Yeah, I was wondering about the drums part in the credits for each song, because it seemed odd to have different names for each drum set. Is it just a different setup and you give it a name?
Apparently not well enough. There's enough videos online of people trying and failing to shoot at drones that it's a sort of well-proven fact that until a drone is VERY close, like 30-40 feet is my guess, it's out of buckshot range. The war in Ukraine has really shown what countermeasures work and what don't.
Rednecks have already proven that is hard bordering on impossible to safely shoot down a drone. Short of using drone-specific countermeasures, you might as well be using a butterfly net.
This is actually the right answer. Russia invaded Crimea in 2014, and we're all still in the middle of what is essentially a no-declared-sides WWIII now. 2015 was good, but things had shifted in the world a bit. Countering China was starting to become a huge deal suddenly for the US, and China moved into the South China Sea and did some currency revaluation that was all aimed at their 2029 and 2049 CCP anniversary goals.
Their Contributor Quality Score is basically the social media equivalent of a Social Credit Score. Not like karma, it's a whole other system that demands you produce content for them or get shadow banned. It's bonkers.
OK. Well, respectfully, I think it would be beneficial to find out more about how encryption, email servers, and encrypted messaging works. I think you're quite confused about the details here, and just getting a sense of the parts will help you in the long run. People use email differently - I don't use FB, so my main means of communication with family that is not Signal messages is email.
By "just use signal" I mean for sharing a password for a password protected email. Which you should only be sending to people you know already and can coordinate with. You're not sending password protected emails to random people or the government because it's not necessary for the reasons I explained earlier. If someone needs an encrypted message from ANYONE they will provide the method. Otherwise, they don't want encrypted messages and can't be trusted with data that should be encrypted.
Proton is secure, and I know because I had an old account I wanted to get access to and lost access to the recovery email, but had one on the same domain. I spent about a week doing back and forth emails with some guy who was trying to ask me to verify aspects of the account, which was my spam shield and dummy social media account and I hadn't used it for about a year. All he could see, when pressed, was header info: sender/receiver, date, time, ip address, sending agent. All things that are needed to route the message. It ended up being me able to confirm IP address and sending agent and access (I sent an email to my recovery address from an IP in this range on this date, last logged in on on this date, etc.). It was a pain for both of us.
I think it's because she's retired and it's more like "no more new friends." She and I both started on Windows 3.1 (I did the Win 95 install), so the last time she was exposed to a Mac OS, it was System 7 on a Macintosh Performa in 1993. Maybe she just thinks she's too locked in, I dunno.
Edit: I listened to your whole album and it's great. Reminds me of the early 2000s Fat Wreck Chords era when punk was honest and real, but also fun. Like some NoFX/MXPX stuff plus shades of this band named King Kong but louder. Thanks for linking to it!
So all that billions of tons of carbon we dig up from the ground, sequestered for 300 million years, doesn't just make it's way back there?
Well fuck!