Jump to content

Stocky

Advanced Member
  • Posts

    7,358
  • Joined

  • Last visited

Posts posted by Stocky

  1. This happens during the boot up?

    You'd previously had Mint 19.1 running successfully, or where you upgrading to 19.1, or upgrading 19.1 to 19.2?

    Something got corrupted, look at the following. 

     

     

    • Like 1
  2. I stopped using HSBC to transfer from Singapore about 18 months ago for similar reasons. It used to be a single SGD10 flat rate charge to transfer SGD to my account in Thailand. Then I found myself being hit with a further SGD20 further down the line. When queried I was told it was my Thai Bank. Thai Bank said no it's not, HSBC changed their story to an 'intermediary' bank, when challenged further I was told there was a SGD40 charge to investigate.

     

    That's when I switched to Transferwise.

    • Like 1
  3. It depends on the currency. So advisable to build a spreadsheet of quotes and see what works and if there's an upper limit to any benefit.

     

    I transfer Singapore Dollars, and for me Transferwise wins every time because of the difference in exchange rates. The percentage charge from Transferwise falls from 0.85% to 0.65% between 1 to 25k SGD, after that it remains at 0.65%. HSBC charge SGD30 regardless the amount. But the disparity between exchange rates means that even though a transfer of SGD100k would attract a fee from Transferwise of SGD650 I would still save some Bht18,000 on the transfer. 

    • Like 2
  4. 13 minutes ago, worgeordie said:

    Read the other day that Nord vpn had been hacked and lots of

    customers details stolen, also that half of the VPN companies,

    several of the top ones are owned by Chinese.source,Wilders Security forum.

    I just use Browsec which is good enough for me, $2.99 a month

    on a year package, they are Russian ,but works well with UK

    sites that are blocked and I don't do any online banking,

    The reports of Nord VPN being hacked were somewhat alarmist, Nord VPN's response is below with link. 

     

    A few months ago, we became aware of an incident in March 2018 when a server at a datacenter in Finland we had been renting servers from was accessed without authorization. This was done through an insecure remote management system account that the datacenter had added without our knowledge. The datacenter deleted the user accounts that the intruder had exploited rather than notify us.

     

    The intruder did not find any user activity logs because they do not exist. They did not discover users’ identities, usernames, or passwords because none of our applications send user-created credentials for authentication.

     

    The intruder did find and acquire a TLS key that has already expired. With this key, an attack could only be performed on the web against a specific target and would require extraordinary access to the victim’s device or network (like an already-compromised device, a malicious network administrator, or a compromised network). Such an attack would be very difficult to pull off. Expired or not, this TLS key could not have been used to decrypt NordVPN traffic in any way. That’s not what it does.

     

    This was an isolated case, and no other servers or datacenter providers we use have been affected.

     

    https://nordvpn.com/blog/official-response-datacenter-breach/

×
×
  • Create New...