Skip Navigation

User banner

Schwim Dandy

@ schwim @lemm.ee

Posts
3
Comments
114
Joined
2 yr. ago

  • Sorry for not being clear, I wasn't aware family sharing was even a thing. In my case, everyone is using my credentials to log into and use the games under my account. All the same property so same IP.

  • Pretty sure I'm good. Account email is a forwarder to a family domain and they have access to everything relating to the account. For all intents and purposes, it's just me logging in from the grave.

  • My family plays the games under my account now. I imagine not much will change when I'm dead.

  • I know and consider those to be squarely on the fringe.

  • I don't think major manufacturers ever will make them. We'll continue to get one-off kickstarter-esque fringe phones that'll keep the most devout Luddite happy and the rest of us will buy what we are offered whether we want a dumb phone or not.

  • Man I got so excited about beeper but it just fails to log in to anything I try to set up. FB, sms, anything at all, it successfully logs me in and then hangs on the spinning wheel of death

  • When people complain about new music not living up to old, it just means they've quit exploring and form their prejudices on the pop genre they hear, which has always been the lowest hanging song on the tree.

  • I love the Connect app(Play store link). It's incredibly feature-rich for being so early in the game.

  • Thanks very much for the clarification to the context, I really appreciate it as someone who had no idea.

  • “Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,..."

    I love that proton kept referring to the user as the "terror suspect" repeatedly so we would know they're really the good guy here.

  • No, I reordered the items, then returned without requesting refund, as some helpful commenter suggested here while you were writing your epic diatribe.

  • Thanks very much, that's what we ended up doing. We just reordered the canceled items and then returned them with the "no refund needed" option chosen.

  • lol, calm down there, captain commenter. You're going to blow a gasket.

  • I use forwarders on a domain I own that point to my primary acct.

  • I don't have a business account with them but have had a Prime subscription since Prime became a thing and have to say that something has changed in regards to the support as of late and not for the better.

    Last week, we had 6 orders scheduled to arrive to our house and we got notifications for all that they had been delivered to the office and handed to reception, which we don't have, just a porch and a door. My wife contacted support to tell them and they said they would refund all of the orders without even looking to see where they got delivered to. The support person gave a few different totals, none of which were correct and we ended up having to go through our orders to add up the refund total since he couldn't do it correctly. After all of that a refund was issued..... and then the packages were delivered about 30 minutes later.

    We have been trying for days now to let them know that the packages were delivered so we could be billed correctly but so far, every person we've talked to has said they're allowed to refund but not allowed to charge us and that it had to be passed to someone above them.

    I don't have a lot of faith that they'll figure it out and worry that some day, they'll just cancel our account because they detected some type of fraud.

  • Thanks very much, I believe I understand that part now, like a fingerprint to associate to site components like pulled in js, css, etc. I still don't understand, though, how they associate that to a particular user of a VPN. Does each request done through a VPN include some sort of identifier for each of us or is AI also doing something to put these requests in a particular user's bucket?

  • Anyone have an eli5 explanation of how AITA works? What patterns could be captured and how would that lead to identification or data siphoning?

  • Could you explain how separate emails would increase security risk? I ask because I've used separate emails for absolutely everything and it has only ever helped me with security( if I get a Microsoft security notice to anything other than Microsoft@mydoma.in, I know it's not legitimate).

    I don't mean in lieu of 2fa, strong pass, etc, I mean in conjunction. I don't see how it could hurt.

  • Freetube with sponsorblock enabled foils all of it.

  • My gym does this. I carry one my old phones in my console with nothing but the gym app on it. I turn it on when I park, it connects to wifi while I'm walking in, I scan the code then turn it off and throw it in my bag.