xombie21

joined 2 years ago
[–] xombie21@lemmy.dbzer0.com 19 points 1 week ago (1 children)

"Good friends"

[–] xombie21@lemmy.dbzer0.com 34 points 1 month ago (1 children)

As a former windows insider it's too little too late. Already switched to Linux.

[–] xombie21@lemmy.dbzer0.com 3 points 1 month ago

Forgejo didn't exist when I installed gitea.

[–] xombie21@lemmy.dbzer0.com 13 points 1 month ago (11 children)

Gitea is the answer, configure/install with docker. I have had mine going for a few years now and haven't had to touch it besides updating the docker container which I automated.

[–] xombie21@lemmy.dbzer0.com 61 points 1 month ago (1 children)

That's John Gruber’s regex pattern for matching URL's (⌐■_■).

[–] xombie21@lemmy.dbzer0.com 3 points 1 month ago

I know the eye of Sauron when I see it.

[–] xombie21@lemmy.dbzer0.com 0 points 3 months ago (1 children)

Can you provide a legitimate source for the statistic in your claim? I can't find any sources.

[–] xombie21@lemmy.dbzer0.com 19 points 5 months ago

She's a barback.

[–] xombie21@lemmy.dbzer0.com 6 points 5 months ago

From a technical and practical standpoint, any device with location tracking carries a significant privacy risk. Even strong encryption doesn’t eliminate the problem, because the weakest point in these systems isn’t always the math—it’s the humans. Keys can be stolen, accounts can be hacked, and access can be abused by the very people who are supposed to have it.

We’ve already seen this play out in the real world.

Police departments have abused phone-based location tools to monitor ex-partners and journalists.

Companies like Tile and Apple have had to add anti-stalking features because strangers were secretly tracking people.

And when location data is stored centrally, it becomes a prime target—like when U.S. agencies purchased phone-location data from marketing firms to track people without warrants.

Once tracking data exists, there is always the possibility that someone other than the “intended” person gets access—whether that’s a stalker, a data broker, a hacker, or a government agency. At scale, a tool built for convenience can quickly become a surveillance system.

So the issue isn’t just “what if someone abuses it”—the issue is that every trackable device creates an opportunity for abuse. Convenience turns into liability the moment access leaks, laws change, or someone with power decides they want the data.

[–] xombie21@lemmy.dbzer0.com 9 points 7 months ago

I see we are back to pseudoscience created by charlatans. Coming soon the newest snake oil that will heal any aliment.

[–] xombie21@lemmy.dbzer0.com 16 points 9 months ago (1 children)

And here I thought it was just me who saw the logo unfurling and changing from a spiral into a Bullseye.

view more: next ›