Once dreamt a solution (the logic, not the code, though) for an actually real programming issue I had and the solution actually worked.
🏠 Hamburg, Germany
🚃 Daily Commuter
🐧 Linux User
🎮 Part-time Gamer
💻 Hobbyist Coder
🔗 0x7be.de
🇬🇧 / 🇩🇪
Once dreamt a solution (the logic, not the code, though) for an actually real programming issue I had and the solution actually worked.
The mail address is shown for 3 data breaches. dailymotion 2016, Gravatar 2020, Myspace 2008. None of the passwords could possible match my Spotify password but I stopped using those services long before the breaches so I can’t tell 100%.
Are you crazy, mein Kommandant? Ze Flammenwerfer needs too much gasoline! We don’t have enough Reichsmarks for that!
Damn. I just translated the app on Codeberg’s Weblate instance. How dare they not releasing a new version! 😄
Maybe we should start such a list?
Here’s one that’s actively developed and open source: https://play.google.com/store/apps/details?id=eu.toldi.infinityforlemmy
Google’s AI will intentionally get cancer? Great!
Again, this is not suitable for any real world use. This is an educational tool
This is a fully usable bot-in-a-box for Mastodon, you say? Thank you! 😇
Our corporate overlords decided to go all-in with the Microsoft cloud. Azure AD, Teams, Microsoft 365 apps, Exchange Online - all the crap data security aware people would avoid. “OneDrive first” is just an annoyance at this point.
Don’t worry, the limit is set large enough. No cat will starve on THIS machine.
An automatic purge process will start to prevent this. It happened several times in the past. Last time between 2019-2022. It removed circa 7 million processes. With regular purges like this it is made sure that the resources are not maxed out before the admins can add more capacity.
It will be a shared world multiplayer-first service game so it can be an AAAA game like that recently released Black Flag add-on that got out of control.
/etc/security/limits.conf
exists …
Ideally the key isn’t stored anywhere on the machine that contains the storage medium the key is for.
So they broke it? Great!
You can skip all questions the last time I checked.
This might be easier: https://distrochooser.de
I think about back alley black market print shops.
As broad as possible – as always.
Nope, no logins on devices I do not own. I have it on my smart home devices and on my cellphone. The phone is connected to carrier network and free access points from our public transport company and in the office WiFi.
I didn’t link Spotify anywhere. My devices are likely not being compromised. On my phone I use open source software where possible and only very little apps in general, and all network traffic is very restricted with NetGuard in whitelist mode. So someone else or me or my tools would have noticed any fishy things happening on that side.
I could not say where someone could get the two sessions (my smarthome system and my phone) from based on my usage either …
It’s all just very strange.