

Of all the comments asking you legitimate questions, this is the one you chose to reply to. Says a lot, unlike your reply.
Of all the comments asking you legitimate questions, this is the one you chose to reply to. Says a lot, unlike your reply.
Add it to the list of crimes.
User @brickfrog@lemmy.dbzer0.com explained the differences pretty well in this comment.
Does Bernie Sanders come close, in your opinion?
Your AI generated summary, again, lacks evidence. I asked for a site, or a source where what you claim credibly happened, not just repeating the same myths in a circular series of arguments.
I used no AI. Had you actually paid attention you’d see that I cited my source in the first link. The summary I posted it a direct quote from that source. Just because you don’t like what you read that doesn’t automatically make it AI slop.
I don’t feel like refuting any of your other, unsourced assumptions. Good luck with your beloved Windows 7.
It’s called a Drive-by Compromise:
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. Multiple ways of delivering exploit code to a browser exist (i.e., Drive-by Target), including:
A legitimate website is compromised, allowing adversaries to inject malicious code
Script files served to a legitimate website from a publicly writeable cloud storage bucket are modified by an adversary
Malicious ads are paid for and served through legitimate ad providers (i.e., Malvertising)
Built-in web application interfaces that allow user-controllable content are leveraged for the insertion of malicious scripts or iFrames (e.g., cross-site scripting)
Browser push notifications may also be abused by adversaries and leveraged for malicious code injection via User Execution. By clicking “allow” on browser push notifications, users may be granting a website permission to run JavaScript code on their browser.
It’s not Hollywood fantasy, as you claim. It is a well documented attack vector.
Yes.
Yes.
Yes.
I agree.
Someone posted a comment somewhere else in this post with a list of sources of ebooks. Hope it helps!
Why? The porn thing?
Sounds like something Grok would say.
Why?
deleted by creator
Big ears is a racial trait? Today I learned something new.
The title is inaccurate but not far off.
• Cops in this country think everyone using a Google Pixel must be a drug dealer (Updated)
“Police in Spain, specifically in the autonomous region of Catalonia, are very alert when they spot someone using a Google Pixel phone. As weird as it sounds, Pixels are highly preferred by those involved in organized crime, according to the Catalan police.”
No, it’s actually the opposite. Piefed users are required to stay forever. It’s in your terms of service.
He looks well rested.
During the wedding ceremony, I agree it would be rude to be texting (unless it’s an emergency and I would step outside). But the wedding reception seems more casual and I wouldn’t feel bad glancing at my phone every now and then. It would be rude to be on your phone during the whole reception though. It makes it look like you’re not having fun there.