End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
At least where I was, when it came out it was $5 for the ‘six-dollar burger’, almost immediately after they threw in a bunch of other ‘big’ burgers. Odd that they tried to makr a 1/3 pound burger seem huge when McDonald’s (at least in America) had been offering double quarter pounders for longer than I can remember.
I thought the ground beef was found to be like 30-40% beef and mainly whey? I vaguely have a memory of them being sued for something (maybe 10-15 years back), that coming out, then the “meat” being rebranded across the board as a material they now reference as “seasoned beef”?
Jitsi was a pain for me to get working the way I needed it, but I have to say I’m a fan so far. I haven’t used it too much yet (mainly just testing with myself from various networks/devices), but from what I can tell it’ll work for my use (replacing Google Meet for my family chat uses).
Came back to drop a link (sorry for the delay) and it seems others have already provided it. Dropping it here again just because it’s an amazing talk by an amazing dude that was taken too soon.
Excellent point! Yet another reason why Linux isos should always be torrented!
You’d be surprised how insecure they are (or were) from the non-physical side. Check out Barnaby Jack’s talk from DefCon 18 (Jackpotting Automated Teller Machines Redux).
Less that the meme is older than them, probably more so they don’t realize why we torrent Linux iso’s.
I can pull down an ISO in seconds over torrent, whole it takes minutes over https. Also it’s nice to add some of the good stuff to the traffic, if only to pad all the illegal traffic with some legitimate stuff.
Someone tried to send me a picture they took and it looked like hot garbage until they sent it over email. Not because it couldn’t be sent without feeding it through a potato first, because Apple wants a worse experience for anyone not in their ecosystem.
When they are the oddball in the group though, it just makes iPhone’s look like a worse option.
Some employees create sym links in their OneDrive folder back to other folders… Instant VC for all those pesky junk files
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
I’m pretty sure the key is stored on the device, which is backed up to Google. I cannot say for sure if they do or don’t backup your keyring, but I feel better not using it.