Us instance admins appreciate it I promise
Administrator of thelemmy.club
Nerd, truck driver, and kinda creeped that you’re reading this.
Us instance admins appreciate it I promise
Pick whatever looks best. It’s not a big of a deal as we make it out to be.
Fedora KDE is also an awesome choice though if you must choose something else.
It’s THE problem
I’m more of a control-R kinda guy
Shit I was tired, but I meant 42, counting the top right and left black areas too.
No it’s because they’re demeaned using it.
I count 33 42 triangles, counting black space and outlines made of other triangles.
Cox got caught buying that data, and when confronted about it, Google, Amazon, and Meta all failed to deny that they also buy that data from those malicious app makers
But what is that based on? This paragraph?
A spokesperson for CMG told Newsweek that “CMG businesses have never listened to any conversations nor had access to anything beyond third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.”
I don’t think that explicitly means they had datasets made up of clandestinely recorded conversations in the wild.
third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.
Really could describe ANY possible set of tracking data… Unless you put this quote into a clickbaitey article and strongly imply it’s something sinister.
Someone back this up with proof. Security researchers would’ve noticed this. They’d’ve had to have hacked their way around the microphone permission systems and microphone use indicator (depending on OS) on your phone and upload that data without being caught by security analysts. That kind of bug would probably be worth a fairly decent bounty too.
The article talks about a slide in a PITCH to advertisers. But not a concrete system. Then it goes on to say advertisers bought a dataset from other sources. What dataset? From where? It doesn’t say. Transcriptions from voice assistants? Maybe. But without hard evidence I don’t believe random apps are just recording clandestinely in the background. But people want to believe this so writing shitty unsourced articles with click bait titles and tenuous-if-I’m-generous linking of weak facts lacking entirely in context generates lots of clicks.
See email is one of the few things I don’t host. I host a webmail frontend, and use my domain. But PurelyMail is an amazing service that’s so cheap it’s basically free at personal scale with very few limits. I didn’t really care to try and deal with having all my mail sent to spam.
Selling? I host things for myself, not others. Except my Lemmy instance I suppose, that’s public.
Start selfhosting. I use my domain for tons of stuff
The end of the console gaming era?
Yeah I’ve had email verification on since the first bot signup wave like a year ago and we have a few on the list here.
Sigh…
I’ll look into it. Thanks for pointing them out.
It is itself an overflow hole, of sorts.
If you don’t, you’ll pay a lot more to get it back if you ever want to
I mean I find it hard to believe but this level of argumentativeness is silly and toxic. Why would they lie? Maybe they have some edge case or misconfiguration. Maybe they got unlucky and ran into some kind of breaking bug on their specific system. Shit happens.
Interesting. I use an immutable distro (Fedora Kinoite) so basically everything I use outside of the apps bundled with the OS are flatpaks. Other than learning a few things about FlatPak permissions, file locations, etc, it’s been completely painless.
You using the coupon means that they successfully enticed you to return. And most people will buy things on top of whatever the coupon is good for so they still turn a profit