Not to be that person,
Proceeds to be that person
Not to be that person,
Proceeds to be that person
Louis explains in several videos on his channel.
They're experimenting with a business model where they ask users to pay for the product if you get value from it. Development isn't free, their time is valuable. In return they'll never harvest and sell your data.
If this experiment is a success it can demonstrate that it's a viable business strategy to not harvest data, which is good for everyone.
Personally, at this point I'm trying out the FUTO keyboard but it's too janky for me to pay for it. Lots of bugs and swipe is not good. I hope it gets better and I'm trying to help the project by submitting bug reports.
Grayjay I've barely used but I see the potential, and if it gets good I'll pay for it. I paid for Signal messenger because it's the same kind of thing.
It's up to you. They're telling you what the price is, it's the honor system if you use it and get value from it.
back to your self-hosted services that surely aren’t just a stack of constantly broken docker containers running on an old Dell in your closet
I feel personally attacked
You're mixing some things up. Yes, some agencies will have some POLICIES about not wanting to hire personnel with a history of drug abuse/use, but that is separate from the clearance adjudication process.
A secret clearance is a secret clearance, and you're correct that it's much simpler to get a basic secret than it is a TS-SCI or to be read into certain programs. But there isn't a "FBI" secret and an "Army" secret.
There's no timeline for how long it's been since you've smoked pot, or number of times, or anything. I think a poster said that it's about whether the investigation finds you trustworthy enough for the level of eligibility they're investigating you for, and that is correct - and there isn't a hard and fast rule necessarily.
If you do an investigation and are asked if you've ever used any illegal drugs and you say no, but in your criminal record you have a possession charge, that's bad. You're obviously lying, and not even being smart about it. If you say you used to smoke trees every day and are blazed right now, that's bad because you obviously don't give af about laws and stuff (not my opinion, this is the opinion of the Fed that still thinks it's illegal). If you say you used to smoke with your friend for a couple months in college a year ago but stopped and think that was probably a dumb decision, that's not necessarily bad, it all depends on how the interview goes. They'll ask for the names of who you smoked with and how you got the weed - so they can check if you were hanging out with known cartel members or just some other joe schmoe at UCWhatevs.
At the end of the day it's all based on context and a ton of factors. They dig a lot deeper and have a much higher standard for more selective clearances or programs, which shouldn't be a surprise to anyone? But it's all about whether you're trustworthy to keep certain sensitive information from unauthorized people.
Why would you change travel plans based off of a single article? Go visit Japan
YEAH LICK MY ASS BITCH
You're not wrong about reolinks, amcrest, hikvision, etc but their price:quality can't be beat and they work well with many different NVR software suites, which makes them popular.
If you're concerned about how they call home (they do, I've sniffed packets on my network to test the rumors and seen it on every one of them), you need to isolate the cameras off of the internet so they are blocked from the outside connection. This can end up being mildly tricky to very complicated depending on your network equipment, the way your LAN is set up at home, whether you want to view your cameras remotely, etc, but it's the most cost effective long term option that is not subscription/cloud based.
I use blue iris on an old computer. It works great. I have unifi network gear, and I tried some of their cameras out but they're not really ONVIF compliant and they're extremely expensive for an equivalent Chinese brand. That's the made in USA price, and tbh Unifi cameras aren't even that expensive, they're more "prosumer" for small business deployments or nerds at home. They have a walled garden ecosystem that I dipped my toe into and didn't care for some of it, but I still use their access points, routers, and switches because they're great quality and really easy to config.
But, if you have never done any of that, you might just want to go with an off the shelf solution or be willing to spend a lot of time reading. You DON'T want to mess up your network security trying to install local cameras if you're not sure what you're doing.
One thing that hasn't been mentioned yet is an RF/analogue camera kit. It's not as easy to set up as POE (two cords to each camera and they're way bigger so running them through walls will do more damage that you have to patch later) you can get an all-in-one NVR+4/8/12/16 etc camera kit with as many bells and whistles as you want. It will be cheaper as well and you don't have to worry about network bandwidth issues because it's analog. The feeds are super nice.
Concrete is gravel, sand, cement, lyme, and water, mixed in various ratios.
There's a lot of variations and additives that can change how quickly it cures, often to speed it up or slow it down to account for weather (temperature and humidity play a huge part in how it cures), or to modify the pace of how it cures so you can keep building on it if you're building vertically.
It's a simple concept that gets incredibly complicated very quickly.
Big rocks, little rocks, cement, water.
Even if I replace the speaker from a telephone, and the keypad stops working a month later, I have voided the warranty already by doing the speaker change as they can't know if the now not working keypad was done because of you or a failing unit.
This is false. They have to PROVE that the repair that you made caused the keypad to fail in other to void your warranty, at least in the USA. Most people are misinformed as you are however, and they'll TELL you that's the case to make you go away, despite it being illegal.
This is the way I implement it as well.
I've also heard of folks using syncthing. I'm sure there's plenty of ways to sync up but I already had a nextcloud instance so I went with that.
"I'm older, so I'm right"
For the 40mm impact munitions in the list. Riot control gear.
"Grenade launcher" here isn't very specific. Could be like an M203 or something, which is a tube launcher that lobs 40mm rounds up to about 100m. You can absolutely get 40mm frag grenades and blow shit up, that's what most people think of when they think of a "grenade launcher," but that's not what it's on the list here. You can lob gas canisters, smoke, illumination flares, etc etc etc, just depends on what you're trying to do.