End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
End to end doesn’t say anything about where keys are stored, it can be end to end encrypted and someone else have access to the keys.
At least where I was, when it came out it was $5 for the ‘six-dollar burger’, almost immediately after they threw in a bunch of other ‘big’ burgers. Odd that they tried to makr a 1/3 pound burger seem huge when McDonald’s (at least in America) had been offering double quarter pounders for longer than I can remember.
Jitsi was a pain for me to get working the way I needed it, but I have to say I’m a fan so far. I haven’t used it too much yet (mainly just testing with myself from various networks/devices), but from what I can tell it’ll work for my use (replacing Google Meet for my family chat uses).
I totally apologize if I’ve caused you some distress with my views and words. After reading through the article, I didn’t see any rule listed. Could there be one, sure why not, I didn’t see it and my attention got pulled away by the teachers ‘feeling’ being quoted as holding so much weight in what should have been an open/shut case of ‘is X prohibited from being used?/Was that communicated properly?/Was it understood?’
If my words offend or frustrate, I truly apologize and I hope you have a wonderful weekend!
Where was it against the rules and do you have proof beyond the weak assumptions made in the article? Aside from sources that didn’t exist, or citing their use of Grammerly (oh shit, I should cite MS word too because it suggested a synonym so my paper would be more ‘concise’ lol), I’m not seeing much proof. The teachers testimony was largely based on the fact one AI said the other paper had portions of AI generated content, and her feeling like 52 minutes on the final paper isn’t enough. I spend way less than 52 minutes on my final drafts because it was largely just copying/pasting shit from my rough drafts and maybe deciding to reword.
At the end of the day though, we are all making some leaps in our judgement. Allowing the use of AI at the school, then getting pissed at some bs being submitted is like allowing students to use calculators then blaming the student for not being able to show their long division.
I mean if it wasn’t against the rules, I don’t think they should ‘punish’ for it. Then again, I got in trouble for using AskJeeves and DogPile, so I’m a bit biased about new tech and the requirement to give proper instructions to kids (not everyone is great at reading between the lines).
Came back to drop a link (sorry for the delay) and it seems others have already provided it. Dropping it here again just because it’s an amazing talk by an amazing dude that was taken too soon.
Excellent point! Yet another reason why Linux isos should always be torrented!
You’d be surprised how insecure they are (or were) from the non-physical side. Check out Barnaby Jack’s talk from DefCon 18 (Jackpotting Automated Teller Machines Redux).
Less that the meme is older than them, probably more so they don’t realize why we torrent Linux iso’s.
I can pull down an ISO in seconds over torrent, whole it takes minutes over https. Also it’s nice to add some of the good stuff to the traffic, if only to pad all the illegal traffic with some legitimate stuff.
Someone tried to send me a picture they took and it looked like hot garbage until they sent it over email. Not because it couldn’t be sent without feeding it through a potato first, because Apple wants a worse experience for anyone not in their ecosystem.
When they are the oddball in the group though, it just makes iPhone’s look like a worse option.
Some employees create sym links in their OneDrive folder back to other folders… Instant VC for all those pesky junk files
deleted by creator
deleted by creator
deleted by creator
deleted by creator
This totally isn’t what you’re asking for, but I absolutely love the 8bitdo adapter 2 thing (https://www.8bitdo.com/usb-wireless-adapter-2/) pair your DS4 controller to it and then just plug in the dongle. I haven’t found anything it doesn’t work on, but mainly I pop it between a pi3, pi400, and my LMDE desktop.
So handy.
I’m pretty sure the key is stored on the device, which is backed up to Google. I cannot say for sure if they do or don’t backup your keyring, but I feel better not using it.