. (They are zip archives, so that will let you see the raw XML)
I don’t think the roof would be good at reflecting signals back at the device, it scatters them all throughout the building, rasing the noise floor. In a way, phone hotspots can cause less interference then a proper access point because they use a lower transmit power, and allow the other devices to reduce power.
I would think the metal parts of roof might be reflecting signals all around the building, which would cause interference between devices. (there is a limited number of WiFi channels), it might work better with a plastic roof, or one with RF absorbers.
Most malware is writen for Windows, but Linux malware exists, and has been found in the wild. The most common infection method, like with windows is running a trojan, theoretically things like browser exploits could also be used, but these are unlikely unless you are a high profile target like a head of state or CEO.
I would personaly be much more worried about someone evesdropping through my microphone. All they would get from my camera is my face and some glances of the room my computer is in, but my microphone would reveal all sorts of private conversations.
Security from what? Get a threat model.
A NAT will restrict connections from the internet, but won’t stop attacks from your local network. As your network grows, it might be a good idea to isolate shitty IOT devices (firmware is often full of holes), home internet and sensitive devices like cameras.
Federation should hapen automaticly when a user subscribes to content on another instance.
Does vodka count? /s Sauerkraut is everywhere.
The simple fact that lemmy federates posts will mitigate the problems posed by this. For example if they want your IP, they need to go to lemmy.today, but for mine they will need to go to tchncs.de. If we were using reddit, they would be able to get everyone’s address with just one request. The more small instances there are, the harder it becomes.
This would be real nice if this let you easly run commands as SYSTEM or TrustedInstaller from a script, not just as Admin. Not only can Admin be reached from the “Run as Admininstrator” menu option, is actualy quite limited for messing around with system files. For the most part, Admin lets you mess with system settings/registry, and user files, but not with a lot if system/application files without TAKEOWNing everything.
Yeah, I’m much more worried about someone in my country spying on me then China, like what are they gonna do from the other side of the world?