It’ll just cache telemetry locally then send it in when you reconnect to the network
It’ll just cache telemetry locally then send it in when you reconnect to the network
This user keeps posting super low quality content from the same poster on vocal.media, a site that pays writers for clicks.
See my comment on his other post here https://lemm.ee/comment/15926881
This “outlet” is barely a news outlet and keeps getting posted on Lemmy recently…
Edit: over the past 12 days OP has posted 7 articles posted by the same user. I think I see what’s going on here…
Lost me when it used Math.abs after calling math.max a their
That’s a giant leap and massively different.
They’re storing the face pics you send to them, I assume
Forgive my ignorance, but do mobile devices even store biometric data ? I was under the impression that our biometric data would be hashed and salted and our thumb/face would unlock it, akin to how a normal password flow works…?
I can’t seem to find this on fdroid, github, etc. Mind sharing a link?
Not op, but I’d recommend looking in to keycloak.
Well both of those reddit alternative frontends used the api. Piped scrapes the pages and gets the stream url, similar to teddit, which still works.
I’d wager that it’s closer to 99.999%.
Unfortunately cromite uses adblock plus instead of ublock origin.
Bromite was abandoned a long time ago. Highly recommend getting off of it ASAP as there have been critical security patvhes that it hasn’t gotten.
Ungoogled chromium (github) also worth taking a look at.
I use FF + very strict arkenfox 99% of the time, then if a site breaks I fall back to ungoogled chromium
A lottt of restaurants in socal do this, unfortunately. I’ve never seen it this high, though.
Just tried, ubfortnuately, it didn’t work.
Unsure why this is where the line is drawn, but okay.
Has there been any information about how long physical access is needed for these attack methods to extract data?
I’ve got my auto restart set at 8 hours, in graphene’s mastodon thread, they say 10 minutes is best for highest levels of security. The short time frame given in that thread makes me wonder if these exploits give instant access to data.