If you want to see what it would be like in the wrong hands: https://m.imdb.com/title/tt1213404/
If you want to see what it would be like in the wrong hands: https://m.imdb.com/title/tt1213404/
I don’t know if it’s still the case, but in my experience (years ago) PGP messed with the proper rendering of HTTP email bodies.
From a security standpoint also, the signature confirming that the email is from your is a double edged sword: Yes, your contacts get to verify that it’s you, but you’re also losing plausible deniability (privacy).
xXtwitterXx
I will never forgive JSON for not allowing commas after the last element in a list.
I don’t have a Fedora workstation in front of me right now, but it memory serves me right there’s a “default applications” or similar menu in Gnome’s settings.
Maybe consider getting sorbet or gelato next time?
So bonobos become the dominant species?
Transparent vs translucent.
Yeah, you’d have a LoadBalancer service for Traefik which gets assigned a VIP outside the cluster.
virtual IP addresses
Yeah, metallb.
The container is reproducible. Container configuration is in version control. That leaves you with the volumes mounted into the container, which you back up like any other disk.
Photorealistic: yes. However, it could be debatable whether it’s gruesome. We see situations that characters survive with short term damage but no long term consequences (example: Homer skating into the canyon). So while it would be gruesome to us, it’s probably closer to slapstick to them.
In “Treehouse of Horror VI” Homer becomes 3D and comments how he’s “so bulky”.
I can’t not bob my head when What is Love plays.
It’s not that Seagate improved (which it may have), it’s more that WD has noticeably declined. It’s not a race to the bottom (yet), but there’s effectively no competition any more, so they aren’t incentivised to improve quality.
If they control the browser they can potentially intercept everything you see and do. Banking info, whether you looked up Tianmen square, who you talk to, who you trust… They can also infer personality from your browsing history. Looked at clown outfits just before watching porn? Maybe you’ll get a letter blackmailing you or else they’ll divulge your fetish to your family and loved ones. This is not fiction - China has been caught doing this to political personalities, and those are only the ones that failed.
The browser can also serve as a gateway for them to install persistent monitoring software on your OS, or turning your machine into part of a botnet.
There’s Amazon’s mechanical Turk, and after that self driving car hit a pedestrian and stopped on top of him it turned out that Cruise “self driving” cars depend on human operators when they get stuck.
ACAB