Credit Reporting business started before the internet existed, so probably not.
Credit Reporting business started before the internet existed, so probably not.
TrueWork exists, but they have a shitty privacy policy.
It shouldn’t. I’m not sure what I can do to change it.
I’ve got bad news for you about cars being sold over the last 15 years.
For $24 a month I can keep you safe from the worst ones.
For those that are questioning what the point of the lengthy article is because the title doesn’t help much, here’s the explanation:
Imagine it this way: let’s say every time you stepped outside your front door, you decided you want to be safe, so you dressed head-to-toe in full combat gear, complete with bulky full-body kevlar, a helmet, safety glasses, steel-toed boots, and gloves. I can stop the scenario here: even for those of us living in the roughest places, that’s a silly visual because it’s overkill. To be a little detailed, it also goes back to that word I used: “you want to be safe.” Safe from what? The sun? Then just put on some sunscreen and a hat. The cold? Put on a jacket. Danger? Keep your eyes up, headphones out (or low), and be aware of your surroundings.
Yet, many of us do the equivalent of overdressing in our digital lives because, as I said, we don’t always see it right away. Most people can instantly tell when they might be putting on too many items of clothing. Even something as simple as a jacket – when you feel the weight and restriction of movement – makes you pause enough to go “how cold is it really outside?” With the digital world, it can be much harder to notice the added weight, at least for a while. This makes it easier to overdress and not notice for a long time – or to dress up in full armor except for going barefoot (like I said, inconsistent action). In the past, I’ve compared some of the easier cybersecurity strategies with locking your front door: it’s technically inconvenient but we accept that inconvenience because the dramatic increase in security and safety outweighs it. This is comparable to things like using a password manager and 2FA or making the upfront switching cost to another service.
…
Once [people] understand the concept, they quickly start to realize where they can safely dial back to something less stressful without risking themselves and where they should instead focus more attention to improve. You don’t need the entire suit of body armor, you just need to put on a jacket.
I had a phone die in me
The phone being inside you is probably why it died 😂
But on a serious note, I haven’t switched to passkeys because I don’t have a clear mental model of how to recover from losing both my phone and computer at the same time.
Are you in my head? Is this an alternate account that my subconscious self uses? What is real?
The bill in question is H.R. 7888: Reforming Intelligence and Securing America Act: To reform the Foreign Intelligence Surveillance Act of 1978.
The concerning section of the text of the bill in question.
Elizabeth Goitein’s claims are not correct as the amendment is more narrowly defined than she has claimed. But the amendment is still overly broad and an inappropriate overreach of government surveillance.
Elizabeth Goitein is Co-director of the Liberty and National Security Program at the Brennan Center for Justice.
FYI, the article got the date of the House vote incorrect (it was Friday April 12, not Saturday April 13).
This is an independent research project of yours in which you can write a summary of your findings with citations using a standardized formatting. Make sure you relate your findings to business administration in some way. If you do a good job with it you might stand out as exceptional.
Linux certainly has the possibility of being cutting edge in the consumer market but isn’t and there’s disincentive from a social and economic standpoint to make me confident that it will likely never be. Companies like System76 give me a but of hope though. (Although I suspect that they have long-term plans to adopt RedoxOS as their primary OS eventually.
Linux will never be on the cutting edge of consumer technology where you want to exist. But most people don’t want to exist on that edge (or can’t afford it).
If you want to make Linux work for you, you’d have to accept that you’re going to need separate devices (sometimes MacOS, sometimes Windows OS, even iOS or Android OS at times) to work with the newest toys and gadgets. Not even VMs will cut it every time.
People recommending Linux as a primary OS fir home use are a self selected group of people who don’t value those new products and exclusive software.
Imagine the perpetrator of the criminal activity in question veiwed the videos on piped.video but sent a youtu.be link to the agents. All of the information collected by the order would have been innocent people whose 4th amendment rights were violated.
Imagine if someone who served time in prison and afterwards got their life on track had their parole deemed violated because they watched some YouTube videos at the wrong time or their location data placed them close to an event that they had no knowledge of or association with.
The links included in the court order request that was approved:
I was pointing out that the poster was likely referring to Gboard, not that I have knowledge about any data being collected by Gboard or any other keyboard software.
In evaluation of threats, that standard is way too high. The possibility is real even if unlikely. Unlikely things happen daily we just can’t predict which ones, because they’re each unlikely.
I don’t think it would be insane at all. I just think it’s unlikely. Big well known companies do wildly illegal stuff all the time, for instance, Meta (Facebook) in the article posted here.
Seems like a textbook case of violations of the US Computer Fraud and Abuse Act of 1986. They should be criminally charged.
What’s the 5 year running total for Meta settlements of this sort?