HotS has never made me rage
LoL OTOH…
HotS has never made me rage
LoL OTOH…
Whats really neat is that modern credit score systems are only 40-50 years old
Because I thought you could aim higher?
Sensitive much?
Edit: jokes aside, im down to talk more if youd like.
I cant make your life more free for you. You have to do it.
I cant think of every way to make your life more free. You have to invoke your own creativity.
These are choices to make, and when pressed I responded. But I only offer advice, and it is open ended at worst.
Im not telling people how to live, im merely stating that them not shooting themselves in the foot would be beneficial if they say they dont like being shot in the foot.
Im having a conversation
I actually didnt tho. Please show me on the doll where I told anyone what to do.
I do what I do, feel free to do you.
Ofc zero is an option, we just have to have the conversion to start the process
Why not zero? Aim higher fam, people let themselves be surveilled too easily these days without any resistance
You need someone to tell you what to do?
It means anyone picking a “side” in the US vs Tiktok debate should reconsider their position (imo anyways)
Thats a weird angle.
My thing is, advocating for JUST tiktok to be banned when the American companies are doing the same thing makes zero sense.
So again, why pick? Choose freedom.
Why should you have to pick though?
They can come for tiktok because its a propaganda tool that harvests sensitive data en masse.
I just wish they’d go after FB, IG, Twitter, etc as well for doing the EXACT SAME THINGS that theyre claiming tiktok is doing.
The only issue with tiktok is China getting the info, not that the company harvests data and spreads propaganda.
Horatio Alger is not a hero
While true, in most cases the username is simply “git” and not a specific username tied to the pub/priv keypair
This person makes dreams into reality.
Legend
When authenticating with git over SSH, the private key should be considered secret and well protected.
That means the corresponding public key that was uploaded to the git server is enough to authenticate and no username is required. However, a password protected privare key is possible and extra layers of security can be added to the authentication mechanism.
As far as resource based attacks based on public key searching, I doubt many servers have significant enough public keys on a single host to even notice. Most repos are siloed and have specific teams/individuals assigned to them, so only a small number of public keys even gets loaded.
I dont know enough about the server side mechanics to be sure, but imo the attack surface is pretty small.
Useful is an opinion anyways, so OP can suck it
Interesting breakdown, thank you.
Do you happen to know if the containerization is similar to docker containers? Or more like android apps?