

Oh, yeah. I saw that all over Lemmy. I thought they might have been talking about something else.
Thanks for the response.


Oh, yeah. I saw that all over Lemmy. I thought they might have been talking about something else.
Thanks for the response.


What was the announcement?


so why pay a lawyer to sew?
I hate to be that person but just in case you wanted to know, it’s spelled sue.
sew: to unite or fasten by stitches
sue: to seek justice or right from a person by legal process, specifically to bring an action against


Did that comedian commit a heinous crime?


They can’t afford $5/month for a VPN and you’re suggesting they move to a different country? I have a feeling that that’s out of their price range as well.


deleted by creator


Interesting that you feel it’s not age appropriate. At what age do you think it would be appropriate?


Authoritarianism.


That’s one small use case. There are many other legitimate uses for them. Seems a bit odd to be so against them because they might possibly be used for nefarious purposes. Have you personally been victimized by a VPN user?


What’s wrong with VPNs for personal use? Serious question; I’ve never seen someone opposed to them.


They have no job
Tell them to get a laptop


How’d the test go?


User @[email protected] explained the differences pretty well in this comment.


Your AI generated summary, again, lacks evidence. I asked for a site, or a source where what you claim credibly happened, not just repeating the same myths in a circular series of arguments.
I used no AI. Had you actually paid attention you’d see that I cited my source in the first link. The summary I posted it a direct quote from that source. Just because you don’t like what you read that doesn’t automatically make it AI slop.
I don’t feel like refuting any of your other, unsourced assumptions. Good luck with your beloved Windows 7.


It’s called a Drive-by Compromise:
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple ways of delivering exploit code to a browser exist (i.e., Drive-by Target), including:
A legitimate website is compromised, allowing adversaries to inject malicious code
Script files served to a legitimate website from a publicly writeable cloud storage bucket are modified by an adversary
Malicious ads are paid for and served through legitimate ad providers (i.e., Malvertising)
Built-in web application interfaces that allow user-controllable content are leveraged for the insertion of malicious scripts or iFrames (e.g., cross-site scripting)
Browser push notifications may also be abused by adversaries and leveraged for malicious code injection via User Execution. By clicking “allow” on browser push notifications, users may be granting a website permission to run JavaScript code on their browser.
It’s not Hollywood fantasy, as you claim. It is a well documented attack vector.


Why? The porn thing?


Sounds like something Grok would say.


Why?
TempleOS