I've seen a few of those documents entirely formatted in bold and/or italics. So, not "plain" text.
Coins in the hat, tomatoes in the face, please!
"The F-35 program has a proven track record of solving issues as they arise, and we're confident we'll continue to do so."
Funny, isn't it? If you throw enough money at most problems, they go seem to go away! From almost start to finish, this "program" has been an exercise in "work richer, not smarter".
You're telling me it's "absurd" for her to sue, and she should "Grow The Fuck Up (tm)". But you're not telling me what she should actually do. What choices does she have other than suing?
I interpreted the GP post a bit differently. I agree that it is absurd that she is suing her parents over this stuff...but that it's not as absurd as her parents not taking them down (or changing the sharing to "Me only"). The whole situation has gone sideways.
Perhaps her parents are considering it on the same level as a scrapbook/album? I only hope that someone explained to them a key difference:
Facebook sharing is like a picture album that you have no problem lending out to any of your friends (or FoF, or member of the public, depending on sharing settings), any time they want it, with no idea what they are going to do with it (including making copies), while still having 100% certainty that it will be returned in perfect condition).
I won't lie; the idea horrifies me.
One congressional official, who has been briefed recently on the matter, said
I first read this as "bribed". Not sure if that says more about me or my perception of members of the U.S. Congress.
into the same premier league of public corporations as U.S. tech giants Apple, Alphabet, Microsoft, Amazon and Facebook.
In before "How is Google not on that list??"
The Server Application in Windows 10 isn't running inside of a hypervisor; it's "running on the OS, getting all the benefits of performance and system access, as well as expanding the potential attack surface." eWeek reports on a new threat discovered by Alex Ionescu, the chief architect at cybersecurity company Crowdstrike, which begins with the fact that "The Windows file system is also mapped to the Server Application, such that the Server Application will get access to [...] files and directories."
Ionescu says "There are a number of ways that Windows applications could inject code, modify memory and add new threats to the Server Application running on Windows." According to eWeek, "The modified Server Application code in turn could then call Windows APIs and get access to system calls to perform malicious actions that might not be mitigated."
I'll Tell you what else increase your attack surface: Turning the computer on.
Didn't RTFA (naturally!), but the summary fails to convince me that this is more than incrementally worse than running...well...MOST applications that do anything useful on Windows.
Any given program will expand to fill available memory.