Not my idea of a good date, but to each their own
Not my idea of a good date, but to each their own
“I dropped my fair share of hard Rs back then”
RCS is walled off by design, so that users are dependent on Google and their phone carrier. If they wanted an open standard they would have adopted something like XMPP.
Reserved for future use
A lot of people seem to have forgotten this, but the American constitution was actually written by god and passed down by Moses over 2000 years ago.
Unit tests or integration tests?
GDPR enforcement is left to the member states. The EDPB isn’t an agency, its more like all the national data protection authorities in a trench coat.
Some national authorities allow it, most don’t. The final word will be from the CJEU or the EDPB.
Applying AI-voodoo to a non-existing problem with unknown side effects? Sign me up!
It’s not. Image hosting sites have existed for decades. Websites are not liable unless they have actual knowledge of illegal content and ignore takedown requests. Stop fearmongering.
I don’t want to get into the mess of the government defining what is or isn’t against the law
What does that even mean
While it’s stupid that ISPs are using their monopolies to screw consumers, the concept of data caps is not as stupid as you might think.
You’re not just paying for the connection between you and the ISP, but also all the other data links that get your internet traffic to its destination. For example, those cables across the ocean are owned third parties and they charge money for every byte that goes through. It wouldn’t be unreasonable for ISPs to pass that cost to users.
Furthermore, most links are overprovisioned in order to keep costs down. For example, if you assume that users only use 10% of their bandwidth on average, that means you can fit 10x as many people on a connection (or maybe 8x to account for peaks). This does mean that users should be discouraged from using their full bandwidth for long durations, otherwise the network operators can’t overprovision as much and have to invest more in infrastructure.
The real question is do you encrypt-and-sign or sign-and-encrypt?
It’s slightly different. Your shell will see the /*
and replace it with all the directories under /, e.g. /bin /dev /etc /home
etc. So the actual command that runs is rm -rf /bin /dev /etc /home
etc.
Put the source code in the bag and nobody gets hurt.
I salute comrade spez for his continued effort to stimulate Reddit alternatives.
Aha Mensch, ja
The EU doesn’t enforce the GDPR, it’s the member states (or more specifically, the member state where the controller has their main establishment). However, individuals can also sue controllers directly.
The biggest privacy problems are Google location services, G play services and G analytics in other apps. This approach doesn’t fix that.
Why the
password.trim()
? Silently removing parts of the password can lead to dangerous bugs and tells me the developer didn’t peoperly consider how to sanitize input.I remember once my password for a particular organization had a space at the end. I could log in to all LDAP-connected applications, except for one that would insist my password was wrong. A
trim()
or similar was likely the culprit.