is it AI generated because the smaller text has the same blurry look that AI does when trying to “write” stuff
is it AI generated because the smaller text has the same blurry look that AI does when trying to “write” stuff
glitch of some kind, my RAM usage has also been kinda high like 1,5GB for 2 tabs
Krita I don’t draw so can’t talk about the experience of using it
Not exactly what you’re asking for but you can check out Wanderbots on youtube dude plays almost exclusively indie games. Don’t expecte play throughs almost never finishes the games but it’s not a bad way find niche games.
ImageGlass has the setting to open last seen image
The way I’ve haer the search for lemmy works is that someone from your instance needs to visit a community before it’s cashed for searching later
don’t know how helpful it is but here’s a video https://youtu.be/O0_Aou3eZl8?si=2OZRbLw7iAIi-VyL
I’m guessing it’s contacts as in phone numbers so sim card save them all there and move it to the new phone
https://m.youtube.com/watch?v=jCgYMFtxUUw&si=i5khGKZUZ7lLM1L5
too funny not to share
thanks
settings>general> comments> behavior
report it to the lemmy devs and the instance admins and hope it gets fixed
with nsfw turned off it’s still showing could be a federation bug
change post view to card 2.0
you can change it in the settings
TLDR of sorts
To test Google’s Web Store review process, the researchers decided to create a Chrome extension capable of password-grabbing attacks and try to upload it on the platform.
The researchers created an extension posing as a GPT-based assistant that can:
Capture the HTML source code when the user attempts to login on a page by means of a regex.
Abuse CSS selectors to select target input fields and extract user inputs using the '.value' function.
Perform element substitution to replace JS-based obfuscated fields with unsafe password fields.
The extension does not contain obvious malicious code, so it evades static detection and does not fetch code from external sources (dynamic injection), so it is Manifest V3-compliant.
Notable website examples of lack of protections highlighted in the report include:
gmail.com – plaintext passwords on HTML source code
cloudflare.com – plaintext passwords on HTML source code
facebook.com – user inputs can be extracted via the DOM API
citibank.com – user inputs can be extracted via the DOM API
irs.gov – SSNs are visible in plaintext form on the web page source code
capitalone.com – SSNs are visible in plaintext form on the web page source code
usenix.org – SSNs are visible in plaintext form on the web page source code
amazon.com – credit card details (including security code) and ZIP code are visible in plaintext form on the page's source code
Finally, the analysis showed that 190 extensions (some with over 100k downloads) directly access password fields and store values in a variable, suggesting that some publishers may already be trying to exploit the security gap.
it’s on the simpler side
upload 1.3TiB download 238GiB ratio 5.6 did a fresh windows install 2 weeks ago also where does qbittorrent store the statistics
from the 1 video I saw more like Paladins with Smite item shop