The password you have chosen is already in use by a different user (bob@example.com). Please choose a different password.
The password you have chosen is already in use by a different user (bob@example.com). Please choose a different password.
Misleading, this is just some ambulance chasing law firm throwing stuff at the wall. It’s unlikely that anything will come of this.
They can make it so much harder to do that, to the point where almost everyone just gives up.
If you’re upset that your hacked-to-bits, rooted, unlocked and/or unencrypted device is failing checks: I’d say, tough luck. Until we can create provably untampered app-containers, that level of access genuinely breaks TOS on apps and regulations on handling personal data.
Hard disagree. If you own the device, you should be in full control of what’s going on. Sure, attestation can give some extra security, but that decision should be up to the user. Everything else is just excuses for user hostile DRM: platforms levaraging technology to secure their own profit margin against the interests of user.
The person who created git
clearly cannot be trusted to write good kernel code. I’m CC’ing Konstantin to disable his account, whoever he is.
Do you live in the European Union? If so, you should have access to an effective internal complaints system and the ability to appeal to an independent arbitrator.
Remember how the Titan sub used a game controller and everyone called them out? I think I’d still feel safer.
I’m sorry, but I think you’re mistaken. May I ask where you got this information?
As I understand it, the DPF is merely an executive order and not a federal law, so it’s very limited in what it can do. It doesn’t create the ability to enforce fines through US courts because breaking the GDPR is still perfectly legal under US law.
This loophole is still used unfortunately. For example, Clearview AI was fined by various data protection authorities, but their fines cannot be enforced so the company just never paid up.l
Why the password.trim()
? Silently removing parts of the password can lead to dangerous bugs and tells me the developer didn’t peoperly consider how to sanitize input.
I remember once my password for a particular organization had a space at the end. I could log in to all LDAP-connected applications, except for one that would insist my password was wrong. A trim()
or similar was likely the culprit.
No, you got downvoted because you were insulting and incorrect.
The most common physical attacks will be you misplacing your device or some friend/burglar/cop taking it. FDE works great in those scenarios.
RCS is walled off by design, so that users are dependent on Google and their phone carrier. If they wanted an open standard they would have adopted something like XMPP.
Do you have experience with Spanish employment law?
You can’t just compare the file sizes without looking at the quality. Each will have different quality loss depending on the exact encodings used.
Reserved for future use
Key servers can be dishonest, so you need to have another way of verifying that the key you receive is correct.
“Gen Z simply uses technology more than any other generation and is therefore more likely to be scammed via that technology.”
Paywalled.