

Do you have any information to share about their bad security? I have a couple of their routers which seem to work quite well. Any I really at risk, and anymore than I would be with something from Linksys or Netgear?


Do you have any information to share about their bad security? I have a couple of their routers which seem to work quite well. Any I really at risk, and anymore than I would be with something from Linksys or Netgear?


Thanks for the reply. I’m not sure this is for me given the storage requirements. I was hoping for some magic math I guess that didn’t require the extra magnitude of storage it seemed would be required, but alas no magic was found.


This sounds really interesting and just what I was starting to look for.
What I’m not clear on and couldn’t find info about is what’s the storage size trade-off? Presumably you get these benefits by providing some of your storage to others, as they do for you. I’m trying to decide the size of disk I need to use and not clear how to estimate that. Also not clear how recovery is dealt with if my storage fails spectacularly. Can you restore from the “cloud” or do you still need to have your own full backups? The fact that links still work when you’re offline makes it sound like cloud recovery is possible but didn’t see anything about that.


Did something similar… turned the electric stove on high, waited until coil was glowing red and then touched it with my finger. I still remember how excited I was waiting for it to glow! 😄
That finger has no normal fingerprint now - the ridges and swirls are gone. Kids are dumb.


Powershell works really well on other OSs now. I use it on MacOS and Linux daily. I might loath MS but Powershell is a fantastic shell and after working with an object-oriented shell I hate going back to anything else.


The sailors didn’t just eat meat though… they were typically also eating large amounts of high carb hardtack (biscuits), beans and oats as all were cheap and traveled well. Traditional high carb diets need vitamin C sources or scurvy can occur. A very low carb diet can get by with very little vitamin C because it’s not longer competing with glucose, but of course such a diet was rare in past times. The Inuits diet is one well known exception where the people might go most of a year without plant sources of vitamin C and avoiding deficiencies by eating organ meat which is rich in many vitamins and minerals.


Interesting… thanks for the reply!


So did you just cancel the HBO max subscription in YouTubeTV, or did you cancel YouTubeTV altogether?


Having the evidence needed to convict is different than evidence to no longer trust and shun.
With 20+ woman making accusations, being friends with a known pedophile and literally having recordings of him bragging about sexually assaulting women and bragging about going backstage with undressed teen girls the world shouldn’t need any more evidence. The honest and rational world doesn’t in fact.


Clipboard history and Sync across devices are separate Clipboard settings. It’s the latter option that sends your data to the cloud.


That used to be true but no longer. For anything but gaming Apple’s M series chips are amazing.
I’m a 30+ year Windows and Linux user and developer that preferred machines I could build myself. A few years ago switched jobs and was given an M1 Pro for work… it’s incredible how good, fast and low power the M series are. I’ve used my laptop 8 hours straight without plugging it in. That’s simply not doable with any other machine.
I still dislike their walled garden, and for high end gaming Apple’s a no-go, but for most things it’s hard to argue with how good they are. The machines may come at a premium, but they are high quality, work great and for battery use they don’t have a rival.


In theory the unique id produced by the scan could be salted by you, uniquely for each website or application, and then provided to the site. This would keep aggregators from being able to track all your activity, or at least it would if they didn’t already have fingerprinting techniques that do it without the need of another unique identifier.


I mean it wasn’t random. They came here, no one was present and they claimed it. And many were ok with sharing a bit when Europeans first arrived. The Europeans were the ones consistently ignoring their right of ownership and their right to exist.
The dude is clearly underestimating my farts.


Time Machine is just backup software isn’t it? It’s not doing an involuntary index of all your activity and content you interact with, right?
That summary may also explain why some men are so insecure about women earning more money than them too.


The need for privacy in crypto is significant and a hinderance to wide adoption. With most crypto if you send me money once I then know your wallet address and I can then look up every transaction you’ve ever made with that wallet and every future transaction you make later. Clearly that’s a problem.
The fact that criminals are more motivated by privacy concerns doesn’t reduce the need and expectation of privacy for the rest of us.
I have one mikrotik poe AP I use and am quite happy with, but certainly not something I’d recommend for non-technical people because it’s firmware isn’t consumer friendly.
However my question is really what’s the real risk in using TP-Link devices. Neither the article or any of the comments link to any explanation of the actual risks. Is my network actually open to hackers now? Is my router able to be used for dos attacks or for other purposes now? Everyone is acting like their flaws are common knowledge and there’s zero info about genuine flaws or exploits.