Ah. My bad, yelling at the messenger. But the actual "author", who might also be the submitter (nick = Nicola?), has some explaining to do. There's a lie in the submission title, and the same lie in the github readme intro.
Thanks for helping alert us all to the sloppiness and deceit. And thanks to all who flagged.
You almost had me there, I'll admit, but then I looked at your (short, new) comment history for a Poe's Law check. A much-needed perspective around here! Keep it up, and good luck staying on the right side of the site guidelines -- your shtick is close to the edge, but very refreshing if done well.
>"So please forgive any imprecision or inaccuracies"
Um, no? You (TFA author) want people to read/review your slop that you banged together in a day and let the shit parts slide? If you want to namedrop some AI heavy hitter to boost your slop, at least have the decency to publish something you put real effort into.
The Gmail app on Android supports 3rd party email servers via IMAP and has done for as long as I can remember (I have Gmail accounts but my primary account is a self hosted one and I use the Gmail app for all the accounts)
The Gmail app supports POP, IMAP, MS Exchange, and (though it got bugged into re-downloading the entire mailbox every day) even old-fashioned MS ActiveSync.
You can disable the Gmail app and install something like Thunderbird seeing as this is just a normal Android phone (which, of course, will also show you your Gmail emails if you set it up to do so).
We’re working on an open-source product security platform (1) and are looking into integrating with ThingsBoard. This would help identify operator risk behavior, for example in cases of account takeover. Do you see any specific security features that are currently missing in IoT behavior/risk analytics?
This is an article of questionable value written by AI itself.
The real cost of 100 lines will be when AI occasionally passes secrets, or brings new vulnerabilities, that at the scale of writing code no engineer will see.
I use an even older Macbook and an even older macOS. Of course, the browsers no longer work with the latest JS, so occasionally when I need to use some webapp I boot up a Linux VM and do what I need to do. With limited RAM even that's a pain, but it works for now.
I don't know what click fraud is but it's a very small entertainment agency market in Durban, South Africa's 3rd largest city. We only advertised locally (specified in AdWords)
Click fraud is malicious activity where someone runs bots that click on ads for specific category keywords. For example, if this is a villa rental website, someone like competitors or a large platform, might use ad agencies that perform click fraud against the villa rental website to exhaust their budget and therefore get more traffic themselves. In the case of an entertainment agency, it might be other competitors interested in your traffic.
The first step you might take is to check that you are not advertising with AdWords partner networks, as they might be the reason for the clicks on your ads.
Second, you can check your server logs and verify clicks from Google Ads, especially the geolocation of those clicks. If they are not from your region and the visitors perform no action after viewing the first page, this is most probably click fraud.
I use our own open-source security platform (I'm a co-founder) for this purpose (1), as it's server-side and works even if bots aren't running JS. However, your website analytics might also be useful if they can collect events without JS.
Shockingly, I did not consider malicious intent as a possible reason. I will look into it. Never did trust the partner networks though, it's not that anyway, just used plain old search network
It's fine now, somehow got to #1 on Hacker News and 1000's of visitors did that. Learned something new about Cloudflare Cache Settings, it won't happen again
Click farms that we had been dealing with for our clients did not render images on webpages during visits, therefore we put tirreno on the backend of the platform, plus added a 1px image that sends the same request to tirreno to spot the difference.
Yes, this manual was AI generated. However, the core ideas, first principles, and outline for this manual are all ..."
1. https://github.com/nicolasahar/morphic-programming/blob/main...
reply