So you’re saying your preferred choice of the two wants to become a dictator but you’re fine with it because you think the constitution will stop him?
If that’s not the case why even cite the constitution.
A Massive Fraud of this type and magnitude allows for the termination of all rules, regulations, and articles, even those found in the Constitution.
He wants to ignore or terminate the constitution.
If Biden dies and his tombstone is running for president, I’d still vote for his tombstone over trump.
Most people just use a package manager the vast vast majority of time. People don’t typically compile from source or figure out different file types.
Checkout goaccess. No additional tracking needed, it just reads your server logs. https://goaccess.io/
Oh I guess, I meant to say is it good for general purpose use alongside gaming.
Is bazzite good for general purpose use also?
Where can I learn more? This is fascinating.
Even worse in my opinion is when you find someone who had the same problem as you and the only person who replies says “use google.” It’s like that’s how I got to this page!
Why do you have Jellyfin and plex?
Any way to opt out?
Yeah I agree, not defending discord just wanted to point out the April fools joke.
I clicked on that, it was actually just an April fools joke, there was nothing to buy.
Oftentimes now if the service is paid, you’re still the product!
I feel like this video is preaching to the choir. No one who is not already concerned about their digital privacy will care about this video, and if they watch it I doubt it would change their minds.
I’m pretty sure that if you had not already been signed in, you would not have been able to use it. As the login page requires an internet connection.
There is a remote vector as well beyond just physical access.
There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.
https://lemmy.world/comment/10932048