They cannot see phone numbers of contacts, no.
They cannot see phone numbers of contacts, no.
Is this deshittification?
They already are.
Ironically, the part of Perl that looks most cursing is the regular expressions, and that’s the feature that so many modern languages have borrowed from Perl directly.
Have you tried doing CAD work on a phone or iPad over a Remote Desktop connection?
Seems unpleasant enough to drive someone to buy a proper laptop to travel with.
If you don’t have a proper computer, how will you access this remote server to do your CAD work?
I imagine BitWarden is sufficiently good. The big leap in security comes from having no password manager to a decent password manager.
LastPass does not seem as serious about security so it doesn’t meet my personal bar for decency.
LastPass doesn’t have your password, so it can’t be stolen during a breach.
But 1Password goes a step further, also requiring a “secret key”, which also can’t be stolen.
https://support.1password.com/secret-key-security/
Even if an attacker manages to steal your encrypted data from 1Password and also guess your master password, they still can’t access your data without a secret key.
For that reason, your 1Password account is more likely to compromised through your own device, not their server. And if your own devices are thoroughly compromised, no password manager can save you— the attacker can potentially grab all you type and see all you see.
I evaluated both BitWarden and 1Password for work and 1Password generally won across the board.
If you host yourself make sure backups are rock solid and regularly monitored and tested. Have a plan for your infrastructure being down or compromised.
1Password’s security model guards against this. Even if they are breached, your passwords cannot be decrypted.
You are more likely to screw up your own backups and hosting security than they are.
I like to manage services maximally with systemd so it was a natural fit for me.
It did not seem difficult to set up web and database quadlets so they are properly networked.
I’ve lived in the US for about half a century and have never heard this.
Or a misguided solution to prevent drug use in public stalls?
I tried a USB KVM switcher. I only recall there were serious issues and it didn’t last long.
Now I use a high quality USB dock and physically unplug/re-replug a work and personal laptop. That’s been a simple and reliable solution.
For my home server, I ssh into it.
OP hasn’t met 17-bean soup yet.
Ghost has a lot of these features as well as being a blog and handling paid subscriptions and donations.
You use an IMAP syncer, like this one:
A word of caution: I professionally hosted email for over a decade.
90% or incoming email will be spam. Anti-spam tools will need regular updates. Backups are also super important.
All things considered, I don’t host my own email anymore although I know all the pieces involved.
There are also some independent email hosts that are good like Fastmail or for extra privacy, Proton Mail.
If the emails live on your server, can’t you use software there to send, receive and search emails?
That is what the article is explaining. The contact names and details are encrypted.
https://engineering.fb.com/2024/10/22/security/ipls-privacy-preserving-storage-for-your-whatsapp-contacts/
Perhaps the call times are exposed but it seems it would be difficult or impossible for them to connect this with a human identity.
Use Signal if you have concerns about WhatsApp.