

Wow, what a trustworthy source, not attention seeking at all.
Wow, what a trustworthy source, not attention seeking at all.
I hope you’re at least over 40! The generally accepted healthy maximum age gap is half the age, plus 7. That’s not scientific, but what most people find acceptable in others.
In the case of Leo, it’s not just the age gap but the power imbalance due to his wealth. That imbalance is partly why so many celebrities sate other celebrities. The other is PR and also their schedules. It would be difficult to maintain a regular job and have a relationship with someone who travels for work, months at a time. It’s similar to military families, now that I think about it.
Lol, no. He has wealth and fame. It’s not a meeting of minds. It’s loneliness.
The older he gets, the more the distance will be between them, with each new young woman.
For some men, that’s their ultimate fantasy. But only if they never see the partner as an equal or anything more than a possession or toy to use.
Eventually, hell be less desirable, but still wealthy, and we’ll have an Anna Nicole Smith situation.
However, nobody seems to be being hurt at the moment…it’s all consensual and everyone goes in eyes open. It’s just sad.
I didn’t, but a friend did and loved it. I’ve heard the os was great. I’m not upset it died. Competition is good, but I don’t think Microsoft would have been good competition. I just wish someone else had taken the mantle.
Android started out great. It has jest become perverted into a tracker with less freedom.
I wonder if PCs are getting fast enough to do everything that the opposite can happen. Older hardware and free software is as good or better than proprietary with new software. So, even with subsidy, they can’t turn the screw. The problem with mobile is the lack of a competitor, and the duopoly.
Even Microsoft could not break it. If Linux mobile can port over all android apps seamlessly or easily for devs, with lower fees, then it has a chance. Microsoft paid devs to put their apps on the windows mobile store but even that wasn’t enough.
Similar to windows, the more they turn the screws, the more people want to leave. There is a boiled frog effect but eventually lots of the frogs die in that analogy, turning off the cash spigot.
Unless other people find it interesting, or they want to vent, not complain.
Even then, they don’t do a DNA test, usually. So, assumed/assigned gender at birth reveals.
Yes, but with some studies to back it up.
Riot? Insurrection, coup?
I think both narrow and thin are relative, rather than absolute terms. It’s a country, not a pipe.
No client side hashing is possible and secure.
If you look at sending plain text under SSL, it’s almost the same thing.
The password hashed under a mutually known algorithm that is not reversible is just as good as the plaintext.
What’s particularly interesting right now is manipulation of data that is encrypted to allow the same output (encrypted) as unencrypted data.
The point of sending hashes info from the client is that each site uses a different key, even if publicly available. This means that leaked login data cannot be compared or matched across different leaks.
The client doesn’t confirm the hash. The client hashes and sends the hashed data. The server confirms.
Omg, how do you know my login? ;)
It only helps if log in details are siloed. The storage space taken is negligible.
It’s also possible to hash client side, so that the log in process does not access data, like the email but just confirms matching hashes for received data.
The email can be stored in 2 parts in the database. One hashed as a login and once as an email address to send to.
Sure, if your database is compromised, it’s still public but it still makes the log in process more secure.
Given many people use the same password.on many sites, it can allow the bad actor to “guess” their password based on data from other leaks.
Then whatever is inside that account may be accessible, such as financial info. Even protected data like cc info might show the last 4 digits, which can be used when talking to an agent to verify identity etc.
Haha, I don’t trust my own server either, but I don’t trust anyone elses even more.
Vaultwarden
So pyramid schemes on both sides?
Payment info is a good use case for 2fa though. Personally, I use vaultwarden to hold my payment details. Open source and I choose my log in requirements, although 2fa is required at least once. From then on, fingerprint on my phone is fine or pin on a browser.
Or juice, lol.