Deleted Comment
I live in Manhattan and walk to work. The amount of drivers I see using their cellphones while driving on during my daily commute is ridiculous. Sometimes the drivers are in plain sight of officers whom are standing on the crossing an at intersection. It's ridiculous.
Sometimes I feel like some sort of program should be introduced where if a pedestrian can obtain evidence of a driver on the phone or something, it can be submitted and the driver receives a fine while the person that submitted the evidence gets rewarded.
Those drives get carried around haphazardly, are often in different physical locations, and usually only differ in content by at most a week of data.
But I'm odd, happy to write my own scripts, and don't want to trust cloud-based solutions for my personal data.
By the way, I regularly pull randomly selected files from the backups to test that they exist and are readable. Backups aren't backups unless you can restore from them, a lesson I learned the hard way three decades ago.
Also:
* What has changed since you asked this 6 years ago[0]?
* What have you already tried?
* What are you using now?
* What is your experience?
* Why don't the solutions offered there work for you?
* Will you share your experience with us?
https://github.com/DataDog/yubikey/blob/master/gpg.sh#147
This statement has no effect when using Yubikey - the PIN is cached by the key itself and it will remain unlocked indefinitely until it's physically unplugged. See https://dev.gnupg.org/T3362
There is so much more to privacy than is made apparent to the user as a few OS knobs to "limit" ad tracking.
<html>
<head>
<META NAME="robots" CONTENT="noindex,nofollow">
<script src="/_Incapsula_Resource?SWJIYLWA=5074a744e2e3d891814e9a2dace20bd4,719d34d31c8e3a6e6fffd425f7e032f3">
</script>
<body>
</body></html>
And then if I curl:https://www.nccgroup.trust/_Incapsula_Resource?SWJIYLWA=5074...
Then I get an obfuscated Javascript blob:
I can't understand how this page could work on any browser that doesn't enable Javascript.
The only possible explanation I can think of is that it must be sending different content based on user agent, or something, though messing around with sending different user agents via "wget -U" gets me more or less the same thing.
Edit: the page loads for the first time after assigning a new IP in Tor, but subsequent loads throw the captcha. Odd system.