gonna need some citations there, bud, otherwise i’ll safely assume you know fuck all about world history
Advocate for user privacy and anonymity
gonna need some citations there, bud, otherwise i’ll safely assume you know fuck all about world history
Yeah I get that occasionally, swapping to another endpoint fixes it right up
Its also about monitoring what people are saying privately about your shows
And even if it is your key, if you can’t see how they made the lock then you can’t prove other keys won’t unlock it.
OSS FTW
Linksys luckily still sells OpenWRT specific routers.
sure, and then you have to make sure you get the correct radio accessories, as the built in pi wifi isn’t going to do so hot acting as the hotspot for multiple video streaming devices.
Radios which you also have to vet against the approved hardware list for OpenWRT, and having multiple channels is even more of an issue with the lack of USB ports (depending on model)
In my experience it’s because it’s finicky as fuck and requires very specific (and often more expensive) router models, and even then it still crashes just as much as a proprietary os router.
It’s called an “MBA” and they are the tip of the enshitification spear
Not to mention Epstein was able to operate freely for decades while flying out high priority definitely-surveilled-at-all-times targets out to rape kids
Make no mistake, intelligence agencies are every bit as complicit as Epstein himself, and they don’t give a flying fuck about “protecting” kids
And oh darn, didn’t you know the only solution is permanent extension of and expansions to all the patriot act bullshit that has been violating our civil liberties constantly for 20+ years?
Shucks. Welp, if it’s “for the children” or whatever excuse they use this time, I guess we have no choice!
Using weak examples and how they are better served in a different way doesn’t mean much
With push data like this you can identify something like every other member of an encrypted group chat by correlating the push notification metadata
They are demanding this for a reason
This.
If there’s a notification for an encrypted group chat, you can use that metadata to identify the devices of all parties involved in that chat, because the push system has to queue all that up and send it at the same time.
That’s just one valuable use of this data.
In steps, and you kinda drive onto it
Not great for mobile operation, however 😬
SIM card tracks location and sells it too
That isn’t what you’re getting with any cell phone?
A choice they are making in favor of a tech cartel instead of what is best for their customers, which is the problem we want addressed
No it doesn’t, because it’s generally monitor manufacturers that add display port, and people who want to run on large tvs are SoL
The way I solved this problem is by using an https://invidious.io/ instance.
Logins are easy to create, so you can have one for each subscription set you want to create
Private by default, so not even the fingerprint scripts are monitoring you
And the subscriptions page lists just your subscriptions in order of most recently released, nothing else shoved in
Probably the same reason you’d recommend c++ instead of Python to a new developer.
Yes, they’ll learn Python faster, but with c++ they’ll learn programming faster simply due to how much Python does on the programmers behalf.
There are valid arguments for both sides
and any that code their way out of it using publicly audited and verified technologies will get sued out of business, at best.
Individuals who implement their own encryption will be targeted next, if they aren’t already.