

Session is the one with broken security.
Session is the one with broken security.
You should go properly read the requests from law enforcement they have received and exactly what information it contains. It’s public. Then evaluate if it matters for yur threat model. Security doesn’t exist in a vaccum.
It’s libre software. Go host the server and change the clients to connect to your custom server and distribute to the users you need.
Fight the powa.
It’s also the business model of Oracle I think and they are wildly successful.
I’m strongly hoping that the framework 12’’ becomes widely successful so that the format keeps being relevant.
Oh nice so it’s ok to kill people, you will only get a few hours of community service.
As long as they paid the king it should all be fine.
And everyone, everywhere is putting ai chats as their first and front interaction with users and then also want to say “do not trust it or we are not liable for what it says” but making it impossible to contact any humans.
The capitalist machine is working as intended.
deleted by creator
“IDE for test automation, Aqua”
never heard of it.
Look at this person living the high life full of privileges where they can poop everyday regularly.
The hero we needed.
If you read the few articles about people being attacked by AI in the recent months they all tell the same story: it’s not possible. The AI companies are targetting on purpose other sites and working non stop to actively avoid any kind of blocking that could be active. They rotate IPs regularly, they change User agents, they ignore robots.txt, deduplicate requests over bunch of ips, if they detect they are being blocked they start only doing one request in each ip, they change user agents the moment they detect one is being blocked, etc etc etc.
Many people have 60 and 100w usbc adapters already. I know I do.
Oh no, won’t somebody think of the influencers
best explanation so far.
When AI can create any image or video based on another person with their perfect face and voice, besides the scams that will keep increasing, the other great value of the tech is that we going to be able to create any proof and footage we want to incriminate whoever we wish.
Definitely layer 7.
It’s not suspicious. It’s been talked about for years. People know exactly what the phone number is used for. Easy discoverability, quick and seamless onboarding of new users by providing a way to bootstrap their social graph, and it being very similar to the process of the other biggest player that people just understand. And spam prevention. The phones are not leaked or used for anything else. The other alternatives exist and you are welcome to onboard the people you want onto them if you think it’s simpler.
The code is open, if you don’t trust other people and can’t read the code to understand then hire someone you trust to validate the claims and assure you. But spreading FUD and saying it’s suspicious is not productive to anyone.