![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/cd304a0c-e258-4a87-86cd-7ce21eb70191.png)
I passed my first audit last week. I know exactly what it entails.
I would have expected Proton to have had this certificate a while ago.
kudos on them passing the audit though.
Do not trust anything I write down. I have this horrible habit of not checking sources.
I passed my first audit last week. I know exactly what it entails.
I would have expected Proton to have had this certificate a while ago.
kudos on them passing the audit though.
They didn’t have 27001?
edit: typo
Did not yield the results I was anticipating on DDG
We and our 170 partners store and/or access information on a device, such as unique IDs in cookies to process personal data.
no thank you
Take a flat screwdriver and moubt it on a vice. Take your angle grinder, mount a disk for metal grinding. Grind away the middle of the flat screwdriver head. Done it before for the exact same purpose.
Grind a flat
Didn’t know I wanted this
Desexed? Like … castrated?
My windows are always closed and I always play the radio. Not gonna change for whatever scenario
I found dating apps may be helpful. I’m personally partial to romeo as I trust it most in terms of privacy over grindr.
I’m not a person who goes out a lot to parties or dancing.
Key Points
GitHub search manipulation: Attackers create malicious repositories with popular names and topics, using techniques like automated updates and fake stars to boost search rankings and deceive users.
Malicious code is often hidden within Visual Studio project files (.csproj or .vcxproj) to evade detection, automatically executing when the project is built.
The attacker had set up the stage to modify the payload based on the victim's origin, checking specifically if the victim is based in Russia. At this point, we don't see this ability activated.
The recent malware campaign involves a large, padded executable file that shares similarities with the "Keyzetsu clipper" malware, targeting cryptocurrency wallets.
The malware establishes persistence on infected Windows machines by creating a scheduled task that runs the malicious executable daily at 4AM without user confirmation.
Developers should be cautious when using code from public repositories and watch for suspicious repository properties, such as high commit frequencies and stargazers with recently created accounts.
edit: formatting
Til you can collapse on viagra
That’s because the farmers now get a fair price for their harvest, right?
Yes, it’s called droid-ify. It’s on the official F-droid repo and is fully FOSS.
I installed droid-ify, an alternative front-end for F-Droid, it comes with a whole bunch of repo’s by default.
My 2 cents, don’t wear anything under the leggings. They are designed for moisture transport away from you. Anything under them will trap moisture and be bad for you or negate the function of the leggings. I found, in cold weather, I put shorts over them.
I could be wrong, and please correcte if I am. Wasn’t this the playbook of a certain party in the 1930’s in Germany?
The cars were too cheap, right?