That seems like a perfectly reasonable thing to do, very different from allowing "notifications and messages to disrupt their sleep".
darklamer
Some even allow notifications and messages to disrupt their sleep.
WTF is wrong with people!?
The developer said he forgot that his secret keys were in the repository.
If you have your secret keys in your repository you've already fucked up, long before you accidentally make that repository public.
I would really want to have a really good open source SFTP (SSH File Transfer Protocol) app, with good secure key management and excellent transfer performance. So far, I haven't found any such app.
“These features and experiences need to be trained on information that reflects the diverse cultures and languages of the European communities who will use them.”
No, they do not, these features and experiences don't need to exist at all.
I don't really see the big problem here?
The primary problem in this story is the lying. If there are Bluetooth earbuds in the box then it should say Bluetooth on the box.
However sometimes people don't realize which community they are in and they just look at the title.
Guilty as charged. After reading the title it didn't even cross my mind that it could possibly refer to anything other than mobile apps so I saw no reason whatsoever to look at what community it was posted in as the app I came to think of as a good recommendation is cross platform.
Yes, it is.
I've been running my own mail server for decades now (a quite odd hobby, I know) and that's not to be recommended for anyone who doesn't have a particular interest in e-mail. SMTP is from the early 1980s with roots in the 1970s and has had layer upon layer bolted on since then. It's a fantastic mess.
When I finally learned about Pocket just a few years ago it surprised me greatly that I didn't know about it before and now I use it daily:
I would like to suggest that anyone who in the year 2024 insists on you communicating with them by fax can't be trusted and your best solution is therefore to stay away.
In general, no. Most malware that runs its own process simply uses some name intended to make you not notice it. But it is possible, in Linux just as in every other operating system that ever existed, to imagine that some unusually sophisticated malware manages to exploit some unknown vulnerability to gain full control of the kernel and then all bets are off, then it would be able to do anything.
Hey, I've seen this movie — having to explain that actors pretend to do things that aren't actually real was the plot of Galaxy Quest!