It’s not as fancy. No graphs, blinking lights, paneled layout.
apparently it has it all
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
It’s not as fancy. No graphs, blinking lights, paneled layout.
apparently it has it all


they can have the slim modem, they shouldn’t get to know anything about the other parts of the OS


don’t forget, any time you meet him


there’s a quiz show on TV in my country. a few days ago they chose some marketing manager. they have dropped out at like the 3rd question, winning nothing. this is rare. Normally I’m cheering for players but I was gleeful for his loss.


as I understood you are complaining that they don’t have a package manager. they do, but not for system software.


you did not read the article


plaintext is the unencrypted form of data. encryption produces ciphertext. encrypting the same data with the same key twice results in the same ciphertext, unless additional steps were taken to insert additional data that does not match (like a nonce) to the plaintext


the way it works is that the veracrypt container basically contains 2 encrypted partitions. if it can’t decrypt the first one with the password, it will try the second one, but always pretend to try both so that the time it takes to unlock it does not give it away. by writing to either, you risk overwriting data in the other one (except that you can input both the hidden and main partition passwords and it will make sure to keep the hidden partition unaffected), but otherwise both partitions are fully functional


the way it works is that the veracrypt container basically contains 2 encrypted partitions. if it can’t decrypt the first one with the password, it will try the second one, but always pretend to try both so that the time it takes to unlock it does not give it away. by writing to either, you risk overwriting data in the other one (except that you can input both the hidden and main partition passwords and it will make sure to keep the hidden partition unaffected), but otherwise both partitions are fully functional


or just the individual characteristics and flaws of the lens/sensor/postprocessing software, some of which can be unique per device, and potentially comparable to other photos made with it.


or any repair show that uses the brand specific diagnostic software, pirated or not


I don’t think the screen overlay permission gives access for screen capture
I was wrong. but this article seems to imply that it’s screen overlay permission is what is needed for this to work.


“tried” why, do you think they failed?


screen capture is an entirely different thing though, and that was not available without permissions for a very long time


note taking apps often dont sync and don’t keep the timestamp when you “sent” it. vikunja does not work offline. a selfmessaging chat app can keep the message until it can send it


They aren’t encrypted, hence why I never said they were.
you did, just with different words. without encryption and with centralized servers how would this claim of yours be the case?
If it’s a private group they don’t know what’s happening.
you know, trust and safety teams aren’t looking at the content with the apps when they look for harmful content. they have access to better moderation tools with access to the database, where the messages are readable to them because of the lack of end to end encryption.


the thread is visible here, just a single comment was deleted


you must be meaning Mr. John Mastodon


what you speak of is certified android. but a vendor can sell android phones (not certified) without google services, and that is android.
that’s interesting. @[email protected] which one is misleading, this parent comment or the post title?