Iiuc to exploit you already need kernel level access. I’d figure if something malicious made it that far, you’re already screwed.
Aka csm10495 on kbin.social
Iiuc to exploit you already need kernel level access. I’d figure if something malicious made it that far, you’re already screwed.
Recommend cloudflare for DNS. I use it for DDNS via API and it works great.
You also basically pay the wholesale rate without markup for the domain.
+1 to NPM. Works really easily for certs and auto renewal.
I was told they’d always be there for me. Then my dad passed away a few years ago.
I still miss him.
2 bucks says commercial ai is still being trained on those comments.
S m r t
Ah. Then just buy a gift card in cash from CVS, etc. Then use it on an alternative account and delivered to one of those pickup boxes.
Still sketch though lol.
It’s public knowledge. If they want to know where you personally live, they could look it up via the ways I previously mentioned.
Heck, even if you never visit their sites, they could easily get big lists of names and addresses that may include you: all legally.
Any attempt at fighting that is likely not to be fruitful. It’s basically security by obscurity, you’re trying to complicate it via one way, but they can just go another (more obvious) way if they wanted.
I hate to be the bearer of bad news, but most people can lookup most other people’s addresses in the US for free (or cheaply) on websites like whitepages.com. Even without that, if someone is very determined, they can visit the record office for the area on get public info on you, which also likely includes address.
What’s the benefit of paying such a premium for an anonymous delivery if your address is likely already available?
The only thing I can think of is if buying something sketchy, but I’m genuinely curious here.
It took a while to get going, but eventually the story worked well to pull me in. I was hooked on the character development and the plot.
The world is so vivid and beautiful too. Lots of things to look for, hunt, explore, etc. I really liked it.
I also had my character grow a big mustache. My wife won’t let me do that so I lived vicariously through the game for that too.
The idea of a clean code base only existed for the original writers… most of the time.
I actually don’t care here lol. It scares me when it makes noise but I just play with my phone anyways.
I wouldn’t condone vandalism or anything like that here.
RDR2
A lot of compilers have things like timestamps in the finished product that could mess with hashes. I guess hashing the rest of it could work if hashes for non static regions are given.
Sure but how do you know those encrypted requests don’t contain personal or unexpected information?
How do we know that these solutions are more private than Discord?
Even if open source, how do we know the compiled version wasn’t altered?
Some of the assets still come from the original game, but OpenRCT2 is wonderful.
Species of apples
What is the data used to freeze your credit? Why couldn’t a bad actor with your SSN unfreeze it?
Edit: I just froze with the big 3 credit agencies. It took name, address, phone number, email, SSN, birthday.
So all the stuff that leaks. Why do people think this provides security if a bad actor has the same data to unfreeze?