I assume this only applies ro domestic felines?
I assume this only applies ro domestic felines?
Eh, you don’t need a gun necessarily to help out, see Desmond Doss.
And that’s just 1 botnet out of many.
Imagine non-network wrench situation:
“The FAA has grounded all Boeing 737 Max 9 jets today after a massive decompression event occurred on Alaska Airlines at 16,000 ft. The door plug blew out of the jet at altitude. United Airlines has reported, after inspection, loose bolts the door plug of several of its Boeing 737 Max 9 jets as it continues to inspect every one if its 79 jets in its fleet.”
What’s the ratio of boeing door decompressions to IoT devices being hacked?
Or execs.
Wow, you created this program for creating shaders visually? That’s impressive! You mind sharing the source code?
How would you implement piping in GUI?
Could you show us an example program with a GUI you created for this?
Whoa, that’s not very professional or acceptable :-)
Okay, have fun a work tomorrow! Or don’t, as that seems to be your preference. :-)
Maybe. Maybe it’s a “We can’t afford to alienate expensive engineers over stickers” thing, or a “We care more about the quality of work than sticks on laptops” thing.
Must be a fun place you work at. Do you wear a suit to work and work in cubicles?
Did you work with engineers?
> be me, chinese triad
> no fear
> hanging with fellow triad bros at our safe house
> suddenly, a weird unkempt man stumbles in at 1 am
> goes straight up to our most feared boss
> keeps repeating the word ‘food’ while staring at him without blinking for 5 minutes
> his eyes are as red as blood
> must be some kind of demon
> we give him food to prevent the wrath of the heavens
> he eats it, says something about explosions and stars
> leaves
> we’re all sweating, realizing that if we hadn’t given him food, he would have blown us up before going back to the stars
> everyone in that room fled the country, hoping never to see the demon again
> be me, chinese triad
> one fear
You’re using HTTPS, do you have child porn?
Yes Jeff!
If they’re technically inclined enough to run an installer and log in to google/apple, then they can do it, or you can do it for them.
That said, your case is valid. I just dislike my services dangling out without proper security, unless they’re designed for it, and plex’s auth model rubs me the wrong way.
Why not?
Tailscale.
It’s E2EE from the sender to your Beeper server, where it’s decrypted, then re-encypted as a Matrix message.
Then it’s not E2E encrypted.
One end is your device, the other end is the other device. It’s only E2E encrypted if it is not decrypted until it reaches the other device.
Yeah, you can lead a horse to water, and whatnot.
Thank a christian for this.