Wow, what a dumb thing to claim when you have surrounded yourself with “free speech absolutists”. They are going to lose it on him, right? …. Right?
Jason2357
I ran into this as my IDE is also constantly touching temporary files to maintain its state. It wasn’t copilot though, it was one drive. So I moved my work files into a local-only location, and then periodically rsync to the synced folder, excluding .git and other folders that have no business on a synced folder.
When I originally switched, I kept an ultra clean windows 2000 VM going for a solid decade. Any time I needed it, I could install stuff, do the work, and then blow away the crud that always builds up with Windows. I would suggest using the oldest version of Windows you can practically use, de-bloating it, and taking vm snapshots.
You could even firewall it using another VM or the host if you wanted. Put windows in jail, erase its memory, and cut it off from the outside world so it behaves, lol.
Data scientist here; there simply are not enough murders to model this, so they will need to use proxies for “likely” murderers (like any sort of violent crime). That means the model will very strongly target people who are over-policed (minorities) and those more likely to actually get caught and charged for things, and thus be in the training data set (poor people). It will also fail spectacularly for this purpose because even a highly accurate model will produce almost 100% false positives -again, because actual murders are so vanishingly rare. The math just doesn’t work.
I use sendgrid as my outgoing smtp relay to avoid ip reputation issues you mention. You still have to configure your dns settings for spf and dkim pointing at their servers instead of yours. Their free tier is 10x the email I’ll ever send so it doesn’t cost anything. There are a few companies in this space with free tiers. It works, but it isnt Gmail level deliverability. I still get spam binned occasionally.
Phone number and trust-on-first-use for most people, with out-of-band fingerprint verification for the paranoid. It really depends on the threat model and the security practices/awareness of your colleagues, but a link shared on some social media or lower-security chat network is more vulnerable to a man-in-the-middle attack than a phone number for your average Joe. There are a lot of ways a person could get a manipulated invite link.
Either he was arrested with no record of the arrest (i.e "disappeared") which is a new line for the administration to cross, or he disappeared for another reason (by himself, or with help or coercion by a foreign entity like the CCP), and the FBI is investigating.
I hope journalists keep on this because the first option would be a huge problem that everyone needs to know about, but without more information, the second is also a possibility. The CCP is known to have agents in western countries that manipulate and pressure ex-pats to return to China. Keeping an open mind now will also strengthen the argument if evidence for the former comes to light.
This is signal detection theory combined with an arms race that keeps the problem hard. You cannot block scrapers without blocking people, and you cannot inconvenience bots without also inconveniencing readers. You might figure something clever out temporarily, but eventually this truism will resurface. Excuse me while I solve a few more captchas.
Because the workflow for a lot of people is to have projects in folders which are synced to Onedrive. That allows for collaboration with colleagues that are not using git, as well as backup/archival of files and access from different computers or online sharing. My workflow of using rsync to periodically copy the files (--exclude .git) works, but isn't ideal. If I forget or someone else edits something, I have to manually deal with conflicts. I guess the real answer is just "not everyone is a software dev."