

Na, Fedora is downstream


Na, Fedora is downstream


Na, Fedora is downstream


No shock there Fedora is downstream from Red Hat which is owned by IBM.
You might want to think about who you are supporting by using brave.
They are all going to end in a undisclosed amount paid with no admissions of wrongdoing.


Remember how Telegram said they would stop providing Chinese authorities with user data during the Hong Kong protests. Implying that they were doing it at some stage.
Also remember how the FBI have said in several leaked documents they hate signal because the only data they get is when the user signed up and the last time they were online, nothing else.
Which app would you rather use?
Marketing needs to spend the IT budget on something. 😔
https://en.wikipedia.org/wiki/Bluetooth_Low_Energy_beacon
National chains will have those scattered all over the shop so they can track where you walk and where you stop. Then they can provide custom specials for you.
I still say they are rare because they don’t actually happen that often. Compared to a server or desktop CVE.
Bluetooth hacking is quite rare. But is possible if the person knows the hardware to hack and then knows the os to hack. 90% of people don’t have to worry about it and the 10% that do have training on how to manage the risk.
For a MP3 player I wouldn’t worry about that. The only thing I would worry about is Bluetooth beckons when shopping. Large retailers use it to track your path through a shop.


Oof



And we all know that is tech companies follow eu laws.


Ddg is a proxy for Bing which is owned by Microsoft. Let that sink in.


That is built for purposes vs trying to hide something.


Wouldn’t recoding or using other compression methods break that?
To show the expected completion time of the print.
Bang on. Something is trying to update its clock.
OP, I suggest you ok that traffic, but if you want to lock it down allow *.pool.ntp.org and *.(Your country prefix).pool.ntp.org


From something i read a while ago when you enable passwordless entra resets your password to something that stupidly long I don’t actively make them that long even in my password manager.
I’d never heard of bypassing a corporate phishing test using an email filter.
https://github.com/postmodern/phishing-training-sigs
Add a rule in outlook/thunderbird if any of those are in the email header toss it to a folder specially for phishing emails. Doing it org wide makes no sense as you say but if you know enough about emails to read the email header you likely aren’t the target for the phishing training.
I am well aware of evilnginx :D


We are all running password less with passkeys so our Entra passwords are all 128 length randomised that even we don’t know because why should we?
Corporate phishing tests are a joke, you can bypass them by filtering for Phishme or kb4 in the email header.
Ok… They do seem to be fear mongering a bit.
By their own evidence it only collects browser plugins for chromium based browsers. There forward implies it scans your entire PC.
As always stop using chromium based browsers to avoid this.