Perfect, let’s also bind the certificate to a user session that is derived from a user fingerprint. That way the CA can track users across all sites
Perfect, let’s also bind the certificate to a user session that is derived from a user fingerprint. That way the CA can track users across all sites
That’s pretty hard to do. Just consider the executioners: everyone that wants that job is an asshole as they want to kill other people and would have to be killed themselves. And if you make somebody be the executioner that doesn’t want to do it (a not asshole), then the people forcing them to do it are assholes as they are forcing somebody to be an executioner against their will!
Just hash the binary and include it with the build. When somebody else compiles they can check the hash and just recompile until it is the same. Deterministic outcome in presumambly finite time. Untill the weights of the model change then all bets are off.
Pretty chill and cool I imagine
So how do you use your phone? Every time you type something you use a keyboard app. It might just be the one that was shipped with android (Samsung keyboard, gboard, etc)
Could also be a hyper-v layer around Windows “host”
An open pit at an elevation of 1.5km still means the bottom of the pit could be 1km higher than the place the ore is processed at
Depends on the scale of “going down”. Many mines are in the mountains and the material has to be brought down to lower elevations. The mine entry may be lower than the nearest pass but still a lot higher than the destination of the ore.
Kinda looks like a mountain bike trail next to a forrest road
Yeah he came in with an agenda (block all legislation that could hurt his luxury car daddies). And he achieved all if that. Now his job is done and he gets to retire early.
That is stupid from both of them.
Dont tell your boss you dont expect to be there long.
Dont expect your workers to want to be there long unless you offer good options to advance and educate themselves. Especially for a help desk job… that’s very often an entry job to get a foot into the IT door.
That is the “low tech”; works 100% of the time; will make your live easier in the future solution.
It takes longer than remounting but getting rid of a NTFS drive in a Linux only environment is a good move.
Client isolation doesn’t help. That is just the access point not routing traffic between connected devices. The problem with WiFi is it is a radio signal. Everybody in range can receive 100% of all communication on that network. Just by being in range the attacker can do passive sniffing. No wiretap needed like with cabled networks.
WiFi is encryoed if it uses a password. So any public WiFi without a password can be sniffed by literally every device in range (no need to connect to the WiFi for sniffing). On public WiFi with a password, the radio signal is encrypted but everybody knows the encryption key. So everybody connected to the WiFi can still sniff the traffic of everybody else.
That encryption is only on the WiFi level, so encrypted radio signals, not on the actually traffic level (like TLS/HTTPS etc).
The post office knows who you are sending letters to. They have to know because they have to deliver it. They do not know the content of the letter. They also dont know if the letter will be passed along by the receiver to a different destination.
Your ISP knows you are sending traffic to a VPN but not where they are sending it to. The VPN knows where you are sending traffic to but not the content of that traffic. So if you browse a website that only serves pirated content, then they knows you are consuming pirated media but not which media.
If the law requires the VPN to report any and all traffic to blacklisted sights then a “no logs policy” would breach that law.
However to make this law work, Italy would have to ban all VPNs and http proxy services outside of Italy. Italy would have to force pretty mutch the whole world to follow this law for it to work.
What happens if you run a tiny server on AWS in the USA to proxy your private traffic. Unless AWS USA is watching all traffic to see if it complies with Italian law there is no way to enforce it.
No, why would it? It will run code in the context of the current user which is absolutely enough to start a new process that will run in the background, download more code from a attacker server and allow remote access. The attacker will only have as much permissions as the user executing the code but that is enough to steal their files, run a keyloggers, steal their sessions for other websites etc.
They can try to escalate to the admin user, but when targeting private victims, all the data that is worth stealing is available to the user and does not require admin privs.
Since no arena is specified I assume it to be the only logical place.
In space! (the winner is brought back to their natural habitat)
Everything else would be unfair to at least one of the parties.
I think the ants would outlast all the animals and insects. They might freeze solid and (some) might survive the unfreezing after the figh. Or they could form a giant ball where the ones in the middle survive. And who cares if 19kg die.
On the other hand, the oak would probalby last weeks and could sprout new leaves and roots again if given proper treatment back on earth.
So … GO TREE!
Can’t get it anymore. It is a controlled substance now because it is so highly addictive. Many people can never quit. Just look at how many google searches there are for “how to quit vim”!
That is true for any fandom. Why is being a fan if flavour x software bad but being a fan of flavour x car or flavour x sports team is OK?