My understanding is that Edge is Chromium and will also eventually be impacted by this.
My understanding is that Edge is Chromium and will also eventually be impacted by this.
I believe it’s only required during the pairing process, but as the other observer pointed out, I don’t know much about it. If you’re able to circumvent the process, more power to you!
Sure, removing your network from the equation is definitely a more secure option; just make sure the app isn’t using those granted permissions in the background when you’re done using it and log back into your network.
I also used GSuite for a long time. Its betrayal of its users is a big part of why I switched to Proton. Much better UX.
I knew that someone would try to convince me. You won’t convince me.
… Though your argument is pretty compelling.
I remember when Bluetooth started demanding location permissions. You’ll never convince me that it’s functionally required or provides any benefit other than furthering efforts to spy on the user.
When it started being rolled out, I avoided any app or hardware that made that demand. Sadly, that’s no longer an option if I want any Bluetooth at all.
I haven’t done an extensive survey or anything, but every modern router I’ve interacted with supports setting up a secondary WiFi network with guest isolation (so anything on that SSID can’t see any network device besides the router and itself). This is useful for apps or hardware that is untrusted and/or demands unjustified permissions.
I used it all the way up until Google broke compatibility with it, then continued using it with a third party plug-in until that stopped being maintained.
Now I prefer Signal over Chat.
If they’re a pain in the ass I think you might be wearing them wrong.
I’m familiar with it from the aforementioned class, but thank you. I’ve just never seen it used.
I haven’t seen EBCDIC used anywhere other than the curriculum of my “Fundamentals of Programming” class 25 years ago.
I wish I could just “set aside” a billion dollars.
For anyone who is not familiar, your day would surely be improved by watching the Map Men video on this topic.
He draws similar conclusions in his video.
It is, I just watched the video an hour or so ago.
edit: In fact, until I read this thread, I didn’t notice the URL and thought this was a link to the video.
For users of Gmail, I can confirm this works and you can even set it up so that address+nameofshop goes to a folder called “nameofshop.”
You can also apparently add a dot anywhere before @gmail.com and still receive the email. I haven’t tried this one, but the last time I mentioned this someone said it was part of the email standard, so presumably it works.
I don’t know of tricks specifically of this vein for proton mail, but I do know you can setup a catch-all address so, for example, something addressed to invalidaddress@domain.com goes instead to spam@domain.com.
I’ve not tried SimpleLogin, but apparently it offers similar functionality.
In one post, you summarized the majority of the CCP course I took a few years back.
I don’t know any but I’m now of the opinion that they should be reassigned to Superman.
Same! The two straws that broke the camel’s metaphorical back were the stupid functionality of the search bar in the start menu; and the beginning of the removal of local accounts.
Fingers crossed.