Data breaches happen, and when they do happen they jeopardize millions. The best way to protect yourself from data breaches is limiting the data you share — read our article (below) to know more.
Consider a scenario — you got notified about a data breach from xyz.com, explaining your email, password and last known location have been compromised. To make things worse, you are habituated to use almost identical passwords for all your accounts. Meaning as xyz.com is compromised all other accounts are also compromised.
As anyone would realize at this point, using unique, strong passwords for each account is…
I remember the day I discovered activity controls on Google dashboard. To my horror I realized, it knew all about me. What I searched, watched, posted, where I have been, even audio recording from voice searches. The audio recordings freaked me out.
It is not just Google. All governments, big techs (Apple, Facebook, Microsoft, to name a few) tracks your digital footprint, by default. Yes, they (probably) know you are reading this article.
You are being tracked is a cliché. The world has changed since 2013 — mass surveillance, propaganda and fake news is on the rise; more than ever…
If you are new to the concept of lint, just take it as a set of best practices (programmatic and stylistic) for code sanity.
Linting helps to reduce the number of errors, improves code quality and accelerates development by finding errors earlier.
🔎 If you want to know how it started, read the paper by S. C. Johnson
ESLint is a…