To be fair it’s “made simple” not “made easy”
To be fair it’s “made simple” not “made easy”
I haven’t used archivebox, but I tried setting it up. And I will say linkwarden gets a lot of points for easy setup and use. I’m sure it’s probably not as powerful as archive box but it gets the job done for basic use.
Might be 80% of the population of the US.
How is this the real world experience?
Checkout goaccess. No additional tracking needed, it just reads your server logs. https://goaccess.io/
What do people use pastebin for anyway? I’ve never felt the need to use it or something like it.
It makes a nice event page where you invite everyone by phone number. It then texts everyone with the details and asks for RSVPs. It then automatically follows up with everyone to get RSVPs and sends out automatic reminders to all the guests a week before and a day before etc.
Any way to opt out?
Oftentimes now if the service is paid, you’re still the product!
If you must expose to the net (which you may do with the games servers) then again, the config guide has you covered, use crowdsec, use https, use random ports, use strong passwords and mfa.
When you say the config guide has you covered. Where is this config guide?
I feel like this video is preaching to the choir. No one who is not already concerned about their digital privacy will care about this video, and if they watch it I doubt it would change their minds.
I’m pretty sure that if you had not already been signed in, you would not have been able to use it. As the login page requires an internet connection.
What do you use for scanning for paperless?
There is a remote vector as well beyond just physical access.
There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.
Advocating for using some of the biggest privacy violators to log in to all your accounts! Business relationship or not this is not good advice for your privacy.
Unfortunately it’s the same situation on steam. You are only buying licenses to games you don’t actually own it, they can be taken away at any time with no recourse. Steam might be doing good now in this regard but it’s hard to say if it will stay like this forever.
The blur seems pretty good to me, doesn’t seem like you could do any reverse processing to identify the face post blur.
TL:DR what does this mean?