

God, I can’t stand this finance-bro vocabulary infiltrating people’s normal speech.
God, I can’t stand this finance-bro vocabulary infiltrating people’s normal speech.
Is it really decentralized though? Why are they “partnering with Unstoppable Domains”? Couldn’t they just do it themselves?
… but also by the ways they were known over.
At worst, this knowing over meant …
Sorry to be off-topic, but what does “knowing over” mean? I’ve never heard this expression before, and searching doesn’t turn up any examples of it being used either. Is this some idiom of a regional dialect, or a typo that the author made twice in quick succession?
Someone’s gotta pay for those hexacore CPUs (yes we did get one).
This is only relevant to you if you signed up for their Monitor service.
Handing over all of your private data to one company so that they can “delete your data across the whole web” was always a business model ripe for abuse. It shouldn’t be surprising at all that the data brokers themselves are creating these deletion services.
Even if you find a company that you trust, surely we know by now that no database is secure in the modern age. Eventually that database will leak and given that these data deletion services have every item of personal data for all of their customers, they are an extremely high value target.
The kind that was known as, “the butcher.”
What’s their margin? Are they profitable?
I do not want to waste everyone’s time by continuing this discussion that is not leading anywhere.
Not leading anywhere? That’s a strange perspective to have given the “overwhelmingly negative feedback.” I think it led to a fairly concrete conclusion.
I think what he meant to say was “I don’t like that my arguments did not sway your opinion.”
I had a similar issue with sites displaying maps recently and I had to permit access to the canvas data to fix it. It’s the icon that appears on the left side of the address bar when a site is using HTML5 canvas operations.
Sorry I just re-read your post and saw that you’ve already tried this.
Firefox Extensions: Customize your toolbar with the option to remove the extensions shortcut, giving you more control over your browser. When the button is hidden, you can access the extensions panel again at any time from the Firefox menu by clicking the Extensions menu item.
finallyyyyyyyyyyy
It’s the effect of a persistent decades-long disinformation campaign perpetrated by those who wish to destabilize western democracies which has been signal-boosted by naive (or maliciously designed) recommendation algorithms on social media platforms.
Christine Lemmer-Webber made an excellent blog post ~6 months ago titled How Decentralized is Bluesky really?
Give that a read.
“I want you to rebuild everything around my nerds”.
Where my nerds at!?
LLM’s produce fan-fiction of reality.
Imagine not being American and having to read about the American soap opera in your technology community and everywhere else.
Don’t get high on your own supply.
This forbes blog is about this article:
https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/
The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances.
So there isn’t really an explanation other than “somebody collected these somehow and left the data unsecured.”
The attack vector for infostealer malware is usually social engineering, getting unwary users to download infected trojanized software via phishing and malvertising etc.
If you follow security news, you will see articles about infostealer malware campaigns all the time.
https://www.theregister.com/2025/06/18/minecraft_mod_malware/
https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
https://thehackernews.com/2025/06/rust-based-myth-stealer-malware-spread.html
https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
This article is about credentials that are stolen directly from users’ devices that are compromised with malware. So they will be that user’s passwords for whatever services they were using while infected with the malware. This is why the dumps contain passwords for just about every online service that exists.
This isn’t an actual database breach of the major providers.
Also, “A Wizard of Earthsea” by Ursula Le Guin.