

Every frickin day… at least once, I read a post’s title and start looking around for clues that it’s not real… My mind goes: “is it the onion? Is it April’s fools again already? This can’t be true…”
Every frickin day… at least once, I read a post’s title and start looking around for clues that it’s not real… My mind goes: “is it the onion? Is it April’s fools again already? This can’t be true…”
I don’t think git is the right tool for this. It’s designed for text files, not binary. Also, there’s no need for version control here. Git won’t store diffs of binary files, so if a file changes (even the slightest change like an mp3 tag) it will keep a full copy of the old file.
OP wants to sync, so I would use rsync here. It will be way faster and efficient. If you want to know what rsync did, you can keep a log file of it’s output.
This is the way… You can build one with an ESP dev board and a couple of components. M5 stack has a couple of different ones that already come with IR and the firmware is pretty easy to download and install.
It is opt-in, if you don’t choose any option on the banner it’s the same as choosing reject all. So, the best option is uBlock Origin with the “Cookie notices” filters enabled.
I’ve seen them in Germany, but between relatively small cities and towns.
Not Just Bikes made a video
about Trams not long ago.
I knew a guy from the US that was also interviewed by some 3 letter agency because his girlfriend was Russian. This was like 20 years ago.
I got “How to remove a urinary catheter” 😱🤣
I’ll extend that to every product as well. I hate branding specially in clothing.
What about https://www.hyphanet.org/ ?
I used it a long time ago (when it was called Freenet) and it worked really good.
Reading a book or listening to a podcast usually works. If not, I add a couple of CBD puffs.
If life is a simulation, afterlife can be simulated as well.
Public transit in NY moves literally millions of people per day, so the chances are still pretty low.
Maybe find a middle ground, like sharing the hosted service with just one or two persons, like a close friend, family member, etc. Could be someone you live with or that you can give VPN access to your network. That way is more private and mainly for your self, but also has some sense of doing it for others to motivate you.
Balatro
Children of Morta
Lego Marvel Super Heroes 2
Mars First Logistics
There was no version control at all. The company that provided the software was really shady, and the implementation was so bad that the (only) developer was there full time fixing the code and data directly in production when the users had any issue (which was several times a day).
I think BLE is only required for the initial compromise (extracting the pairing key). After that the attack can be performed over classic BT, and can impersonate either part (headphones or phone) to the other.
It’s still very targeted and sophisticated, so no reason to panic unless you have reasons to think someone with the resources could target you.
Regarding the attacks, they go way beyond eavesdropping calls, since BT headphones usually have access to contacts and smart assistants, that you can use to extract a lot more information