

by having you trust intel instead of themselves: https://signal.org/blog/private-contact-discovery/
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045


by having you trust intel instead of themselves: https://signal.org/blog/private-contact-discovery/


that’s interesting. @Blaze@piefed.zip which one is misleading, this parent comment or the post title?
It’s not as fancy. No graphs, blinking lights, paneled layout.
apparently it has it all


as I understood you are complaining that they don’t have a package manager. they do, but not for system software.


you did not read the article


because they can barely keep the lights on with one provider. but I’m sure you will be a long-term signal backup subscriber, and until then you are regularly sending them donations.


bad idea by the company


and how exactly is azure or google cloud better?


plaintext is the unencrypted form of data. encryption produces ciphertext. encrypting the same data with the same key twice results in the same ciphertext, unless additional steps were taken to insert additional data that does not match (like a nonce) to the plaintext


the way it works is that the veracrypt container basically contains 2 encrypted partitions. if it can’t decrypt the first one with the password, it will try the second one, but always pretend to try both so that the time it takes to unlock it does not give it away. by writing to either, you risk overwriting data in the other one (except that you can input both the hidden and main partition passwords and it will make sure to keep the hidden partition unaffected), but otherwise both partitions are fully functional


the way it works is that the veracrypt container basically contains 2 encrypted partitions. if it can’t decrypt the first one with the password, it will try the second one, but always pretend to try both so that the time it takes to unlock it does not give it away. by writing to either, you risk overwriting data in the other one (except that you can input both the hidden and main partition passwords and it will make sure to keep the hidden partition unaffected), but otherwise both partitions are fully functional


or just the individual characteristics and flaws of the lens/sensor/postprocessing software, some of which can be unique per device, and potentially comparable to other photos made with it.


or any repair show that uses the brand specific diagnostic software, pirated or not


note taking apps often dont sync and don’t keep the timestamp when you “sent” it. vikunja does not work offline. a selfmessaging chat app can keep the message until it can send it


They aren’t encrypted, hence why I never said they were.
you did, just with different words. without encryption and with centralized servers how would this claim of yours be the case?
If it’s a private group they don’t know what’s happening.
you know, trust and safety teams aren’t looking at the content with the apps when they look for harmful content. they have access to better moderation tools with access to the database, where the messages are readable to them because of the lack of end to end encryption.


the thread is visible here, just a single comment was deleted


what you speak of is certified android. but a vendor can sell android phones (not certified) without google services, and that is android.


which would be ridiculous because it is android just the same


actually databases have problems, sqlite and more advanced too, because precise enough file locking is usually not implemented for network filesystems
selective enforcement could give them way to give you effectively a life sentence for breaking this and that law