Locally, an attacker still needs to know your password. A strong password can make it too expensive or impractical to brute force.
Filen.io
Works well so far, is end to end encrypted, open source, and the apps are nice and solid.
Works great for me. I'm running mx23 after running mx19 for a few years.
I hope mx23 is better with updates, or making easier to update, as updates broke in mx19 not long after I first installed it. My only complaint. Otherwise great.
Let's say I have a favorite sport and there exists a sub_ named: r/.
Let's also say there already exits a Lemmy community and that community is struggling to get off the ground: !@lemmy.world
I can see a value add if your project directly helps !@lemmy.world get started; but I don't see how it does. If anything wouldn't your project compete with !@lemmy.world and therefore hinder it?
It might be different if your project directly tied r/ to !@lemmy.world but it doesn't.
If downvotes are the issue, beehaw.org doesn't allow downvotes. Those folks are automatically eliminated from that. You can then just ignore the comments you don't like and it's all good. 👍
I'm not an expert but I feel for you and will try my TLDR.
They did a study of almost 300 people. They split these into two groups, some with long COVID and some without.
They then tried to determine if those with long COVID had a signature in their antibodies. That's what "immuno phenotyping" means ... finding a unique pattern in antibody types and responses.
They did indeed find those signatures or patterns. Specifically, people with long COVID had more of specific types of antibodies and faster antibody responses to COVID and other viruses like Epstein Barr.
These differences between these two groups might help to identify and diagnose long COVID.
Further study is recommended (edit: almost all papers end with this recommendation)
Something has to be done to bring back the onside kick. It's not dangerous from the standpoint of concussions.
4th and 25 or 15 is not as interesting and favors passing teams.
I went over to their Discord server and here's what I was able to glean.
I gather they run a web-facing server which accepts text I/O from your Textual apps running on your personal machine or server, probably as a daemon. The connection between these two is via normal TCP/IP connections which your firewall already allows. Your Textual apps receive keyboard and mouse events and text.
They claim it should be "essentially free" for hobby use.
The text stream between your apps and their servers will eventually be (or are) encrypted.
"What hump?"
This piped link did not lead me to a video.
The community can only read the source code, as of yet. All of the source code has been provided by a set of internal developers.
The fact that it is open source means that, if somehow two malware elements have made it into the source code, then someone will eventually report it. But this doesn't mean that two malware elements cannot be there right now.
These two malware hits on total virus scan should be communicated to the developers.