“Encrypted email” only works between encrypted providers. ProtonMail and Tutanota are both very inconvenient, and all I want is an email that’s not scanned for marketing.
Since 2018, ProtonMail kept getting worse, especially with the recent AI stuff. Dodged bullet, IMO.
$6/month = Custom domains, and any amount of emails under those domains. I can send and receive from any domain xxx@yyy [dot] lynndotpy [dot] dev, for example.
CalDav and CardDav provider = Contacts, calendar, and reminders sync. Works perfectly on iOS too, if you like that.
It replaced my finnicky NextCloud for half the cost.
Learning Linux was probably the very best thing for my career.
The fact that I use Linux as my primary OS has been a positive in almost every interview I’ve been in as the interviewee. Linux has been used everywhere I’ve been, and that represents a huge amount of upskilling they can skip.
As an interviewer, I’d say that developers who use Linux generally understand their development stack better.
This thread has reminded me that I have Ruckus APs that mesh. But support had been dropped because they are “old”. Presumably there is no open source solution that I can flsh these with, still allowing me the meshing?
I knew someone with that name. Or at least I assume that was her name because she kept repeating it, like a Pokémon. Incidentally, she was a sex worker.
You didn’t tell us what you think the usual 9 to 5 pays. Are you asking whether a tech job pays more than minimum wage? Many of them do. Also, when you’re interviewing, and even when you’re writing a cover letter, try to avoid the term power user, and instead provide details of things that you’ve actually done. Anyone can call themselves a power user, but what does that even mean? If you say you’re a power user, if you’re lucky the interviewer will ask you for details, and if you’re unlucky they won’t, because they’ll assume you’re just grandstanding. So you’re better off providing a little extra information up front, and not gambling on them asking for it.
IT guy here, I work in the finance industry and have never worked with eduroam, but I have some experience of what we normally can see.
I am not an infosec guy, so I can’t speak to what they can see.
In my experience a normal IT team will see the connections your computer makes to the remote host (in this case google), but can’t see the information transfered.
This depends on if your connection uses https (gmail does) and weather or not the network uses deep packet inspection.
Https encrypts the traffic, sort of like you putting a big pink stuffed elefant in your car boot and driving it to your new place, people won’t see the big pink elefant, but they will see your car going from A to B.
Deep packet inspection is like a security checkpoint between A and B, the officers will open you car, log that you are carrying a big pink stuffed elefant, and send you on your way.
You can use a tool like ssllabs testing service to find out the issuer of a certificate, and compare that to the issuer on the certificate you get in your browser.
However, the most important thing to remember is that we as IT guy don’t care about what you do unless you break the rules or in some other way are causing harm to the network.
We don’t do pinpoint surveilence, unless we have a reason to.
We collect data yes, but that is only really used for statistics and troubleshooting.
But we have plenty of automation that will log the shit out of a misbehaving system, there are plenty of similar systems, but the one I am familiar with is Microsoft Defender 365.
If it notices something odd or bad it will log everything related to it, files modified, the user running the program, registry values changed, connections to other computers, commands run, and more, but it will only do that when bad action is being taken, not just by connecting to gmail.
We in IT don’t have time or interest in looking at generic logs for fun.
The one thing that might be putting you on the radar is the use of a third party app, it might not be approved software if you ran it on a company laptop, but since it is a personal laptop, I wouldn’t worry about it.
TL;DR: It is doubtful that they will see what you have written, and even less likely that they have access, and even less likely that they care or even knows about it.
But if you fear people reading what you write, you have two options, one easy, the other one less so.
Stop writing, easy, then there is nothing to be found.
Local encryption, get veracrypt, create a new encrypted file, mount it, format it, and save your texts there.
Travelers, The Expanse (noted by OP), Beef, and Breaking Bad are all solid. Add Mare of Easttown, the Morning Show, and the Newsroom and you’ve got half of my favourite shows of the past 15 years.
Ted Lasso was the big surprise to me here. The characters are lovable, caring, and well-crafted, and the story is simple but compelling. In all, only the most heartless, isolate, human beings would get nothing from this show.
The issue here is we actually don’t know how much inflation there is because we can’t measure the quantity of fiat, which is why there are dozens of “inflation measures” which just study different baskets
But yeah, if inflation could be measured correctly and everything automatically updated (wages, costs, etc) then I’m not seeing an issue logically. But at that point it’s just a fixed supply of money and prices adjust up and down, irregardless of currency type. That sound reasonable?
You’re looking for a block level incremental backup solution. This can either be achieved using filesystem based snapshots (ZFS, BRRFS) or using dedicated programs. I know rdiff-backup , restic and duplicity use block-level diffs, not sure about rsnapshot.
Get rid of all lock in or network affect. In investing it might be called moat. Looking to destroy like Facebook. Very hard to compete due to they have all the users. You can’t just choose your chat app, you also be on the same network as your friends. Decouple those two. Another example is YouTube. They are the biggest video provider and thus will reach most users. Decouple those two again. I can continue with Microsoft apps, Netflix videos, Google search and ads etc.
Without possibilities for real competition, you dont get innovation.
Honestly, I agree with you and with them. They chose said painting because it is incredibly expensive, so it represents how much people are willing to pay for a painting, while not doing an effort to care for the world we live in.
According to my sources, another reason was that the painting was encased in glass, so they saw it as a great target for the stunt, to get attention, while not causing any damage to the actual work of art.
So, the message being “Look at how much you people’s care about us “destroying” a work of art, but nobody gives a shit about the people who are destroying the world”.
kbin.life
Newest