Software developer interested into security and sustainability.

  • 0 Posts
  • 40 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle









  • Nginx is pretty easy to set up. Look up “nginx virtual hosts”. You might want to use certbot/acme if you don’t have SSL certificates for your domain names. You need either a wildcard certificate (*.example.com), a certificate with SAN (Subject Alternative Name) containing the second subdomain, or two certificates (one for each subdomain). Note that subdomains can be found more easily than path based websites, if you allow connections from the whole WAN.





  • I do not have a lot of experience with commerce but you’re supposed to optimize the customer experience. If the customer needs an account to add something to the cart, he might abandon his purchase during the account creation process.

    Only some percentage of all potential users will abandon the purchase due to something like this, but your goal is to reduce this percentage as much as possible.

    That’s why analytics are used to understand which environment leads to the most purchases and prevent users from abandoning the process.



  • ClemaX@lemm.eetoTechnology@lemmy.world...So I Finally Quit Spotify
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    6 months ago

    If your account is linked to your Google, Apple or Facebook account that might be the culprit (I think you can see this in yout account settings). You need to check that because the consequences could be way worse than just having access to your Spotify account. You can use HaveIBeenPwned to look for leaks matching your e-mail address or password.

    Another possibility is that your browser/OS or spotify client was infected by a token stealer which can automatically steal your access tokens as you log-in after changing the password.




  • Maybe Firefox needs to add a new “Clipboard access” permission that can be granted on a site-per-site basis. When disabled, simple highlight and copy could still be enabled if hidden text cannot be added in between normal text.

    The same permission model could be used system wide, but I do not think that such a feature exists on the X server or Wayland. Maybe using a wrapper that runs before the Desktop Environment?