Clerkle

joined 1 year ago
[–] Clerkle 4 points 1 year ago

Looks like I'll be learning about bridges.

[–] Clerkle 1 points 1 year ago (2 children)

How does that not defeat the purpose of Proton?

[–] Clerkle -3 points 1 year ago* (last edited 1 year ago) (2 children)

At least the OAuth2 access is protected. That's the detail I needed to see.

So many articles suck these days.

That's the direct implication of the innate nature of capitalism. News publishers drive researchers and writers into mill writing which unfortunately involves reworded mimicry of the few who publish the original "investigative research" they recorded from the source. They're doing it for money too, so they aren't alloted enough time to fully investigate off they want to publish their name to juicy details first before those who can and will fully investigate it to publish a full exposé.

We expect news publishers to dramatize titles for the click-bait effect at their websites. But within a public forum platform (here), reposting the click-bait title into the community post effectively misleads forum readers because this space is personable and honest, so we expect an honest post title here. News publishers know this and exploit that in Reddit, but hopefully not here. Every time I see OPs copy-posting and running off, I have to suspect industry marketing efforts in effect, perhaps especially when OP is a bot.

I really don't want to see Lemmy become polluted with news marketing as though this platform is at all open to the same abuse as that socialist dictatorship platform we left to be here.

[–] Clerkle 9 points 1 year ago* (last edited 1 year ago) (6 children)

The title seems dramatic, but using the Outlook client to link a third-party account is supposed to connect to those emails with the respective credentials, right?

[–] Clerkle 3 points 1 year ago (4 children)

Why bridged to Thunderbird?

[–] Clerkle 3 points 1 year ago (3 children)

Yeah, but that 500MB storage . . . needs a game plan.

[–] Clerkle 0 points 1 year ago* (last edited 1 year ago)

So you are using Voice without a real phone number to back it up?

Google Voice is not at all designed for that use case.

If it's not possible to create a GVoice account other than by it's design, then obviously it's in good standing according to its design — and not in any way which is "not at all designed". It's a perfectly functional account created however it's designed to allow.

Presumably you used a real phone number to do the initial setup, then removed the routing rule and intended to use the phone number purely through the web UI and/or app.

I can't see those settings right now without access to that account, and the terms you're using are not visible in the app, not by those those terms anyway. I fine tune by experiment, so if it's possible, then maybe, but GVoice is not a highly customizable app, certainly not to any extreme extents.

then removed the routing rule

First, I'm genuinely curious to understand if this is entirely relevant as a potential factor in the experience of the 2FA issue.
And could you please rephrase this according to the terms in the section of the app settings that would allow this?

[–] Clerkle -4 points 1 year ago* (last edited 1 year ago) (2 children)

Actually, we just think in different structures. That theory is not reality. The GVoice number sends to the device logged into that Google account, not the phone number. The 2FA requires verification by the GVoice number, not the private cellular line.

If I am misunderstanding your situation, that is because you haven't explained it clearly.

I encourage you to attempt that statement all over India throughout the multitudes of language variances there. Perhaps you'd take it back. Clearly is a universally controversial definition throughout the world of ambitious communicators. Who are you to judge my intricacies based on your foreign outlooks. I'm not you. I speak my language, not yours. Your comprehension is your achievement, not my achievement. I explained it clearly enough for those with accurate solution to recognize this as viable application of their ability to provide solution. The people with the experience and competence to mastermind solutions clearly recognize the indicators of the experiences they have already identified in concept form and masterminded through to solution. If you don't understand my experience, then you wouldn't have the solution, even if I brought you into enlightenment by further insight.

I need conversations with Google security personnel or investigative members of the media.
Anyone lower in chain of command operates mindlessly and apathetically according to orders. I swear the only people that think autonomously work at the top of a company or its departments, or else fiercely independently.

[–] Clerkle 0 points 1 year ago

I really appreciate your support. Thanks!
Yeah, I'm in the deep end of that creek without all my important contacts, text conversations, email conversations, personal and creative project documents, fifteen years of photos, browser bookmarks. The last thing I realized I can't access now, which is almost as devastating — I can't access linked web accounts, even through the tech support of those website companies, such as eBay and some stores holding my gift card credits.

view more: ‹ prev next ›