84 Matching Annotations
  1. Feb 2025
  2. Dec 2024
  3. Jun 2024
    1. Personality: Innovative: Always at the forefront of technology, Chrome continually evolves to provide cutting-edge features that enhance user experience. User-Centric: Chrome prioritizes the needs of its users, offering tools that are intuitive, customizable, and easy to use. Reliable: Renowned for its stability and security, Chrome ensures a seamless browsing experience, giving users peace of mind. Empowering: Chrome’s features are built to empower users to do more, whether it’s productivity, entertainment, or exploring new territories. Inclusive: With built-in tools like Google Translate, Chrome breaks down language barriers and fosters a more connected global community. Tone and Style: Fun: Engaging, light-hearted, and approachable. Chrome isn't just a tool; it's a companion in your daily digital journey. Helpful: Guidance and support are key. Chrome assists users in achieving their tasks with ease. Future-Looking: Always ready for what’s next, constantly pushing the boundaries of what's possible with a web browser. By embodying these characteristics, Google Chrome stands out not just as a browser, but as a trusted enabler for users to explore, connect, and get things done.

      This is atest from Sheeraz

  4. May 2024
    1. In Deutschland werden durch das LNG-Gesetz Überkapazitäten für den Import von Flüssiggas geschaffen, wobei gleichzeitig bisher geltende Regeln für Umweltprüfungen außer Kraft gesetzt werden. Francesca Mascha Klein kommentiert diese Entwicklung und weist darauf hin, dass der LNG-Ausbau den Klimazielen deutlich widerspricht und auch durch seine erheblichen internationalen Auswirkungen, z.b auf das fracking den Weg in die klimakrise beschleunigt

      https://taz.de/Streit-ueber-LNG-Terminals/!5934569/

  5. Apr 2024
    1. I get a new ClientID for every session, is there a way to make it static for a peer accessing the document?

      Would be nice to have truly unique ids. E.g., a public key.

      Eats more space, but can be zipped over the wire. Given there are many ops transferred.

      Also could be possible to create pubkey -> int mapping per-document, so it's damm more compact. That would require consensus on this map.

  6. Feb 2024
    1. Harold Abelson, Ross Anderson, Steven M Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G Neumann, Ronald L Rivest, Jeffrey I Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso, Bugs in our pockets: the risks of client-side scanning, Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyad020, https://doi.org/10.1093/cybsec/tyad020

      Abstract

      Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy—in the sense of unimpeded end-to-end encryption—and the ability to successfully investigate serious crime. In this paper, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society, while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which CSS can fail, can be evaded, and can be abused.

      Right off the bat, these authors are highly experienced and plugged into what is happening with technology.

  7. Dec 2023
  8. Oct 2023
  9. Jul 2023
  10. May 2023
  11. Apr 2023
  12. Mar 2023
  13. Feb 2023
  14. Jan 2023
  15. Dec 2022
    1. Dilemma: Do I use this unofficial library with its really nice idiomatic API or the official library (https://github.com/mailgun/mailgun-ruby) with its inferior API?

      I wish this one was still/better maintained because I'd much rather use this API, like: @mailgun.lists.create "devs@your.mailgun.domain" @mailgun.lists.list @mailgun.lists.find "devs@your.mailgun.domain"

      but it's not maintained, and looks like it doesn't have the word events in the source at all, so it's missing any way to use the Events API. :(

  16. Nov 2022
  17. Aug 2022
  18. May 2022
  19. Feb 2022
    1. Sending secure email is one of the questions we hear more and more. This is a result of an increasing number of email security risks, hacks and other threats. So you're not the only person wondering, "How to send secure email in Gmail? (or any other public email service for that matter?") You'll find the answer in this article. This article concludes with a link to a free encrypted email service First check whether you meet the conditions.

      How to send secure email (in Outlook)? Sending secure email is one of the questions we hear more and more. This is a result of an increasing number of email security risks, hacks and other threats. So you're not the only person wondering, "How to send secure email in Gmail? (or any other public email service for that matter?") You'll find the answer in this article. This article concludes with a link to a free encrypted email service First check whether you meet the conditions.

  20. Jan 2022
  21. Jun 2021
  22. May 2021
  23. Mar 2021
  24. Jan 2021
    1. Save time with AutomationsAutomate the repetitive work in seconds so you can avoid human error and focus on what matters

      It gives the impression of software that its highly automated which implies that it is good for client for who want to save time and manage team members easily.

  25. Nov 2020
  26. Oct 2020
  27. Sep 2020
  28. Jul 2020
  29. Jun 2020
  30. May 2020
  31. Apr 2020
    1. There are, indeed, at least two projects independent of us, which are developing software that can read 1Password data (once you’ve given them your Master Password.). James Brown (@RogueLazer) has developed some Python libraries which can – given the Master Password – read both the Agile Keychain Format (1Password 2 and 3 for Mac, 1Password for Windows) and the Cloud Keychain Format (1Password 4). Indeed, RogueLazer’s efforts and queries have led to substantial improvements in our documentation.
  32. Feb 2020
  33. Dec 2019
    1. If your only reason for using Axios is backward compatibility, you don’t really need an HTTP library. Instead, you can use fetch() with a polyfill like this to implement similar functionality on web browsers that do not support fetch(). To begin using the fetch polyfill, install it via npm command: npm install whatwg-fetch --save
  34. Sep 2019
  35. Oct 2018
  36. Mar 2016
  37. Nov 2015
    1. Mbembe points out that often thefunction of awarding infrastructural projects has far more to do with gaining access to governmentcontracts and rewarding patron-client networks than it has to do with their technical function.This is why roads disappear, factories are built but never operated, and bridges go to nowhere.

      Sounds like scheming for political gains.. This is easy to see in the work place or society when one befriends another or joins a certain group for political/hierarchal benefits rather than for the pure purpose of the action. African societies cannot be the only ones who follow these functional implementations of these infrastructural projects.

  38. Nov 2014