![](https://media.kbin.social/media/83/39/8339b28f73d798ea595768ef6feb702e94a209bd2d9a6ecf7b68d91356d85808.jpg)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
And even if it is your key, if you can’t see how they made the lock then you can’t prove other keys won’t unlock it.
OSS FTW
Advocate for user privacy and anonymity
And even if it is your key, if you can’t see how they made the lock then you can’t prove other keys won’t unlock it.
OSS FTW
Not to mention Epstein was able to operate freely for decades while flying out high priority definitely-surveilled-at-all-times targets out to rape kids
Make no mistake, intelligence agencies are every bit as complicit as Epstein himself, and they don’t give a flying fuck about “protecting” kids
And oh darn, didn’t you know the only solution is permanent extension of and expansions to all the patriot act bullshit that has been violating our civil liberties constantly for 20+ years?
Shucks. Welp, if it’s “for the children” or whatever excuse they use this time, I guess we have no choice!
Using weak examples and how they are better served in a different way doesn’t mean much
With push data like this you can identify something like every other member of an encrypted group chat by correlating the push notification metadata
They are demanding this for a reason
This.
If there’s a notification for an encrypted group chat, you can use that metadata to identify the devices of all parties involved in that chat, because the push system has to queue all that up and send it at the same time.
That’s just one valuable use of this data.
In steps, and you kinda drive onto it
Not great for mobile operation, however 😬
That isn’t what you’re getting with any cell phone?
A choice they are making in favor of a tech cartel instead of what is best for their customers, which is the problem we want addressed
No it doesn’t, because it’s generally monitor manufacturers that add display port, and people who want to run on large tvs are SoL
The way I solved this problem is by using an https://invidious.io/ instance.
Logins are easy to create, so you can have one for each subscription set you want to create
Private by default, so not even the fingerprint scripts are monitoring you
And the subscriptions page lists just your subscriptions in order of most recently released, nothing else shoved in
Probably the same reason you’d recommend c++ instead of Python to a new developer.
Yes, they’ll learn Python faster, but with c++ they’ll learn programming faster simply due to how much Python does on the programmers behalf.
There are valid arguments for both sides
garuda is one I’ve been playing with recently, and have been very pleased with
It’s build on arch, so not the most beginner friendly base, but they add all my favorite tweaks into the base install. Including fish as the default shell which is more beginner friendly imo
And it’s built and optimized for gaming any comes with all the needed software and drivers pre installed, so even less tinkering required to get it working.
I know this isn’t the answer you want, but consider switching away from compose
entirely
A local kubernetes instance handles all the routing for me, and since i was using that anyway podman was legitimately a drop in replacement for docker.
Podman is just the tool that creates the container for me, running it gets handled by something else entirely.
Also, i can run podman compose up
just fine, no hyphen needed. https://docs.podman.io/en/latest/markdown/podman-compose.1.html
It’s the signal metadata that they want to keep associated with an identity
They still can fulfill government requests for who is talking to who and how often
Can’t have those things being used unregulated or unmonitored
you need a gpu or gpu resources to run a GPT level model
stop thinking of it as “make me a story” and start thinking of it as “let’s make a story together”
First talk back and forth over the basic idea.
Then get a short outline.
Then work on each chapter of the outline.
Then repeat and refine.
Try to keep overall queries under a certain character limit. Google what some good ranges are.
Make sure to save each conversation, and use the outline and previous chapter as the start of your conversation for making the next chapter.
The AI won’t write it for you, but it can be an amazing accelerator if you’re willing to put in the work.
They would have to vett all the closed source systems like iMessage to prove this
Which they won’t do, so it’s all down to the cops getting caught
But without someone forcing that, for consumer hardware they will just “disable” (read: not mention) the ME, because there are entities (the ones that should be enforcing secure consumer hardware) that very much enjoy the ME being there for them to take advantage of on consumer hardware.
and any that code their way out of it using publicly audited and verified technologies will get sued out of business, at best.
Individuals who implement their own encryption will be targeted next, if they aren’t already.