I can excuse attempting to compromise millions of computer systems worldwide for nefarious purposes but I draw the line at violating the contributor guidelines of an opensource project.
I can excuse attempting to compromise millions of computer systems worldwide for nefarious purposes but I draw the line at violating the contributor guidelines of an opensource project.
Linus Torvalds. He’s making a list.
You only need the app to do ear shape analysis
Does this require the app for operation or can you temporarily install the app for config and then use the feature without the app?
You could use Insular to quarantine your untrusted apps into their own profile (different permissions, file directory etc) and then transfer the individual photos to the “work” profile to access them with whatsapp.
I did the same thing starting probably around the same time as you except that did it start working for me 5 years ago and I haven’t gone back to windows.
block tld feature even better!
“if” gcc had a Ken Thompson hack how do you secure checks notes anything