deleted by creator
deleted by creator
Yeah me neither. I don’t think they understand the consequences of their own actions either. All that matters to them is “USA bad, <random pro Palestinian country> good”. They’d probably also burn down the fields in a country they import their food from.
First of all: Sorry to hear that, this sucks!
Regarding your digital information: I’d suggest you to get a new email and gradually replace the old one in your accounts to avoid spam. Even though they claim your password wasn’t stolen, I’d highly suggest you to change your passwords anyway, just in case. Also, as they say, be very careful about potential phishing attacks.
As for your personal information such as your address: I’m afraid there’s not much you can do. I’d argue, however, that it’s not as valuable to potential hackers. One potential scam involving stolen addresses is sending purchases made with a stolen credit card to your address and asking you to forward it. Don’t accept deliveries you didn’t expect for this reason (depending on your local law it may lead to criminal charges against you, even though you’re still technically the victim of a scam).
No Forking: You may not create, maintain, or distribute a forked version of the software. Lol 💀
deleted by creator
deleted by creator
It Feels Almost Like Android… But It Isn’t
So what is it?
Shit gets weird when the guy in 418 opens and claims to be a tea pot…
Sometimes you have to learn the hard way…
AbstractExtensibleMarkupLanguageHypertextTransformerProtocolRequestFactorySingletonBuilderDecoratorDelegationStrategyDispatcher
Which language uses these signs? It truly looks like some kind of alien language
Goose Farmer - Remote
Genuine question: How can an ISP detect that someone is downloading illegal material if the actual content is encrypted using SSL/TLS? Is it all approximated based on the domains/IPs and the amount of data that is sent? If they can’t tell with a 100% certainty, can it be used as proof when trialed in court?