

Unless you live in California, they kinda do.


Unless you live in California, they kinda do.


I use uMatrix (uBlock’s big brother), so sites that do this generally lose first-party JS privileges real fast.


Best I can do is cyber-psychosis and some shit from 10 years ago


The value of LD50 for a substance is the dose required to kill half the members of a tested population after a specified test duration
This is, effectively, how oral flee/tick medications work in animals. It basically turns the animal’s blood into a mild poison. The poison is mild enough that it doesn’t affect the animal but it’s enough to kill small insects like flees, ticks, or mosquitoes.


Canonical and Debian both target the professional server space. I’ve spent pretty much my entire career working on Debian-based distros.
Hell, the one company I worked for that I expected to use RHEL used Ubuntu for everything, so 🤷♂️.


Direct linking via a specific CDN was the problem. This is solved by bundlers, not caused by it.
The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. … However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io.
I wouldn’t be surprised if all shells have some form of that, but not enabled by default. I know Bash does, but I’ve never turned it on.