minus-squareTechie@lemmy.worldOPtoMlem for Lemmy@lemmy.ml•Feature request - biometric unlocklinkfedilinkEnglisharrow-up2·2 years agoOkay, thanks! linkfedilink
Techie@lemmy.world to Mlem for Lemmy@lemmy.ml · 2 years agoFeature request - biometric unlockplus-squaremessage-squaremessage-square2fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1message-squareFeature request - biometric unlockplus-squareTechie@lemmy.world to Mlem for Lemmy@lemmy.ml · 2 years agomessage-square2fedilink
Techie@lemmy.world to Technology@lemmy.worldEnglish · 2 years agoDownfall attacks targets a critical weakness found in billions of modern processors used in personal and cloud computersplus-squaredownfall.pageexternal-linkmessage-square2fedilinkarrow-up145arrow-down10
arrow-up145arrow-down1external-linkDownfall attacks targets a critical weakness found in billions of modern processors used in personal and cloud computersplus-squaredownfall.pageTechie@lemmy.world to Technology@lemmy.worldEnglish · 2 years agomessage-square2fedilink
minus-squareTechie@lemmy.worldtoTechnology@lemmy.world•Someone [@technology](https://lemmy.world/c/technology) suggested this site, I’m a bit surprised by the services offered as alternatives to the big tech companies. Very nice overview. linkfedilinkEnglisharrow-up19·2 years agoNice, thanks! linkfedilink
Techie@lemmy.world to Technology@lemmy.worldEnglish · 2 years agoUnpacking Google’s new “dangerous” Web-Environment-Integrity specificationplus-squarevivaldi.comexternal-linkmessage-square100fedilinkarrow-up1789arrow-down114
arrow-up1775arrow-down1external-linkUnpacking Google’s new “dangerous” Web-Environment-Integrity specificationplus-squarevivaldi.comTechie@lemmy.world to Technology@lemmy.worldEnglish · 2 years agomessage-square100fedilink
Okay, thanks!