That’s why you can’t just use the version as a string. You need to use the API which correctly uses string length as a tie breaker.
I was wondering if it might be some hack to use the media mail USPS rates, but looking at them it doesn’t seem like it would work.
I’m surprised and happy that SUSE is still doing well. I have fond memories of using SUSE in the enterprise especially around their “perfect guest” campaign for using it in virtualized environments. I thought they had very well-baked integration with large Windows networks—things just worked out of the box that didn’t with RHEL. I’m sure a lot has changed in the last decade but I appreciated their cooperative stance in the enterprise.
I interpreted the instructions to mean put “Not Employed” in the box, but they were ambiguous at best.
I would feel that it would be a reasonable if it was my local paper running the story. Arstechnica IS a primarily technical news site—I believe they should have a higher bar—otherwise they are just parroting a report and not providing useful (to me) news.
I generally think arstechnica.com does a decent job of being a non-garbage news site. I pay a couple bucks a month for the ad-free RSS feed. This story feels terrible to me. I don’t doubt a law suit has been filed, but I would expect some investigation by the reporter of the extra-ordinary claims of privilege escape the application is claimed to be capable of.
GoodRX is my favorite shitty bandaid for this feature of a capitalist health care plan.
Do you use straw for mulch on top, or is it a straw bale setup?
People with low scores are always saying I’ve got low standards… /s
I get 17.45 on an iPad Pro. This is with all extensions disabled and my adblocker off. They say I am unique in the past 45 days. Looking through the info I don’t see how this works. Could it be that no one else has tested with an iPad Pro? It’s not like the hardware in this model is different from a similar one. You really just cannot meddle with it. It’s a fairly locked down ecosystem.
If I took an iPad, reset it and ran the test. Then reset it and ran the test again, would both be unique?
Explain please. I use a work sharp electric sharpener which has basically sandpaper bands. I guess I have one of those metal rods with grooves but i don’t use it.
I’ve moved to WinPE for its immutability.
Depending on the site, you can use one device to login to another without installing additional software. For instance, if you have an iPhone with a passkey for microsoft.com stored on it, you can login to Microsoft.com using the iPhone.
Here is a webpage that has some screenshots to show you what I mean. You can probably google some other examples.
It is possible to sync passkeys across devices but at this point is mainly within a single ecosystem.
I don’t think a big business should have an advantage over a small business that cannot afford that technology while using public airwaves. A better solution imo would be to prioritize all very low-bandwidth traffic.
109 devices per capita? I just walked through the house looking at what my partner and I have that plugs in. We don’t have 109 together. And it isn’t like I we don’t have stuff. Mesh wifi routers, camping gear. Heck we even have a refrigerator. What do people collect?
Especially the babies. They know what they did.
I agree that decrypt/encrypt is bad—it is simply not E2EE. The solution would have to be a better method of public key distribution for ‘federated’ systems.
While I don’t know anything specific about facebook messenger, E2EE doesn’t necessarily preclude what you suggest. A messaging service could store the entire chat history encrypted without decryption keys. When you get a new client you could restore the entire history in encrypted form onto your device. You would then use a recovery key you would possess to decrypt the message history on your end. At no time would the messaging service have the keys to decrypt. I’m not saying that is what facebook does.
Why do you need to control both ends for E2EE? Both ends need a public and private key to encrypt and decrypt messages. You need a method of key exchange. I would prefer to have an offline method (phone call, in-person) of validating a key (like iMessage and Signal have). But I don’t see a reason to need to control both ends.
If you enable advanced data protection apple cannot recover your account. You need your recovery keys or a designated recovery contact.
The apple doc implies (to me) that a SIM swap only works after you authenticate on an apple device (e.g. using your password) even without advanced data protection. I have never tested that.
You can use the long process (many days) to recover an account assuming you haven’t enabled advanced data protection. I’m okay with that as it is perfect for my grandparents (I had an older relative who got their account back through this method).
I get that you could SIM swap to recover other accounts (not Apple) if they have SMS as a recovery method. That sucks and it really sucks for people who don’t get that an email or SMS recovery can be a giant hole in security.
The amount of bread we wasted before moving our bread to the freezer was crazy. Most of our bread gets toasted anyway, but the microwave handles the rest.