In reality, you can use any blogging solution; they can be hosted on I2P or TOR or WriteFreely or even Lemmy. A Lemmy community is essentially a P2P microblogging solution if used that way.
Then, just sign all your posts on the platform you choose.
In reality, you can use any blogging solution; they can be hosted on I2P or TOR or WriteFreely or even Lemmy. A Lemmy community is essentially a P2P microblogging solution if used that way.
Then, just sign all your posts on the platform you choose.
Just use any p2p blogging solution and gpg sign all your posts?
The CA is purely a way to provide validation that the endpoints being connected are who they say they are; the actual signing certificates are still private. Apple uses a central directory; Signal depends on certificates linked to one way hashes of phone numbers.
Certificate Authority
Messages app by Apple. Not extremely difficult, but has its trade offs, and easier when all devices share a CA.
That last bit is correct. The privacy commissioners are under-resourced and a large number of businesses are not actually compliant with the GDPR. Only a few highly visible infractions get addressed, and even with those the final result is not fixing the infractions and paying the fine; usually a small payment is made along with an agreement that the party will behave better in the future.
MS-BASIC was OK IMO, but I preferred AppleSoft BASIC.
I lost the trust with MS DOS.
What makes you hate tiny little ants?
And this is why it is important to poison the PII databases.
I feel like someone needs to set up a project with scrambled PII mixed with totally fictitious PII and then “leak” it in chunks such that overall confidence in these databases approaches zero over time.
Do you think protesting Trump would do any good? Protesting Biden?
Harris is the only one where protests might actually make a difference.
If you’re just upset, sure, protest all of them. But if the goal is positive change, protesting Harris is the only option that will work.
Harris is currently second in command in the executive branch of the US government. Trump is a weird old guy convinced it’s still the 1980s.
I think that’s enough to answer the question?
That allows it to block those annoying cookie banners without you clicking accept.
I use a different plugin that lets me set my own preferences about how sites should use cookies, and then it strips those banners and applies MY settings.
The thing about those cookie banners is that if you choose to reject all cookies, then no cookie is set to tell the site that you reject all cookies, so the banner will be back on your next visit.
A privacy policy can be “we don’t collect your data.”
They appear to have Experian or TransUnion data which provides multiple records for a single individual. If they pulled in records from multiple sources, (eg, all the credit agencies), then the number of records per person would balloon rapidly.
The worrying thing is that if these are timestamped, that set of data can tell an awful lot about a person that’s useful for identity theft.
If they have my data and it includes a SSN, I can guarantee it’s not accurate.
I use a mix: I’ve got hardcoded hosts files, default third party DNS provider, DoH providers (different for each browser), a PiHole, and a VPN-based DNS resolver that I can run on a per-app basis.
This way, I don’t trust a single provider to handle all my DNS traffic.
SSO can be fine, it all depends on how it is implemented. If you run your own OIDS or manage your own FIDO2 keys manually, SSO works great; it means that every time you access an online account, a different challenge/response is sent, but you only have to manage a single account on your end. This means less data to be stolen, and if implemented correctly, a sso-backed login attempt in a new context will require further action, preventing someone from just stealing your cookies/certificates and having full access to all your accounts.
The problem is that so much SSO junk is intentionally mis-implemented to include third parties in the process where there’s no need for them to be. Avoid those where appropriate.
The problem is that a single leak spreads in ripples. You get it all taken down, but someone sells your data anyway, and it propagates to a whole new set of places. So then you need to get it all removed again. And invariably someone will sell your info AGAIN, and so you go through it during that round too. Eventually it fades out, but that can take years.
Why am I not seeing it on my new tab screens?