This, but backtrack 5 (the one just before kali). On a laptop that’d take several eternities to brutforce an md5 🤣
This, but backtrack 5 (the one just before kali). On a laptop that’d take several eternities to brutforce an md5 🤣
Reminded me one of the vids of f4mi, although that ladiy’s approach is far more beautiful. Basically, she took advantage of ai scrapers relying on subtitles and YouTube allowing for pretty advanced styling of those very subtitles to insert garbage that only bots will see.
To those interested in the details, https://www.youtube.com/watch?v=NEDFUjqA1s8 (selecting a working invidious instance is left as an exercise for the reader)
Quite simple, actually. If you want to do a thing that violates a law, you modify the law to allow the thing.
Innovative as always, I see.
Codeberg is a forgejo instance, yes
You sure? To me some of the other options look more convenient, so to say, especially if you tend to watch stuff while away from home :)
As a Russian, fuck those assholes and the shithole they’re operating.
Please, just don’t. At least unless there’s a reasonably not shady ROM on XDA that you feel comfortable flashing.
A recent report from Stanford University in the US, published in the journal Nature Communications, found that recycling lithium-ion batteries is far more environmentally friendly than mining for new materials.
Huh, who knew
Riiiiight, a chromium fork with questionable crypyo and a history of even more questionable decisions (referral scam or not blocking all the trackers, for example) is better than a non-chromium non-fork with no crypto and a history of questionable decisions.
As always, the answer is “depends”. It shouldn’t hurt unless you’re dual-booting windows (they used it last year as a weapon in their “mess up grub” game), but, Imo, it’s worth the trouble if:
So, a lot of ifs, and a necessity to store the uefi password somewhere safe, as those may be a pita to reset.
As for standalone stuff – idk, it might protect you from malware injecting itself into the bootloader or something, but given there’s likely no chain of trust (I.e. the bootloader doesn’t check what it bootloads), it can move in on some later step.