all public bodies must disclose the source code of software developed by or for them, unless precluded by third-party rights or security concerns
So this effectively changes nothing.
all public bodies must disclose the source code of software developed by or for them, unless precluded by third-party rights or security concerns
So this effectively changes nothing.
Thank you so much for the continued updates!
Something about the fixes for usernames not showing up appears to have undone the fix for #122. I can see my username in plaintext for the current account even though I have hidden the display names.
Installing by piping from curl is pretty common and not a red flag in and of itself. Even Rust is installed this way. If you don’t trust the URL, you also shouldn’t trust any binary installers downloaded from that website.
Black body radiation was my thought as well. It may not be the average including the inner layers, but it’s the average at the crust. About -1°F according to Wikipedia.
To add to this, is probably hard because the composition of the interior of the earth is a lot of guesswork. We can only directly observe how much heat is coming out of it.
Android and iOS don’t let mobile apps run continuously in the background. If an app is closed or in the background, it generally can’t talk to its own servers.
Instead, Google and Apple provide a service that allows the apps’ servers to push a message even if the app is closed.
If you take out the employer-side taxes and cost of benefits, maybe. A fair number of their employees must be software engineers, and that much compensation isn’t unreasonable for expert software engineers.
Where does the initial cryptographic verification come from? I’m not arguing that you can’t pin certificates.
There is no way a user can know the website is real the first time it’s visited, without it presenting a verifiable certificate. It would be disastrous to trust the site after the first time you connected. Users shouldn’t need to care about security to get the benefits of it. It should just be seamless.
There are proposals out there to do away with the CAs (Decentralized PKI), but they require adoption by Web clients. Meanwhile, the Web clients (chrome) are often owned by the same companies that own the Certificate Authorities, so there’s no real incentive for them to build and adopt technology that would kill their $100+ million CA industry.
I have GPay and I frequently get notifications telling me to claim their reward points. Those notifications aren’t configurable separately from the payment notifications at the OS level. Super annoying.
If you expose port 80 on the PiHole service, can you login? Are you certain it’s a problem with Traefik? The PiHole could just be having problems.
You might also look into the 302 redirect that PiHole does upon login. It might not play nicely with Traefik.
Can confirm. This recipe is very good.