Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
Opt-in for the SMS recipient too?
I’m not interested in the twitter format at all, so it does not make sense to me to use mastodon. The only reason I use nitter is a single person, who does not use mastodon. In my case there’s literally nowhere to move.
Sounds like a second job.
Only a job for your PC, it just needs to shovel bytes.
You only need to download a few popular torrents and seed them for some time. Some trackers count score for certain torrents differently, like if almost no one is seeding them anymore, or if there is a high demand. It is probably marked visibly when they do that. I don’t think it requires much work, and probably it’s fine too if you only deal with it every few days. Just keep the torrent client running and seeding, at it’ll be fine. Unless you don’t use your computer much, it’s enough if the torrent client runs while your PC is on, but under a few hours a day I’ll build up slowly.
A lot of phone apps also have facebook trackers built in
A subpoena is a court order. Nothing has changed and they market that as an improvement.
An order issued under the authority of a court, commanding a person to appear in court on a particular date, usually to give testimony in a legal case. A writ requiring someone to appear
https://www.wordnik.com/words/subpoena
A subpoena is a kind of court order. Specifically it is an order to a particular person to appear and testify at a particular time and place. In many but not all cases, the order also requires that person to bring specified records or documents along. That is known as a subpoena duces tecum. In some cases this is used to, order the production of documents without any accompanying testimony.
[…]
Ther are many other court orders, such as an injunction which is generally an order not to do something. Different jurisdictions may use different terms for orders with similar effects. The exact name and exact effect of a given order will vary with the jurisdiction, which is not stated in the question at the moment. The needed process to obtain a court order will also vary. Without a jurisdiction, a more specific answer cannot be given.
If anything, they have even broadened the scope of documents they now accept for information disclosure requests.
I’m a little confused. Why do you think this is a cheap router?
As I know pfBlocker is a component of the pfSense firewall OS, and if OP runs that on their router, it must almost certainly be an x86 machine and have much more RAM than the amount that cheap routers have, according to the minimum reqs.
That’s good to be aware of, thanks!
I haven’t heard before that this frog is a nazi symbol. I’m also seeing it relatively often at places where I don’t think it’s use would be accepted if that was the case
Sorry for the delay. In this case they were lying that they have improved their process regarding handling such orders, implying that they will now only comply for fewer orders that they can’t (yet) deny.
How do you know it is? Dpi is often wrong about both protocol.
I didn’t mean to say that. My point wanted to be that it is a bit too much traffic for it to be honest NTP traffic (as it was assumed above), unless the program sending it has a honest bug
Ok, it’s not Tor, but why would it generate 100 MB of NTP traffic every day?
You wouldn’t own a house!
You wouldn’t own a car!
You would be happy!
Because we said so.
This is just my opinion, but why would they tell you the truth? It’s not like you can find out they are lying.
I don’t think that was the question. I think you are responding to a question like “what if the go/rust compiler has a backdoor”, but the actual question was which are better from a privacy perspective, and what that means in this context is whether they mine the user’s data (the developer using it), or if they upload statistics of the user’s system or the compiled program at all.
Over the years there have been a few times I tried to communicate with the developer, and he was always arrogant.
At the same time it’s also important that the provider only complies with requests where it legally has to. I trust Proton to act this way.
This is not an ad, this is pure deception
They tell whatever they want until their claims can be validated with the source code. If we take it for granted that they use an original, unmodified version of the signal protocol programming libraries, there are still multiple questions:
Any of these questions could reveal problems that would invalidate any security that is added by using the signal protocol. Like if they use an outdated version of the programming library that has a known vulnerability, if they analyze the messages in their plain data form, or on the UI, or the keypresses as you type them, or if they are mishandling your encryption keys by sending them or a part of them to wherever
I don’t think so. I never delete such emails. Why would I? Not like it’s in the way
Just set up a weekly cron job at the busiest hours