

my voyager has counted badly few updoots to you for that!


my voyager has counted badly few updoots to you for that!


deleted
rule 1


piefed is not a derivative. It’s not a fork. It’s a completely different project, in a very different programming language even.
neither does it implement specifically lemmy’s data structures. its not compatible with lemmy specifically. piefed implements activitypub, and is compatible with activitypub servers. activitypub is not lemmy.


protonmail too


wasn’t there a DB conversion document?


Because it’s plausible to keep using it that way, and because they are protecting their asses


which means can change the DNS servers in the router for a mitm Attack if the default password hasn’t been changed (and nobody changes that)
or if the device can succesfully spoof DHCP offers. perhaps crashing the real one, or just being faster somehow


as an ad company they know that perfectly well


so, only the most expensive phones not even my small company will afford


right, but that’s less of a problem


Right now in the US, the number of active LE officers is outnumbered 400 to 1. Meaning each police officer/FBI agent would have to keep an eye on 400 people at a time to get to the kind of surveillance state
that’s silly. nobody is watching your messages scroll by on a screen. its mostly automated.
They do monitor individual “Profiles” when they have justifiable reasons for it. Monitoring aprofile can include everything, phone monitoring, social media monitoring, physical monitoring. But again, you must have been cause of serious worry for them to start such investigations on you.
like being a “terrorist”: a peaceful protester for peace in Palestine. they are detaining people for attending those protests.
but we are still very very far for that Orwell’s 1984 type of surveillance, merely from a technology and capacity standpoint.
we already have the technological capacity.


well, for us


not yet, I guess it’ll take some time to arrive there


does not really matter when brakes are only activated electronically, sadly


Do you have a good reason to believe authorities might be monitoring your phone specifically out of the hundreds of millions of people the could pick from?
they don’t have to monitor any specific phone. that would be like, collecting the info but throwing away most of it. if they are doing something, they are monitoring at the provider level.
They don’t have the capacity to monitor every single phone or conversation.
it does not take much processing power to search in SMS messages as they are sent.
phone calls would be different, but unless it’s volte, processing is easier than transmission, because of the very low bitrate.
If you just go about your life minding your business
“minding your business” means not protesting to leave a foreign country in peace. from a point of view, it’s not our business.


Neither do cars.


did you try setting the default ACL on the shared directory?
section “OBJECT CREATION AND DEFAULT ACLs” here: https://linux.die.net/man/5/acl
I’m not quite sure about how does the inheritance of the default work though. but initially you will need to set the default ACL recursively, so that all existing directories will have the proper default ACL


maybe you don’t know but it’s not enough to start working on a solution when traditional cryptography has already failed. you have to start much much earlier, to have a solution much earlier. because most things encrypted one way will not be re-encrypted with new tech later, for various reasons.
“what are those? I only know duplavé.”