@ocean @seliaste
You can use Syncthing, FolderSync… even the monster Dropbox… What I use is Filen, but you have to manually download the folder for Android. This is not a big problem for me, though, because I'm mostly a PC user 💻️ I might look for other options in the future, but I'm OK now.
💡 Ah, and not to forget: You could use Logseq's sync if you like it in order to support the project (I personally enjoy it a lot, it helps me very much with learning, and it's not so hard to learn how to use it if what you want is not highly advanced text formatting)
@uma_mocinha @dobrado Achei sensacional! De cara, #AGPLv3 e não obriga a executar #JavaScript! 👏
O teste foi pesquisar por "daltux": encontrei coisas que não lembrava mais! Como quando #Dropbox deixou de suportar (2018), em #GNU/Linux, sistemas de arquivos que não fossem ext4 limpo e esta publicação https://bsd.slashdot.org/story/18/08/10/2120248/dropbox-is-dropping-support-for-all-linux-file-systems-except-unencrypted-ext4 citou meu então "tuíte" de adeus àquela "nuvem" no microblog
Foi a partir de então que, felizmente, vim a conhecer #Syncthing 😻
New submitter rokahasch writes: Starting today, August 10th, most users of the Dropbox desktop app on Linux have been receiving notifications that their Dropbox will stop syncing starting November. Over at the Dropbox forums, Dropbox have declared that the only Linux filesystem supported for storage...
CVE-2025-24054, NTLM Exploit in the Wild
A critical vulnerability, CVE-2025-24054, related to NTLM hash disclosure via spoofing, has been actively exploited since March 19, 2025. The flaw allows attackers to leak NTLM hashes or user passwords using a maliciously crafted .library-ms file, potentially compromising systems. A campaign targeting government and private institutions in Poland and Romania used malspam to distribute Dropbox links containing archives exploiting this vulnerability. The exploit can be triggered with minimal user interaction, such as right-clicking or navigating to the folder containing the malicious file. This vulnerability appears to be a variant of the previously patched CVE-2024-43451, sharing several similarities.
Pulse ID: 680034fc84efc0751b3bc07d
Pulse Link: https://otx.alienvault.com/pulse/680034fc84efc0751b3bc07d
Pulse Author: AlienVault
Created: 2025-04-16 22:53:48
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #Dropbox #Government #InfoSec #MalSpam #Nim #OTX #OpenThreatExchange #Password #Passwords #Poland #Spam #Vulnerability #Word #bot #AlienVault
OneDriveに続き、Microsoftも最新のmacOS 15 Sequoiaでホームボリューム以外のAPFS外部ボリュームにOneDriveコンテンツの保存できるようになったと発表。
https://applech2.com/archives/20250417-microsoft-onedrive-support-non-home-volume-sync.html
#applech2 #Microsoft_for_Mac #Dropbox #Finder #Mac #macOS_15 #macOS_15_4 #Microsoft #OneDrive #Sequoia #アップデート
I have to solve 8 puzzles just to log in to #Dropbox? That is ridiculiz.