I was not looking for anything. So I found everything of nothing.
I was not looking for anything. So I found everything of nothing.
I wrote about this idea on Lemmy before and I got downvoted for it.
https://en.wikipedia.org/wiki/Cooties
Cooties is a fictitious childhood disease, commonly represented as childlore. It is used in the United States, Canada, Australia, New Zealand, and the Philippines as a rejection term and an infection tag game (such as Humans vs. Zombies).


You do be wearing your full body armor then yes? Because where is the line?
Don’t answer me because it’s rhetorical.


Maybe his hand is rotting away too much for him to be in public.
But right now is the best time.


Now some other nation can start to threaten Trump with an invasion if he doesn’t protect his citizens.


I think the security researcher didn’t download the data.
But be sure to check out https://haveibeenpwned.com/ to check if your data is in other lists.
Proportional representation instead of first-past-the-post might help.


Are we sure someone just didn’t ask Gemini for 48 million Gmail credentials and immediately get them?
It looks like they come from infostealers:


My project uses a free one from SignPath. They offer this for opensource projects and require a verifiable GitHub build process. It’s not EV certs but it’s good enough and free.


Yes and OpenRGB as well.


Hardware RGB configuration is a pain. I tried some opensource tools but none of them are good.
To configure my Corsair RGB lights I only had luck by installing Corsairs iCUE software in a VM and configuring it that way. It’s literally a 1 GiB software just to change some variables in the RGB controller that saves and handles the lights without even needing to have the VM turned on.


Weird that they want to do all the verification themselves and not just allow certificate signing using verified CAs. Oh well it’s not weird because we all know Google does this to fight back against third party stores and to get developers back to their shitty one and of course to better track them.


Creating enemies and problems gives you the opportunity to become a solution with power.


These powerful people don’t need VPNs for their pedophilia, terrorism and privacy.


This might just be a false flag.
Nice, now we can put that moping to good use.
As an opensource dev I don’t mind having people say this. It’s good to get feedback regardless of whether it’s a call to action or merely a suggestion. You can’t know what direction people want the project to go in otherwise.