Can someone explain to me under what circumstances would using an old phone be risky (under a common reasonable threat model)?
Can someone explain to me under what circumstances would using an old phone be risky (under a common reasonable threat model)?
MS Excel
This, so much this
You won’t believe it, I got up and went for a run! Yay!
ProvingNetflixshouldcouldbereplacedoutdoneby five hard working people.
Complete and unrestricted access, following a court order, to the data they have access to, this does not include the contents of your emails or the files in your drive, which are e2ee.
Last time I read about something like that was them giving away an email address iirc.
It takes some time to get the ears accustomed to the weird vowel shapes but with a libretto it’s easier!
Uh, cooking…
I still write like an 8yo :F
I think this doesn’t depend on whether they wfh or not, but I don’t manage people
Work by setting goals, that’s the true essence of smart working I think
Yeah, I’ve come across MusicBrainz projects and they all seem really nice! I was thinking about organizing just the names and not the files, but might as well go that way sooner or later
Seems nice, thanks! I’d like to give it a try
Is there a (possibly libre) way to maintain a structured music library not tied to a streaming service??
I would happily leave but I fear for my huge library of artists and albums that I have discovered…
Feeder has a “card” layout if I’m not mistaken
Yeah that’s what I do as well, also to reduce radiations and whatnot
Missed a class years ago with my first “smart” phone, I won’t take my chances again…
Hardware alarm so I could turn off my phone at night…
A python file named in CamelCase?!
I get it about malicious apps but what about just using mainstream apps and surfing the web with adblockers?