We can avoid all these problems if we refuse to use any software that doesn’t come with a license that respects your freedom:
- GPL
- MIT
- APACHE
We can avoid all these problems if we refuse to use any software that doesn’t come with a license that respects your freedom:
deleted by creator
deleted by creator
SEO destroyed the search providers, and now that search is useless, seo has become useless.
Nextcloud is really great for this. There is clients for all desktop and mobile OS. I am hosting this myself on my VPS however you can however use this service here: https://nextcloud.com/sign-up/
their website says they host it for you and provides this list of providers…
layoffs would not be the bellwether for that.
I guess we can at least agree, that even if a company doing lay offs isn’t necessarily going belly up, a company that is going belly up is probably doing some lay offs along the way.
However going beyond the point we agree over… what if a lay off sets in motion a series of chain reactions:
I am sure there are other factors and maybe some of those three above are not a factor at all…
Didn’t they just do several rounds of layoff?
I guess layoffs are a sign of a dying company…
deleted by creator
I love self-checkout, because I hate waiting in line.
What about the whole usbc apple thing? dont forget about that one
That’s so Meta 😂
shattered windows
damn…
totally!
Maybe we just have different ideas of what quiet is…
Define quiet…
https://en.wikipedia.org/wiki/KRACK " The KRACK attack
believed to affect all variants of WPA and WPA2; however, the security implications vary between implementations, depending upon how individual developers interpreted a poorly specified part of the standard. Software patches can resolve the vulnerability but are not available for all devices.[57] KRACK exploits a weakness in the WPA2 4-Way Handshake, a critical process for generating encryption keys. Attackers can force multiple handshakes, manipulating key resets. By intercepting the handshake, they could decrypt network traffic without cracking encryption directly. This poses a risk, especially with sensitive data transmission.[58]"
https://web.archive.org/web/20151113152528/http://www.airtightnetworks.com/WPA2-Hole196
"the group temporal key (GTK) that is shared among all authorized clients in a WPA2 network. In the standard behavior, only an AP is supposed to transmit group-addressed data traffic encrypted using the GTK and clients are supposed to decrypt that traffic using the GTK. However, nothing in the standard stops a malicious authorized client from injecting spoofed GTK-encrypted packets! Exploiting the vulnerability, an insider (authorized user) can sniff and decrypt data from other authorized users as well as scan their Wi-Fi devices for vulnerabilities, install malware and possibly compromise those devices.
In short, this vulnerability means that inter-user data privacy among authorized users is inherently absent over the air in a WPA2-secured network. "
https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#Security_issues
" Predictable Group Temporal Key (GTK)
In 2016 it was shown that the WPA and WPA2 standards contain an insecure expository random number generator (RNG). Researchers showed that, if vendors implement the proposed RNG, an attacker is able to predict the group key (GTK) that is supposed to be randomly generated by the access point (AP). Additionally, they showed that possession of the GTK enables the attacker to inject any traffic into the network, and allowed the attacker to decrypt unicast internet traffic transmitted over the wireless network. They demonstrated their attack against an Asus RT-AC51U router that uses the MediaTek out-of-tree drivers, which generate the GTK themselves, and showed the GTK can be recovered within two minutes or less. Similarly, they demonstrated the keys generated by Broadcom access daemons running on VxWorks 5 and later can be recovered in four minutes or less, which affects, for example, certain versions of Linksys WRT54G and certain Apple AirPort Extreme models. Vendors can defend against this attack by using a secure RNG. By doing so, Hostapd running on Linux kernels is not vulnerable against this attack and thus routers running typical OpenWrt or LEDE installations do not exhibit this issue.[54] "
no both options are fundamentally insecure. the current standard 2 and the version 3 of wpa
|Original | free version to try|
|Debian|PureOS|
|Ubuntu|Trisquel|
| | Guix |