Hmm, this is interesting, it looks like if it was a multiboot solution
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
Hmm, this is interesting, it looks like if it was a multiboot solution
It’s like BIMI couldn’t save you anyways. I’ve just read this a few days ago: https://16years.secvuln.info/
It’s the equivalent of idiots posting that wall of text on Facebook a decade or so ago saying they don’t give Facebook permission to use their pictures, posts…etc.
I think it’s quite different. On facebook, you have accepted a ToS telling that facebook now owns that data. Also, that “movement” was against facebook, the platform itself.
Here you haven’t accepted a ToS that wants to use your submissions for whatever they please (or did you?), and also, this movement is against outside parties, not the platform provider.
Maybe they have edited it, but it’s there at the end:
For its part, LocalMonero recommended the non-custodial, decentralized exchanges Haveno Serai, which are open-source alternatives that have yet to fully launch. Haveno runs on the Tor network and functions using atomic swaps, while Serai will use a multisignature setup.
Android is also linux based. Is chrome os more like Linux than that?
I started my career as a media lawyer to protect those who made things that helped us see one another, and the truth about our shared world. Almost fifteen years ago, I co-founded and built a media law clinic to train others to do the same.
Hmm, sounds good.
I am not naive about the Internet at its worst. From the Edward Snowden disclosures to a quick trip to Guantanamo Bay, Cuba, much of my career has confronted issues of surveillance — including of my own religious community.
Yeah, I like that we seem to agree.
[…] so we built an accountability journalism outlet, The Markup […] Our team imagined and made things people used to make informed choices. Blacklight, for example, empowers people to use the Web how they want, by helping them see the otherwise invisible set of tracking tools, watching them as they browse.
Oh, Blacklight, I know that’s a cool tool!
In our particular moment – as we’re deploying large-scale AI systems for the first time, as we’re waking up home pages from their long rests, and trying to “rewild” the Internet beyond walled gardens
What? Why?? Oh fucking no
We can imagine a future that centers human agency, and then we can build it, bit-by-byte.
Yeah but AI is most probably not a toolbox for that
Yeah, that’s true for most of them, they all are basically useless. It’s only worth to use private crypto, like Monero, that is designed actually with privacy in mind.
but I don’t know if it makes sense if my bank knows I’m using it anyway so they can sell that info to advertisers, gov, etc.
Yeah it’s not ideal, but it’s still much better because these services won’t give access to your data if they can avoid it, and then data that is encrypted is not useful when given out
Did they talk about what features and improvements are planned?
I largely welcome restricting massproduced mobile surveillance machines made by a chinese hq’d company. Don’t misunderstand me I hate teslas too for this, but we don’t need more of this shit.
Theft Detection Lock is a powerful new feature that uses Google AI to sense if someone snatches your phone from your hand and tries to run, bike or drive away. If a common motion associated with theft is detected, your phone screen quickly locks – which helps keep thieves from easily accessing your data.
Why would we need AI for that? That just makes the function unpredictable. There must be a real solution to detecting this.
While I agree with you, the first step for user centric Android flavors regarding security is to support relocking the bootloader, with a custom (preferably the user’s own) digital signature. As long as we dont have that, an attacker could flash or just boot a custom bootloader through fastboot that does its own thing.
However that doesn’t really depend on Android system developers, I think, as the problem arises from the inferiority of almost every phone’s bootloader (chain) (because most phones does not support setting up a custom signature for bootloader verification), and probably that can only be reasonably solved by device manufacturers, because as I understand, bootloaders do a lot of heavily device specific things, so there cant really be a common (primary) bootloader, and making one for each phone is a lot of work that also involves lots of reverse engineering, and maybe the early bootloaders cant even be overwritten on some phones…
clearly
?
Honestly this comment sounds like a bad sales pitch. Even more besides that referral link
If they do that, nearly no one will find it, though. Are there larger non-federating servers?
I think the problem with this approach - read: the reason I don’t do this - is that you’re blocking communities from ever appearing again, and if your interests change, you still won’t see them. I think this is more likely to result in creating an echo chamber.
What I do is subscribe to communities that I found interesting, and then scroll all once in a while to see if there’s something else I like
I’m mostly reading my subscribed feed, and sometimes switch to all and if I find an interesting community, I subscribe to it too. The only communities I have blocked are either porn related or operating in a foreign language, which I see even though havening set my language preferences.
I don’t consider myself to have a lot of tech knowledge. I’m not working in the field, and there’s lots of things I want to do better than now.
If you don’t yet know about what is systemd and how does it work, it’s fine. The documentation of the unit files is a bit more complicated than warranted, like, it’s structure is not that readable, but the syncthing documentation helps in what you need to do
But there are many ways such as access logs, server monitoring etc
Which are all in the control of the company running the servers. If we trust the company, we can trust them giving honest information on these, but if we don’t trust the company… they could just redact logs or even straight out fake them
I only have one question: how will your company find out?
It’s certainly possible, if not else than with the use of FUSE. But I did not see such a project yet that can do this.