Some day I'll see a real life use for any of this stuff.
unperson
It's possible to split the second factor key into, say 10 keys where you need 4 to unlock it, or any other combination.
It's fairly normal for expiry warning emails to get lost. Even more on the first renewal. They know this happens, that's why they keep it working right until the point where they can charge you thousands of dollars to keep your business running. The normal thing used to be that the domain goes to a parking page during the grace period so it's unmissable, not to keep it up and then immediately auction it.
Clearly they do the minimum effort to notify anyone when a domain expires and then pump up the auction.
They kept it working during the grace period or the grace period was absurdly short? I'm not sure which is worse.
visit hexbear.net emoji
You could solve your immediate problem installing this version of firefox, it's the last browser that supports Windows 7 https://www.mozilla.org/en-US/firefox/115.20.0/releasenotes/
Pierre Dardot & Christian Laval, ‘The New Way of the World: On Neoliberal Society’
This essay demonstrates that the languages that use Chinese characters have a way to form words in common with each other that doesn't work very well when transposed to English. It does this by exploring the very idea of using the Chinese writing system to express English sentences.
It takes the analogy to the point that it breaks, and continues as satire.
Most devices actively ask around for the hidden SSIDs they know about. As in, they send a broadcast in cleartext called a "probe request" containing the list of hidden SSIDs every time they scan for access points.
Today usually the scans use randomised MAC addressess for privacy, but that doesn't help if you have any hidden SSIDs stored because of this list. Places like shopping malls are known to use these beacons to track the movements of individual people.
Before 802.11w (that still works almost always because 802.11w tends to be deactivated for compatibility), there was a trivial way to "unmask" a hidden SSID, you have to wait for someone to talk to the target access point, send a disassociation frame to the victim, and wait for the probe request / response when the victim automatically reconnects.
Don't do this, your phone will periodically ask for hidden SSIDs everywhere you go, making you easy to track passively.
I'm glad zero trust distributed shit is no longer cool, the decentralised trust model of the fediverse is so much simpler and effective even if sometimes the admin disappears and does not renew the DNS name.