She’ll independently recycle your matter into more coffee.
She’ll independently recycle your matter into more coffee.
I’d say it’s worth doing this regardless to help determine if it’s an application or system issue causing them not to go off.
My bonus just came in today. Was planning to order one of these this week. Not sure of I’ll wait to see what’s happening at PAX. All they’ve said so far is that Steam will be there.
Probably don’t need to scrape it. Just query WikiData for it
When I migrated emails last time, I setup my old email to automatically forward to the new email. Then on my new email, I setup an automatic label for any email that was addressed to the old address. Every week or two I’d review what was sent to it and either update the email address used or unsubscribe. Eventually it got to a level where I wasn’t getting much at the old email anymore and finally deleted it.
In that case Proton wouldn’t be providing the data, the user would be. Proton can’t provide what they don’t have.
That doesn’t hold up against the publicly available source code for their applications, white papers on their security and encryption, and multiple independent security reviews. And again, they are legally required to ignore US court orders. Only a Swiss court order can compel them to provide user information.
Got a source for that? Proton isn’t able to access to any user emails. I believe Swiss law also makes it illegal for them to provide user information without a (Swiss) court order.
The only case I’ve heard of that was similar was when the Swiss court ordered them to provide all the info they had on a user. This was the last IP address they logged on from and a recovery email the user had entered. The recovery email is an optional thing the user had set up on their account. They also used this same email address to sign up for a Twitter account. They were able to get enough data from Twitter to identify the person.
Yeah, I had one of the earlier ones Yubikeys without NFC. I remember having to get a USB mini to full USB converter and plug it into that to login to things like LastPass. Thankfully I only needed to do it once for the initial login.
Yubikey and other hardware security keys now support NFC which makes the mobile support really good. A quick tap to the back of the phone and you’re done.
I second this. Especially useful as you could be following an exact or similarly named community and not notice it’s on a different instance.
One thing to note is that SimpleLgoin (haven’t used AnonDady) is that it can generate different kinds of aliases.
One option allows you to specify the part of the email before the @. These will all use a common randomly generated sub domain. As these subdomains are assigned to individual users, you can correlate two aliases to the same user. It’s probably not picked us as easily as an exact match, but far from impossible.
Simple login does have the option to generate completely random emails which don’t use a common subdomain. This mixes your usage with every other user of the service.
7 Billion Humans and Human Resources Machine (same developer) are probably the most kid friendly ones I’ve played. TIS-100 I found quite fun, but it’s assembly like programming which might be a hard starting point for kids. Zachtronics also make some good games, but the ones I’ve played are more programming games masquerading as something else E.g. chemistry with SpaceChem.
There’s a bunch of great programming games available on Steam. A lot of them start pretty basic, so might be useful for teaching the basics and driving interest.
They semi-recently bought Simple Login which you can provide with your own domain. That does allow you to create unlimited addresses and they’ll all be forwarded to the inbox of your choice. Can also disable any addresses when you no longer want them.
The issue isn’t a big deal for the average user. The vulnerability required them to first get your username and password, physically steal your Yubikey, spend half a day using $10-15k worth of electronics equipment to repeatedly authenticate over and over, they then could potentially make a clone of the key.