Drug dealer : Network - Location - Contacts
Facebook : I’ll take all
Drug dealer : Network - Location - Contacts
Facebook : I’ll take all
right after I read your comment I saw this…
So what are we going to do about it ?
Answer: build our own tech + leave big tech
There are, but I’m not linked to some sort of an application that will ( it’s not a matter of if ) be exploited by a malicious third party or even the first party ( the government ), good luck hacking my paper passport
Today’s proposal to digitalise passports and identity cards paves the way for a more seamless and secure travel experience,” Věra Jourová, the Commission’s Vice-President for values and transparency, said in a statement.
we know what happens when someone says the word “secure” … ahhhaaam…
remember, someone a person or a government or a cyber terrorist group will track these border checks…
and the app itself won’t be so transparent as your Lemmy client, I think I’ll stick to paper passport
Oh boy, I never read the entire thing, but they can decrypt quantum encrypted messages, if that’s true ( and I wish cryptography experts could debunk this ), if that’s true, then the NSA has went too far with this open source honeypot… perfection!
l freaking love that this thing exists, the summary feature is some next level genius
France wanted a backdoor… they got it, and Telegram was never trustworthy…
CW : Content warning TW : Trigger warning
AFAIK he’s reliable when it comes to facts
he does have some facts, he only shares the ones that suites his narrative, what kind of journalism is that?! journalism is about following the truth no matter where it goes… but he doesn’t do that, he just misquotes people and say : “see, they said that, what awful people”
for example, in a recent video he made about the EFF he said that they support kids looking at porn, but off course they never said that, they said they’re against ID’ing people who watch porn, because that’s a serious threat to online anonymity…
Also in a recent video about the EFF he literally made statements they never made, it was so obvious that one of his loyal conservative fans called him out on it
surprised he didn’t shadowban this comment, quot
… My default position is that any software-based organization is going to be run by libtards, but your accusations simply don’t line up with the articles. “If you have the wrong politics, you should be prosecuted to the full extent of the law, that’s their repeated stance they’ve stated over and over”. Links please “If you’re a Republican … and happened to be standing outdoors on that day, you should be in jail. That’s the EFF’s stance.” Again, links please"
to Lunduke as long as he’s getting push back from the left leaning individuals in these groups, then he must be on the right path, that’s how bias works not truth
for the new people to the linux communtiy, the reason behind the CW tag, is because Lunduke is not a trustworthy source, he’s not in it for the love of journalism but for the love of pushing agenda… and he speads propaganda, cherry picks his facts, and straight out lies about what people said or could have meant
you know how to know you’re listening to false narratives … well… most of the time it makes you feel triggered or angry…
flatpak update
fair point, but like Edward Snowden once said: “perhaps the fundamental rule of technological progress: if something can be done, it probably will be done, and possibly already has been.” he was talking about surveillance tech and programs.
What it archives though and afaik is intended for is the possibility of easily and quickly “erasing” the disk by just overwriting that encryption key a couple times, I don’t remember if that used a special tool or something but if that is useful to you it probably wouldn’t be hard to find more info on this.
first of, apologies for the late reply… this reminds me of when I ( not so long ago ), used to overwrite random data into HDDs using Eraser, before selling my laptops or switching a company laptop, I hear SSDs are designed to last longer, so that practice ( of writing random data so it’ll erase the sensitive data ), is “kind of” a time waste now… but I guess it’ll make it hard to retrieve that data, unless the attacker has some specialized software and hardware
Samsung is a reasonably trustworthy company, not from US/UK, not Chinese, so if they say they have a clean implementation of this I’d trust them
I wouldn’t trust any company based only on their claims, they need to document ( explain how it works ), develop things in the open ( publish the firmware ), the schematics, even the CAD drawings… like what the folks at System76 and Framework are doing…
That said, it sure sounds cool to have that level of protection, if only Samsung wasn’t a shitty company already ( in my book )
Would be kinda a national security issue for them if it wasn’t seeing how Samsung is everywhere in gov an private sector in Korea.
I’m speculating here, but it wouldn’t be far fetched if they designed a secure encrypted clean hardware for the government with military grade encryption as they like to call it, while the end users receives only enough encryption power to protect against normie threat actors like a spouse…etc companies have these policies where they provide a premium/quality products for businesses and governments but cheap or in many cases poorly made products to end users … like Windows Home
Telegram adds option to let users report content on app two weeks after CEO Pavel Durov’s arrest After almost 2 weeks of CEO Pavel Durov’s arrest, Telegram will start moderating private chats as well.
this all seem confusing, there’s no such thing as “private” chats on Telegram, only secret chats which are E2EE, well even their encrypting is questionable
Web rendering engine written in Rust
I heard from people who have tried both Void and Alpine, that Void is much more easier to use as a desktop OS while Alpine is more suited as a server OS…
Thank you, this answer covers it all :D
but if they want to get at the data they’ll just pull the HD and run code-breaking software on it on and entirely different super-computer. TPM won’t help you at all in that case.
You make it sound so easy and doable, but the reality is that without meeting certain conditions such as the existence of the original TPM chip, a brute force attack will render the data irretrievable… And even if I’m wrong in the last part, that would still be a pain in the butt for the attacker… and it’ll buy me time… like you said … belts-and-suspenders
This doesn’t sound to me as if you’re concerned about espionage
Because i don’t have second chances, which is why I wish there’s way to erase everything by entering a key combination… somehow… Idk… like Android has that…
The curly hair, the silver chain, the Bjj… appears more on camera with his wife and daughter… going to podcasts… Etc…
They’re trying really hard to humanize him, but we all can see through the lies…