pending anonymous user
So the project is just source available?
I expect "modular" as in how Fairphone approaches it.
It is NOT. It is just a smart case with pogo pins that can communicate with the phone.
EDIT: I think using "smart" is too much credit to them.
Sorry mate and all waiting for a show and some solid proofs. That happened in the second half of 2010s, and I do mailbox cleanup every year. I tried dig through what left but I think that violation notice is gone forever. Back then I was just a noob and though that's normal for such big name provider, so I consider bad luck, and switch.
Not rapidseedbox. I used them before and one time it removed my download saying DMCA violation. I unsub and change to fully self host my own seedbox on a dedicated machine with one provider.
Surprising to see after the CrowdStrike debacle.
How to dispose that pulp then?
Can you manually uncheck all then save it?
They can still ask you to trun on and have it unlocked. Refuse and you being an international traveller? They probably will deny your entry.
Oh for sure. They will appeal, apply for "stay of execution" to suspend the judgement claiming this will degrade its operation capability and contray to public interest, and drag this into a legal battle until they win.
I'm not going to tell you what to use instead, but how you make the judgement for yourself: audit the code yourself
The source code is linked right there, and you don't need trusting someone to make the call. You're making the call. Mind you, the actual add-on installed from Mozilla Add-Ons might contains different code then what shown in the repo. I never release any add-ons so that is just a wild guess and a hint possibility this could happen.
To give you an head start: look for URLs and any encoded strings in all files, be it Base64 or something else. And follow them to find out why there it is there, how is it triggered, etc. Same goes for encoded strings with the added question: what was encoded within.
Still, that is just the basic, and I'm not too into JavaScript but there could be other ways of hiding information, like in an image file via steganography.
Domino takes crypto now?
No, OP absolutely still need staggered rollout. Immutable distros are a blue-green deployment self-contained. Yet, all the instance can upgrade and switch all at once and break all of them. OP still need some rollout strategy externally to prevent the whole service being brought down.
Can we create a situation where brute force is unfeasible while using 6 digits PIN? That would be nice to have security and convenience at the sametime. Using passphrase isn't that feasible for me as my Samsung phone randomly prompts for PIN when I need the most.
Self hosting doesn't limited to hosting in home. It can be a VPS, colocation, or even in your work place if the IT department is happy about it.
To be 100% sure? Host it yourself. There is always a chance the operator violates your privacy, willing or unwillingly.
I never run a mail server but Google already placing my mail sent via my xyz domain hosted on proton to spam folder silently.
I guess running my own will be a lot worst.
P.S. I know that's a bad TLD choice, and I'm planning to migrate, but that will take a lots of time and work to the point I wonders if that worth it as I don't sent many anyways.
You don't pass in Makefile
to make
as it will read that file automatically. Nor you need sudo
with make
as compiling doesn't need any special privileges.
Step:
make
: compile the code to binarysudo make install
: install the binary to your systemOff topic. I saw a few comments about disabling or removing the modem on the car. How about removing where the telementry code resides in? Is that feasible?
Actually, this and the Signal group have zero privacy. They are all open, free-to-join groups. The encryption doesn't matter. All it need is anonymity, which I think SimpleX > Matrix > Signal.