Does it give high (≥ 1080p) quality in browser without widevine? Good way to check is firefox. It shows a handcuff sign near the address bar.
Does it give high (≥ 1080p) quality in browser without widevine? Good way to check is firefox. It shows a handcuff sign near the address bar.
Do you use nebula? Do you know if it uses DRM? I’m considering a subscription for a while but couldn’t find proper answer for that.
I wish I could rely on Patreon and user funding only. That would be the dream, and if Patreon reached the same amount of money monthly as YouTube ads, I would disable ads on my channel (if that’s still even possible?). The reality though, is that we’re not even close to that yet, and so for now, I need ads, and sponsors to pay the bills.
from https://thelinuxexp.com/Ethics
so it is not the case always.
Though IMO if I don’t act based on an ad, the purpose of the ad is defeated and hence effectively the ad is blocked. There are ways to ‘clickjack’ or ‘show’ ads without actually seeing it, my proposal is a simplified version of that. I have never done those ‘ad viewing’ tricks because they are complicated, and probably not suitable for people outside the tech bubble anyway. Also disabling blockers like ubo on a regular browsing session for any website has privacy and potentially security implication, not to mention requirement of using a non blocking dns for the said session.
Patreon is great, I’m talking about the gratis option. I personally have no ‘guilt’ regarding ad blockers and I don’t remember last time I saw ad (except on other people’s devices) online1. The question was about convincing people to use ad blocker or alt clients who do not want to or can’t afford to pay creators directly.
1 excluding sponsorship in videos… I do not use sponsorblock and I found sponsored contents from some channels useful.
I find TV annoying for a while. Though not adhd specific but background music (any music, not the ‘chill beats’ lol) can help focus sometimes for some, including me.
I kinda liked the app. A while ago I had access to a machine with base image containing paint 3d. I used to play with it sometimes when I’m boared and connected to that computer. Needless to say I didn’t do any 3d works in it though.
Edit: I didn’t provision it so don’t know if that was intentional or came with windows installation by default. These were some throwaway test machines so nobody cared.
Afaik steam deck doesn’t have a gps module. You’ve to get any of their identifying information.
What you can do is perhaps sending memes with different cannery token redirects for each worker. Send them around when the device is being used. That way you can compare the grabbed ip with steam log and see which worker’s match. As the deck doesn’t have sim they either will use home wifi or mobile hotspot. Both will work this way.
scaled by system/themselves … looks like those are x11 apps. why is firefox into this? run it as native wayland with MOZ_ENABLE_WAYLAND
I’ve a suggestion that might work depending on how honest the perspn hiring the worker is and on their contract. You can tell the person to send some questionnaire or feedback form etc to all of them which will track their ip and name/email (say unique form per worker). Then you can match the ip, as home ips are mostly static for short duration. Tell them to send the form at night or sometime when they’ll be at home and give it a short deadline.
the bad guys use bots or services and are done. regular users have to endure while no security is added
put in other words, common users can’t easily become ‘bad guy’ ie cost of attack is higher hence lower number of script kiddies and automated attacks. You want to reduce number. These protections are nothing for bitnet owners or other high profile bad actors.
ps: recaptcha (or captcha in general) isn’t a security feature. At most it can be a safety feature.
stopping automated requests
yeah my bad. I meant too many automated requests. Both humans and bot generate spams and the issue is high influx of it. Legitimate users also use bots and by no means it’s harmful. That way you do not encounter captcha everytime you visit any google page, nor a couple of scraping scripts gets a problem. Recaptcha (or hcaptcha, say) triggers when there is high volume of request coming from same ip. Instead of blocking everyone out to protect their servers, they might allow slower requests so legitimate users face mininimal hindrance.
Most google services nowadays require accounts with stronger (like cell phone) verification so automated spam isn’t a big deal.
And what will you do if a person in a CGNAT is DoSing/scraping your site while you want others to access? IP based limiting isn’t very useful, both ways.
hCaptcha, Microsoft CAPTCHA all do the same. Can you give example of some that can’t easily be overcome just by better compute hardware?
If you need to switch without reboot then dual booting is out of question and hence so is Asahi. Asahi is for running linux on apple hardware. In VM you can run anything; drawbacks include non native performance, can’t directly use touchpad, gpu and other hardwares, it’s still running macos underneath which might be a concern of privacy depending on how much you trust the proprietary code by apple, not using free software stack etc.
There isn’t a good way to classify human users with scripts without adding too much friction to normal use. Also bots are sometimes welcome amd useful, it’s a problem when someone tries to mine data in large volume or effectively DoS the server.
Forget bots, there exist centers in India and other countries where you can employ humans to do ‘automated things’ (youtube like count, watch hour for example) at the same expense of bots. There are similar CAPTCHA services too. Good luck with those :)
Only rate limiting is the effective option.
The objective of reCAPTCHA (or any captcha) isn’t to detect bots. It is more of stopping automated requests and rate limiting. The captcha is ‘defeated’ if the time complexity to solve it, whether human or bot, is less than what expected. Now humans are very slow, hence they can’t beat them anyway.
both can be installed side by side if you have enough disk space.
unless brute force was done, it might be a cold boot, usb exploit or bootloader exploit by physically accessing the storage.
OpenVMS: ‘I’m in trouble’