i’m trying to go to my desk to get started, it’s just, there’s all these unfinished and poor abandoned projects scattered everywhere…
i’ll keep trying though!
i’m trying to go to my desk to get started, it’s just, there’s all these unfinished and poor abandoned projects scattered everywhere…
i’ll keep trying though!
yeah i’m rethinking some stuff too, even in some utopia i think some information related to me might make life inconvenient, so the best way to protect that (e.g. not disclosing it digitally) maybe needs outta the box solutions.
related, does anyone even bother to look at physical mail for stuff? like if i put a cipher in a letter with no return address, using that pen ink that you can erase (which comes back if you put it in a freezer) and only i and my contact have the key to the cipher which we exchanged in-person; could anyone reasonably know it?
it seems digital stuff might be a carrot for surveillance people, maybe it can be made into a honeypot and physical or analog means can make a return.
Hi, could you touch on why F-Droid is less safe? Is it because they package (I think that’s the term?) stuff themselves?
I think they wanted to be, they were advertising themselves!
I have a newer Redmi Phone and I can install an app at least twice. There’s the ‘second space’ as well which is like having a cordoned off user. I use a different fingerprint or PIN and it takes me there.
Yeah, fair. It can’t delete your messages to the extent a centralized system, and that’s an indication of the lack of centralized control? It’s a different threat model I think many find satisfying (though perhaps not most).
I think most of your criticism makes sense.
The part about “not reading private messages” I think is mistaken, or rather, maybe amiss. I mean I don’t have evidence, so this is all conjecture. The sophistication of data surveillance and data gathering makes the content of the message rather meaningless in my view.
EDIT: Oh, I don’t think any adversaries of US, even if working together, make any meaningful threat towards it. It’s really hard to imagine, esp. considering the US has a bunch of successful coups & stuff under their belt.
Huh, would it be possible to provide a source? I might be bad at searching, I’m not finding anything…
EDIT: Ok I found one with some search operators. I can provide links, most were less trustworthy, I’d reserve judgement.
To give an alternative explanation with plausible hypotheses
Some food for thought. I’m not one to jump to conclusions, I think claims require proportional evidence, and obviously my judgement isn’t the same as a security researcher or clandestine operator, so settling on what ‘appears’ to be true without proper investigation isn’t something I do.
Thanks for the info though!!
Yo, thanks so much for the resources! I found what looks to be the relevant group for calendar extensions, one of the most recent proposals/things is representing contact data with JSON.
This is definitely something I’ll be looking into and hopefully contributing to one day!!
EDIT: whoops, here’s a relevant link
t-shirt for me
prices are lower, piracy is nearly free for most, no?
huh, yeah that’s fair i did not actually notice that :/