@hcs I'm not a currency expert, though I know a little bit about this sort of stuff.
It appears sterling will go down further, quite a bit from here -- if Brexit happens (especially a "hard Brexit," with no alternative trade / work / travel / shipping, etc. arrangements in place) -- or seems like it will happen. The currency will *probably* eventually recover from that, but you would probably have to hold on to it for quite some time to turn a profit.
@lroop@phessler@tastymochafox Well, I think they believe that they have obfuscated the sources of the queries enough such that Cloudflare can't easily enough associate DNS requests with users, while it is trivial for ISPs (or Google) to do that if you use their DNS.
It wasn't directed at me, though I feel obligated to mention I don't think your previous comment is a very nice or reasonable thing to say.
You are talking on a completely public forum, which is meant for sharing and group discussion, and your "joke between friends" went into lots of other people's feeds (Iike mine too).
If you don't want others to see or participate in your discussions, you should choose a private method of communication.
Firefox admits they will eventually be sending all of your DNS to Cloudflare. Cloudflare will monetize your internet browsing, no matter how much their PR people say they are.
If you want to disable that, go to "about:config", and set "network.trr.mode" to 5.
The values are: 0 - default off, 1 - race, 2 TRR first, 3 TRR only, 4 shadow, 5 off by choice
Google put hidden microphones in people's houses and when caught admitted they shouldn't have been so secretive about it. They claim innocent intentions and the mics were never on. Most people believe them. That's the difference between them and Facebook. If FB did this, folks would flip. Google has credibility, and it's worth asking how they got it, how they maintain it, and whether they deserve it.
@jonw Good point -- physical security should get more attention -- although I see some good reasons for emphasis on code, procedures, controls, infrastructure, and configuration / implementation.
Many, many attacks and threats are remote. Almost every (maybe all) device and application connected to the Internet, for example, has been probed or attacked in some way -- probably many times -- while physical attacks are less common (though they definitely happen).
β οΈBreaking β Popular UC Browser contains a 'hidden,' 'potentially dangerous,' and insecure 'feature' (backdoor) that allows remote attackers to execute malicious code on #Android smartphones, putting over 500 million of its users at risk
@Sommer I imagine some San Francisco-area universities and colleges must have some quality CS continuing studies courses that one could find by searching for them online or by phoning their continuing studies offices. No? They probably also have paper course catalogues you could check.
If not, open (free) online courses at MIT and such might be a good bet.
Otherwise, you could always move to Vancouver and take courses at one of our many outstanding colleges and universities. π
@Sommer I prefer taking courses at universities and colleges too. I find the quality better. Moreover, they focus on education and research, rather than making money.
@Sommer I don't think this is useful in your case, since you're not in Vancouver, though I just finished a CS continuing education course in #Python programming at #Vancouver Community College (not a university either, but it was the closest I could find).
The course was very good! I feel, finally, that I now have a solid foundation in Python to build on. It was harder to do that with self-study.
With a good base of knowledge, self-study is more productive, and a lot less tedious. :)