Confirmation of anecdotes or gut feelings is still science. At some point you need data rather than experience to help people and organizations change their perception (see: most big tech companies lighting billions of dollars on fire on generative AI).
Believe me it’s better to be ignorant about this…
Or… They do what they did last time the lifetime was cut down from 3-10 years down to 395 days… Just issue you a new certificate when the old one runs out and up to whatever the time period you bought it for…?
Let’s Encrypt isn’t the only CA to use ACME, you can auto renew with basically any CA that implemented it (spoiler: most of them have)
I’ve been using this to automatically skip ads on my Chromecasts (youtube ads and in video segments) for the past year.
https://github.com/gabe565/CastSponsorSkip
It’s literally sponsor block but for all of my Chromecasts
You must be new on the internet…
That’s correct, NHTSA required it federally on May 1st 2018. I may have mixed up some local laws or regulations that happened in 2015 (when I bought my last car they mentioned that all their cars were required to have backup cameras)
You’re aware that by law most cars after like 2015 2018 have to have a backup camera in the US right?
If it is broken they are literally breaking the law by not fixing it.
Yes, you can have your mirrors and rearview but the camera removes your blindspots that those miss (you know things like a small child that is behind your vehicle). It’s a critical safety feature that is broken and needs to be fixed.
edit: NHTSA required it in 2018 not 2015, Canada probably has similar laws on the books too
It is arbitrary. While what classification a substance is may have some grounding in research, it’s mostly up to what interest group has either lobbied to get something under or whatever group law enforcement wants to be able to get easy charges for. Cannabis was Sched I because it made it easy for law enforcement to get big sentences for minorities and the counter culture participants of the day. Same thing with LSD and psilocybin.
All the DEA scheduling is just pick and choose your charge for whatever ideological ax they want to grind. Hence why things don’t line up with reality
Unfortunately I wouldn’t buy these given that it’s from Packt Publishing. I’ve bought quite a few of their books over the years and more often than not they’re either full of glaring writing errors that would have been caught if the book was looked at by an editor at all, the code examples have errors that require deep knowledge of said book topic to correct making it hard to progress, or the book doesn’t seem to follow a linear learning path making understanding what the author is trying to convey much harder.
Don’t get me wrong there are some good books from Packt, but they’re much rarer than say a book from O’Reilly or Manning. They seem to just churn out content and not have a rigorous editing process meaning that it’s mostly up to the author’s writing ability to create something useful.
I used to grab their free ebook of the day when they used to have that and more often than not I would delete or never finish the books because they were just so low quality.
You’re aware that you can send whatever traffic you want over any port right? Using 123/udp for NTP is just convention. A light bulb that is updating its time over Tor is suspect. TP-Link would have their own infrastructure or use public pools to update the device’s time.
It’s been hacked, the light bulb is likely part of some botnet or under an attacker’s control directly. Which is why it’s sending that much data continuously. IoT/smart devices don’t send a lot of data in this sort of volume as most of the time they’re idle and maybe send a heartbeat or status update every once in a while to prove they’re alive.
This is what is called an indicator of compromise or IoC, it’s some behavior or pattern that can be used to determine what is happening or who is the one doing the attacking.
Likely OP would need to do some analysis to be able to get attribution unless it’s a very well known botnet actor in which case attribution is fairly straightforward.
It’s definitely been popped. Rip.
IANAL; However Usually the contracts have a severability clause, meaning even if some parts of that contract are null and void the rest of it stands minus the parts that are illegal. Does that mean those clauses are also null and void depending on locality? Again IANAL, but I believe it’s pretty settled contract law at least in the US.
Yes there is! Great you have a strong, randomly generated password. There’s no collateral damage (you’re having your password manager generate the passwords right?) So your other accounts are safe, you only have to rotate one password.
Well what happens for instance if someone really wanted access to your account? Say it’s a bank, a social media account, or maybe it’s just a game account for an MMO that’s super high value, you have a long and strong password, but let’s say the service’s security wasn’t quite up to snuff or you got phished and gave your password by accident (these things happen, it’s not your fault).
This is where 2FA comes in, if someone manages to break your password the attacker needs your phone, your security key, your fingerprint, etc… To prove to the service they’re you. By having 2FA on the account you’re increasing your defense in depth for your account. If you didn’t have it your account is as good as gone as soon as an attacker cracks or gets your password.
It acts as a second lock that needs to be picked in order to take over your account.
I personally add 2FA to all of my accounts I can, the highest security ones get added to my hardware token. The ones I don’t need as high security go into my password manager (which has 2FA enabled but only available via my hardware key).
Additionally as often as possible I try to use a unique email address for each service (simplelogin, addy.io, or similar, + based email addresses are easily bypassed) they all forward to my email but now you have to guess my email for the service (my own private domains, so not shared with anyone else) and what mailbox it ends up in. As a bonus you can disable emails that are sending spam or see who got breached based on the email.
Again defense in depth, a long secure password is great but that’s only relying on a single lock. By having 2FA you’re doubling your security so to speak by requiring that extra key in order to access your accounts.
This is a really good site I wish the dev would for something like the Niche Zero show past the full official range of the grinder. Step-less grinders have more wiggle room in some cases where you can get those courser grind sizes
To be fair most of the class action lawsuits these days are “dumb.” It’s important to still fight these or else nothing will change. It’s a check valve on businesses and the government to prevent them from being completely unaccountable and harming entire populations of people.
They named the feature incorrectly, then they only updated the language and explained it properly after people got in trouble or hurt because they thought it meant something different. That to me sounds like malice or at least negligence to me.
Yes the suit sounds dumb initially. However if you think about how the average person might have been misled this does sound like Google needs to be held accountable.
I usually do the 4:6 method when brewing pour over. Yeah it’s older but I feel I get a more consistent cup even when I’m half asleep making it. Allowing most of the water to drain between pours seems to help with that. I’ve also done some wet WDT if the brew seems to stall to help make sure I meet my target brew time.
Japanese iced coffee!
Instantly cold but full strength because the ice doesn’t water it down when it melts!