Stolen/lost password hashes or some AI based programmer that dumped passwords in plaintext somewhere in a database.
If 2FA is proper even trivial passwords are fine.
Stolen/lost password hashes or some AI based programmer that dumped passwords in plaintext somewhere in a database.
If 2FA is proper even trivial passwords are fine.
The word is not ironic it is pragmatic.
Why do so many developers and sysadmins think they're not competent for hosting services. It is a lot easier than you think, and its also fun to solve technical issues you may have.
It is a different skillset. SRE is also an under-valued/paid (unless one is in FAANGO).
An error occurred: API rate limit already exceeded for installation ID 73591946.
Error from https://giscus.app/
Fellow says one thing and uses another.
It’s less of an issue in the case of a normal job than in an open source project where often the commitment of particular founding individuals to the long-term future of the project is a big part of people’s decision to use or not use that tech in their solutions. Here, given that “Trusted computing” can potentially lock you out of devices you have bought, it’s important for people to be able to judge the risk of getting “legal ransomware”d if the trusted computing base ends up depending on a proprietary component that they can’t back out of.
That said, there is absolutely zero chance that I use this (systemd is already enough Poettering software for me in this lifetime) so I’m not personally affected either way.
could you remind me what country is the afd based out of thnx
In reality it is not. It is a spectrum of parties. People vote often for smaller parties in the state and larger ones in the national.
325 million people that don't know about Firefox and uBlock Origin?