I think I would swap all usage of “Lemmy” for “Hexbear” in the OP as that instance is not an accurate representation of the whole of Lemmy. Perhaps choosing one of the general Lemmy instances would give a more accurate representation.
Man I got so excited about beeper but it just fails to log in to anything I try to set up. FB, sms, anything at all, it successfully logs me in and then hangs on the spinning wheel of death
When people complain about new music not living up to old, it just means they’ve quit exploring and form their prejudices on the pop genre they hear, which has always been the lowest hanging song on the tree.
I love the Connect app(Play store link). It’s incredibly feature-rich for being so early in the game.
Thanks very much for the clarification to the context, I really appreciate it as someone who had no idea.
“Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,…"
I love that proton kept referring to the user as the “terror suspect” repeatedly so we would know they’re really the good guy here.
I use forwarders on a domain I own that point to my primary acct.
Thanks very much, I believe I understand that part now, like a fingerprint to associate to site components like pulled in js, css, etc. I still don’t understand, though, how they associate that to a particular user of a VPN. Does each request done through a VPN include some sort of identifier for each of us or is AI also doing something to put these requests in a particular user’s bucket?
Anyone have an eli5 explanation of how AITA works? What patterns could be captured and how would that lead to identification or data siphoning?
Could you explain how separate emails would increase security risk? I ask because I’ve used separate emails for absolutely everything and it has only ever helped me with security( if I get a Microsoft security notice to anything other than Microsoft@mydoma.in, I know it’s not legitimate).
I don’t mean in lieu of 2fa, strong pass, etc, I mean in conjunction. I don’t see how it could hurt.
Freetube with sponsorblock enabled foils all of it.
My gym does this. I carry one my old phones in my console with nothing but the gym app on it. I turn it on when I park, it connects to wifi while I’m walking in, I scan the code then turn it off and throw it in my bag.
Youtube has ads?
I do this for part of my reg forms. I split the reg process into two parts. First, supply email only. This element uses an obfuscated id. Once they do that, the link sent to their email leads to the rest of the process, using no obfuscation. This should keep from breaking password managers.
Regarding login bruteforcing. I give them 3 shots then a cooling down period.
This process has resulted in a 0% success rate for bots so far. We will see how it holds as the domain sees more traffic.
Freetube with sponsor block is a godsend.
Still working for me on Freetube.
You keep saying you’re done but yet here you are, still engaging.
I win because I’ve commented last. Yay, me.
I just watch the filler from the side mirror. When I feel the click of the disengagement, I hop out, give a ground pat to the pump and replace the nozzle.
Does randomizing your MAC create any usability issues? Needing to log in repeatedly, getting bumped off network due to looking like a different device, anything else hindering usability?