No relation to the sports channel.
To be clear, network costs represent a tiny fraction of WMF’s expenses. Much of WMF’s budget goes to social programs, not technical upkeep.
This goes back to the days of AOL chat rooms, where they shut down forums for breast cancer survivors because they said “breast”.
https://www.chicagotribune.com/1995/12/02/america-online-admits-error-in-banning-word-breast/


Fascists lie.


As a reminder, Eich was turfed from Mozilla for joining an anti-LGBT hate campaign (and thus alienating a whole lot of developers, sponsors, and users); and his So Brave browser pushed NFTs and stole money via referral fraud.


Congratulations … you’ve trained a generation of junior product managers.


First step: Find a country with a navy competent to defend your undersea cables.
This is what Debian is for.


Remember, streaming only has a business model as long as it has a better user experience than piracy. That’s why iTunes took off in the era of Napster. When a streaming service’s user experience drops below that of digging up pirate treasure off a shitty ad-ridden torrent site, that service is not long for the world.


One problem is that a great deal of correct security advice contradicts “common knowledge” security practices. Password character classes – “must include capitals, lowercase, numbers, and symbols” – are a standard example. That idea got rooted in security requirements for banks and such, and it was a bad idea even then.
But getting rid of that idiocy looks, to the casual observer, like “weakening password requirements”.
Another problem is that the biggest security vulnerability that many businesses have is obedience to authority. If you can “social-engineer” someone into thinking you’re the big boss, then of course they’ll turn off all the security for you. And the scarier the big boss is, the more eager the underlings are to please them by doing exactly what the email from bigboss@yourcopmany.com says.
Resistance to phishing is questioning claims of authority; it requires being willing to tell the big boss that no you won’t take the security down in response to an email, even a really convincing one. Which means that the worker has to be safe in doing so.


The big platforms have gotten a lot worse.
Twitter went fascist.
Canadians can’t share news articles on Facebook.
Reddit self-owned.


Ah. By “advanced” you mean “stone knives and bearskins”. Got it.
When I say “advanced” I mean more like “taking advantage of lots of good work that others have already done.”


What do you mean by “advanced”?
I’ve been using Linux on-and-off since before kernel version 1.0, and I use a distro (Pop!_OS) with a reputation for being newbie-friendly and just working out-of-the-box.
Since 2017 at least; and IIRC years before that; that’s just the earliest NIST publication on the subject I could find with a trivial Web search.
https://pages.nist.gov/800-63-3/sp800-63b.html
Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
“Memorized secrets” means classic passwords, i.e. a one-factor authentication through a shared secret presumed to be known to only the right person.
Please note that the article disagrees with the headline. It states explicitly that there was no request.
In other words, the author feels free to lie to you.