The page says it captures game audio only by default. But you can switch it to all audio if UPI want to capture something like external voice chat.
The page says it captures game audio only by default. But you can switch it to all audio if UPI want to capture something like external voice chat.
It’s not that it’s closed, it’s more that none of the exiting email protocols support a server which can’t read your email (as it’s all encrypted). They do offer Proton Bridge which you can run locally which will handle all the decryption and local mail clients can talk to that as the would any other mail server.
I don’t know off hand if it supports calendar syncing though.
Proton is not the same as a VM. It has direct access to your filesystem. It could delete your entire home directory if it wanted to.
Even if it doesn’t look as good, it’ll hopefully include some better APIs that extensions can utilise to improve their experience. E.g. hide the native tabs.
As I understand it (from my non-legal casual read of the new coverage). Having a monopoly isn’t illegal, abusing it is. For Google they found that google was secretly paying companies to not put their apps on other stores. That was what they got the judgement against them. They didn’t find anything like that for Apple.
I believe Steve has said that he hates the title/thumbnails too. But Google’s algorithms heavily incentives them, so he reluctantly uses them while maintaining the good quality content.
It’s been a while since I’ve had to touch it too. But couldn’t Alice provide Charlie with both the plain text and her public key. Charlie could then encrypt the text and see it came out the same as blob Bob sent Alice?
Typically end to end encryption includes digital signing of the message so you can verify who the sender was.
Yeah, end to end encryption means its not possible for someone to intercept the message between person A and person B. Nothing stops person B then forwarding the message to person C to report it.
You technically could make cheese without murdering a cow but you won’t find any made that way. Cows only produce milk for their young. To make milk they need to be repeatedly impregnated over and over again. Lifespan of a cow can be 20 years, though they are usually killed after about 5 as their milk output drops. Half of the cows they give birth to will be male and almost all killed as they don’t produce milk. Some of the females may be killed too as you’ll end up with more cows than you have room for it you keep them all.
As for a human child, drinking human breast milk is considered vegan as long as it was given consensually. If you kidnap someone and tie them up in your basement then it wouldn’t be.
FYI for anyone interested. Immich is a open source, self hosted system for photos/videos like Google Photos. It uses machine learning locally for facial and general image recognition.
It certainly can be a bit involved. When I moved from Gmail address to my own personal domain I did it slowly over a few months.
I set my Gmail address to automatically forward to my new email address. Then I setup a quick filter which added a label on everything that had been forwarded. Once a week or so I would look at all the emails that had been forwarded and update them to my new email (or delete them if unwanted).
I’m not sure if their app does it. But the gluten docker container supports their port forwarding. Works really well if you’re looking to route other containers through a VPN.
This is what I do as well and it’s been working great for me.
I don’t think WebAuthn protects against cookie theft. WebAuthn better protects the login process. But if the result of the login process is still a session/auth cookie, that can be stolen like any other cookie.
Software cracks leaving a calling card isn’t unheard of. Companies before have been caught out before with names of cracking groups showing up in their files.
Edit: found the article I was thinking of. Turns out it was Microsoft themselves!
http://www.techpavan.com/2009/05/24/microsoft-deepz0ne-pirated-cracked-sound-forge-windows-xp-audio/
This was the tool I used. It worked great for me.
That’s not entirely true. It’s only very recently that browsers have started using a new system called Encrypted Client Hello which hides the domain of the request. Prior to this all requests needed too have the Host field unencrypted so the receiving server knows which certified to respond with. I imagine there’s still quite a few servers which don’t support the new setup still.
Set Immich up a couple weeks ago and I’m surprised how good it is. Their docs included a simple cli tool to bulk import all my Google photos. Mobile app is working great. I’m really impressed with the search too.
I haven’t played it properly either. But there’s a community mod called Deus Ex Revision (It’s also on Steam). Which improves some of the graphics, and looks to include a bunch of QoL features.
https://www.moddb.com/mods/deus-ex-revision