![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/c0ed0a36-2496-4b4d-ac77-7d2fd7f2b5b7.png)
That sounds like a great boss, someone how is involved with what should be done but not always how, as long as the team deliver what is requested.
That sounds like a great boss, someone how is involved with what should be done but not always how, as long as the team deliver what is requested.
That is what I imagined as well. Some QA or tester or whatnot probably found it annoying to click left/right when navigating the radio. It does make some sense.
The designer of this layout look at the display, saw that the volume slider was going left/right and placed the buttons accordingly (probably what happened).
I have the same problem on my phone. Could be that my vpn has an ad blocker (like pi hole), I use it on phone and PC.
Haha, thanks for the reading.
Using FF and uBo, confirmed user agent to be Mozilla Firefox.
This url (https://edition.cnn.com/2024/01/16/business/second-teen-worker-killed-marc-jac-poultry-dol-investigation/index.html) does not work. Try going to https://edition.cnn.com and it will work, clicking any article seems to bring up the issue.
I just assumed that it was some kind of boiler plate message, but it makes sense that OP’s user agent is Brave, using FF or not.
I take it back, FF and had the same problem, just not on their front page.
It sounds like legal teams playing it safe. Who would go to court over such a thing?
If someone really wants this service but do not want to (or cannot) host it themself, https://ovpn.com offer this in their client. I used to have a pi-hole selfhosted but not anymore. Using their client on my phone as well solved the problem with blocking ads while not at home.
Started using https://qwant.com a few years ago and the bliss of forgetting about amp links is real. (though I am considering https://kagi.com instead.)
You can’t ask IT to disable it for you?
Are you talking specifically on phones? Because it works just find in browser on desktop.
Even if they say they won’t do it, all trust is gone.
Best solution i’ve seen here by far.
Still great for general use
I prefer hostage maps.
I get that a malware can get inside the worlds most secure system, if for example a user lets it in. What I am saying is that showing a honey pot in response to “ssh is more secure than a software that runs code without you giving consent and without your knowledge” not say anything, except what happens if someone gets in.
Running a honey pot for SSH and sharing logs only proves that people try to attack you, it does not really tell if SSH as such is vulnerable or not. It is a honey pot, people gaining access if the whole point.
Having a locked down but exposed SSH access is something else.
That’s true but I preferred their results over ddg when I compared. I might try swisscows again.
Set all mails addressed to your domain but to the wrong email to be sent to your primary email. Then sign the petition with “<service_you_are_signing_up_fo>@yourname.com”.