Another is the - that stands up to that has wronged someone else they like in the chats. There are several different methods, and several different types of people I have encountered doing this kind of thing over the years.ġ type - the jealous 'friend' who wants to be more. if we can't easily see and block ips we won't be able to use it for our public groups.īut I can see how this is really cool for small groups that know and trust each other, really like the thoughts of use going here in this post. Some problematice people have caused us to ban and block over a few million ip addys to slow down their returning to troll. Moderation - is there an admin level for users that we can give access to see other participants ip addys and option to kick / ban / block ip addy, certain usernames, ip subnets, CIDR notation, ASNs / etc. Sadly with some of our members, they will do anything to snatch another user's ip addy and use that for blackmail and hacking - so we need to make sure we can hide it. Is the ip addy of the users sending and receiving - so it's easily discoverable or is it possible to make this use an intermediary server like a STUN/TURN kind of thing? I am needing to replace an old chat system soon, and may kick the tires with pushing this to some users for testing, but first: I can see this being really useful for many different types of chats and groups. Very cool thinking here - especially like the thought and implementation of the “Rendezvous Points”. You choose to use the web application it's your choice not theirs. Keep complaining for sure, we need dissent, but don't argue that Zoom isn't good at what it does, the only argument might be that it's practices aren't ethical. The majority of the population has decided they are not worried about it, right or wrong, they just want to get on with their life. This is like not trusting the government when they do mass surveillance but more benign. It's not even clear to me they're being genuinely unscrupulous anyway. I'm not a technotard and mostly know everything and I make the concession. Contrary to popular belief in places like HN, the average Joe isn't a dipshit, they really don't care about these lapses from Zoom and will very happily make these concessions evenn if they're fully educated on everything to know about security. To me, it's a bit clear that unless you also control the underlying OS (even when you do apparently), they are doing whatever they need to get what can be considered basic UX needs of a VC app. The Mac must also be using macOS High Sierra or later, the latest version of macOS Sierra, or the latest version of OS X El Capitan.Anyone who knows tech reasonably knows Zoom does some "unscrupulous" things to provide a seamless VC experience. To download an installer suitable for creating a bootable installer, use the App Store or use a web browser to download from a compatible Mac. Follow the onscreen installation instructions.Ī bootable installer can be useful if you want to install macOS on multiple computers without downloading the installer each time, or when you can't install using the other methods. Open your Applications folder and double-click the macOS installer, named Install. pkg file, then follow the onscreen instructions to install the macOS installer into your Applications folder. dmg file to open it and see the package (.pkg) file within.ĭouble-click the. Use these links to download a macOS disk image (.dmg) file.ĭouble-click the.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |