My bonus just came in today. Was planning to order one of these this week. Not sure of I’ll wait to see what’s happening at PAX. All they’ve said so far is that Steam will be there.
My bonus just came in today. Was planning to order one of these this week. Not sure of I’ll wait to see what’s happening at PAX. All they’ve said so far is that Steam will be there.
I’m just using Mozilla’s Multi-Account Containers extension. In my work’s infinite wisdom I have a total of five “single sign on” accounts. So I have different containers for each account so I avoid the endless “which account would you like to use” and “this account doesn’t have access to this resource”.
The extension allows me to set specific domains to always open in container X. That covers 90℅ of my use cases. Some sites I need to use different accounts with and for that I have to select which one to use each time.
It’s a bit similar. However this goes a bit further than I understand those projects do. They’re creating a game like the original. With this decompilation project, if you use the N64 compiler you will get a ROM which is 100% identical to the original.
The ROM in this case is only used for game assets, like maps, models, and textures. All the game logic in native code. This allows is to be easily modified to add in new features without trying to hack it into a 20 year old game/console.
The page says it captures game audio only by default. But you can switch it to all audio if UPI want to capture something like external voice chat.
It’s not that it’s closed, it’s more that none of the exiting email protocols support a server which can’t read your email (as it’s all encrypted). They do offer Proton Bridge which you can run locally which will handle all the decryption and local mail clients can talk to that as the would any other mail server.
I don’t know off hand if it supports calendar syncing though.
Ah, so it isn’t just me. I had noticed this myself recently.
Even if it doesn’t look as good, it’ll hopefully include some better APIs that extensions can utilise to improve their experience. E.g. hide the native tabs.
As I understand it (from my non-legal casual read of the new coverage). Having a monopoly isn’t illegal, abusing it is. For Google they found that google was secretly paying companies to not put their apps on other stores. That was what they got the judgement against them. They didn’t find anything like that for Apple.
It’s been a while since I’ve had to touch it too. But couldn’t Alice provide Charlie with both the plain text and her public key. Charlie could then encrypt the text and see it came out the same as blob Bob sent Alice?
Typically end to end encryption includes digital signing of the message so you can verify who the sender was.
Yeah, end to end encryption means its not possible for someone to intercept the message between person A and person B. Nothing stops person B then forwarding the message to person C to report it.
FYI for anyone interested. Immich is a open source, self hosted system for photos/videos like Google Photos. It uses machine learning locally for facial and general image recognition.
It certainly can be a bit involved. When I moved from Gmail address to my own personal domain I did it slowly over a few months.
I set my Gmail address to automatically forward to my new email address. Then I setup a quick filter which added a label on everything that had been forwarded. Once a week or so I would look at all the emails that had been forwarded and update them to my new email (or delete them if unwanted).
I wouldn’t be surprised if they made a torrent for it. They probably want a simple download button for the less technically inclined too.
You might get something harder after that. But there’s a reason one of the most common code interview questions is FizzBuzz. There’s a shocking number of applicants that can’t do it.
I don’t think WebAuthn protects against cookie theft. WebAuthn better protects the login process. But if the result of the login process is still a session/auth cookie, that can be stolen like any other cookie.
Software cracks leaving a calling card isn’t unheard of. Companies before have been caught out before with names of cracking groups showing up in their files.
Edit: found the article I was thinking of. Turns out it was Microsoft themselves!
http://www.techpavan.com/2009/05/24/microsoft-deepz0ne-pirated-cracked-sound-forge-windows-xp-audio/
This was the tool I used. It worked great for me.
It’s a good game. Just don’t take the content warning at the start lightly. I’ve tried to finish it twice but haven’t been able to get more than a couple of hours in.