Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TH
Posts
8
Comments
863
Joined
2 yr. ago

  • I got a privacy update for Gmail tools too. It used to be to enable smart tools you needed to allow google to read your email. That does stuff like automatically add calendar events for flights and such.

    Now you must also allow the email to be read by their AI services too. I can’t recall precisely how it was worded, but it was an easy decision to keep the “smart” features off.

    I mean, I really just use Gmail as the email address I give to sign up for sites and such, but would be good just not to have it one day.

  • Also in Norway. Can generally see my FL in one or two days. He is always on time and takes good care of me. I can also just send a message for many things. Legavakt is nearby if something major comes up. My daughter’s experience is closer to yours and she too has seen private a few times. Good to have options.

  • You could say also they’d rather select that than a qualified “person”. Should no opposition ever run again? Or is it clear that she was not chosen because of her gender? Maybe so, but that feels to me like it completely overlooks that there could be anything about her personality or positions responsible.

    I’m not comfortable saying AOC or any other woman is a non-starter because other women have failed. A lot of people have failed before and at some point perhaps one will be selected. I think she would be a good choice, and more appealing to many than Kamala, I suspect.

  • they also feel like there is no country as good as Norway and everyone must really want to be Norwegian.

    I haven’t experienced that in the many years I’ve lived here. It is a humble group of people, seems to me. They also have tons of love for the other Scandinavian countries. You paint a picture of stuck up nationalists, and that’s pretty far from the truth.

  • By denying access to resources in a primary region, one might force traffic to an alternate infrastructure with a different configuration. Or maybe by overwhelming hosts that distribute BGP configurations. By denying access to resources, sometimes you can be routed to resources with different security postures or different monitoring and alerting, thus not raising alarms. But these are just contrived examples.

    Compromising devices is a wide field with many different tools and ideas, some of which are a bit off the wall and nearly all unexpected, necessarily.

  • Disabling network security and edge devices to change the properties of ingress can absolutely be a component of an attack plan.

    Just like overwhelming a postal sorting center could prevent a parcel containing updated documentation from reaching the receiver needing that information.