![](https://feditown.com/pictrs/image/c99c14fb-afcf-4a3f-8e83-d237e22dc432.webp)
![](https://fry.gs/pictrs/image/c6832070-8625-4688-b9e5-5d519541e092.png)
You only need to enter the 2fa code once on a new device. How often do you switch devices for this to be a significant effort?
You only need to enter the 2fa code once on a new device. How often do you switch devices for this to be a significant effort?
That’s fair. For me none of the alternatives offer enough features to replace it. I often use it to highlight POIs of a type and all the different map views are great.
No, ActivityPub only send messages to the recipients. Uninvolved servers don’t get the message at all until one of their users explicitly searches for it.
In the worst case where every user has their own server, one message per recipient is sent. Adding another recipient on their own server means one more message being sent and so forth.
The whole algorithm (AppView) is centralised. While it’s technically possible to host with enough capital, a second AppView server would also double bandwidth required for every message sent on the network. This gets worse the more AppView instances you add, as every message has to be sent to every AppView server (exponential growth)
The .mobi was a previous post where they bought the expired domain which was previously used by the .mobi WHOIS server.
A bunch of systems apparently didn’t update their WHOIS database and still tried to get WHOIS information from the old domain.
This could lead to RCE in some implementations if they provided a malicious response.
A bunch of CAs also accessed the old domain and use WHOIS to verify domain ownership. By setting their own email address for verification, they could have issued themselves a certificate for any .mobi domain (microsoft.mobi, google.mobi for examle).
Now to this article, here they looked at a bunch of webshells with backdoors added by the developers. Some of the domains had expired, so by getting those domains and setting up a webserver they got connections from different systems infected by the malware. They could have used the same backdoor previously used by the devs to access those same systems remotely and do whatever.
Arch
This is pretty much an ad and OP might be the one who wrote the article.
If you want a known good program to rip Blu-Ray disks, MakeMKV is probably the program you’d want to use.