You can get a middle class phone for this money. That’s what I paid for my current phone and it’s just missing the AAA camera.
You can get a middle class phone for this money. That’s what I paid for my current phone and it’s just missing the AAA camera.
10 years seems fine, but only if they start counting the moment they sold their last copy.
If it would be a good tool for privacy, Russia would try to shut it down the same way they did with Signal.
deleted by creator
There’s not much doubt left in me that spez wasn’t at a wild party that resulted in him doing what the videographer wanted.
I’m completely with you here. I found it very restrictive coming from San Andreas.
Yeah, if they’re looking for your data on VPN services, they obviously already know you use it, most likely because of the IP.
deleted by creator
Pi-Thagoras
Also, does it work at 3AM when bakers usually start working?
It’s even worse, PS2 supported dual layer with up to 8.5GB.
Nintendo got ripped apart for Pokemon Scarlet and Violet.
Yes, kind of weird, since chat control is postponed because too many countries opposed it. Is it on the table again?
We’re living in a “either 1 star or 5 stars” world. There’s no in between, and I fully understand that it can be frustrating and put immense pressure onto developers.
I don’t know the company behind this game, but I’m not giving them the 1 star review just because I assume every tiny company is bad as well as all the big companies.
What if there’s a boss that tries to protect his employees and sees the issue in extreme expectations?
Not saying it definitely is that way, but why assume the worst first?
Early access games are marketed as such, and it shouldn’t come with a suprise that it’s an unfinished game. Some do it better, some worse, but an early access title shouldn’t be treated with expectations that reflect a finished product.
I’m not a fan of most early access titles myself though, at least not early in development. I don’t want to help develop it, so I wait for an almost finished product.
Isn’t there attempts to sneak in vulnerabilities with new commits?
That’s what made me wonder. Do they just assume applicants use their real name on social media, and when they don’t find anything online the person seems sus?
Do they ask for a police record like companies here would do sometimes?
I’m not familiar with that term unless you work with critical infrastructure and such, so I assumed they might just want to see some online behaviour from the past years with some proof that applicants have experience as admins.
Did I understand that correct that applicants would have to tell their real name?
Axe - Defiant