7heo

joined 1 year ago
[–] [email protected] 13 points 7 months ago

I too, like OP, thought I found the grail when I got my kids. People suddenly accepted using my communication preferences. Only to find years later that they didn't. They didn't care, understand, or respected my wishes. Don't fool yourself: some people do care, but that is 10% tops.

[–] [email protected] 15 points 7 months ago (2 children)

This really is the best way. Once there's a REASON for extra security, people understand and want to learn more.

No one cares. Nobody around you understands the security, the need for it, and the requirements. They will pretend, to see your kid. And then immediately and completely stop caring. It works for making people adopt your favourite messenger, yes. But nothing else.

[–] [email protected] 107 points 7 months ago* (last edited 7 months ago) (6 children)

I have two kids. I asked people to use signal to send and receive the photos. Asking people to follow your requirements only works for the direct immediate communication. The photos of my kids were sent by the recipients I sent them to (over signal) to other members of the family, over gmail (unencrypted), WhatsApp, Instagram, etc. I learned that years after.

This was in direct violation of my express requests. When I confronted them, they played dumb.

So, not to be a buzzkill here OP, but if you did this to get more people to use your messenger of choice, good job, it worked. If you did this so the pics of your kids stayed on safe apps, don't fool yourself. They didn't.

[–] [email protected] 7 points 7 months ago (1 children)

Yeah totally merge everything, people like a good spaghetti salad.

[–] [email protected] 1 points 7 months ago (1 children)

If you can't count to 3, that's a you problem, dude...

[–] [email protected] 4 points 7 months ago (1 children)

Love how nuanced this is 🙃

[–] [email protected] 6 points 7 months ago* (last edited 7 months ago) (5 children)

So, lemme get this straight. We fucked up the climate with industrialisation and uncontrolled capitalism, through energy consumption. Now, the #1 industrial company (that's two for two, if you're counting) in chip making is using one of the most energy (and there we go, 100% 🥳) intensive technology at our disposal to try and eventually have a shot at maybe keeping the climate in somewhat of a check... Am I the only one seeing this? 😶

That's the energy equivalent of giving every kid and teacher guns to "stop school shootings". 🙃

[–] [email protected] 9 points 7 months ago* (last edited 7 months ago)

I found it here.

Here is the (IMHO) relevant part (emphasis mine):

If you use the App with an account hosted on a third-party server, then there are only a few cases where FUTO may learn any information at all about your use of the App.

  • If you have the App configured to use Google push notifications, then FUTO's push notification gateway will be involved in delivering push notifications from Google to your device. Push notifications include information on the Matrix event that generated the push, including: the human-readable name and Matrix user identifier for the user who sent the event and the Matrix room identifier for the room containing the event. Users who desire a greater level of privacy can configure the App to use UnifiedPush instead of Google Cloud Messaging. When a user on a third-party server receives a UnifiedPush notification through their third-party push server, FUTO does not see the notification or learn anything about it.

  • If you obtained the App from the Google Play Store, and the App crashes, then we will receive a Firebase crash report.

  • If you sign up for our mailing list in the app, then we learn your email address.

The notification should be UnifiedPush by default, and crash debug reports should be opt-in, not automatically sent out to the dev via Google... (I don't think it is even possible to opt out)

[–] [email protected] 1 points 7 months ago* (last edited 7 months ago) (1 children)

That's the point of the plausible deniability. You can go after them with a personal conviction, but you can't go after them with proof. There's nothing left to "logically connect".

Because they controlled the mechanisms that were designed to hold them accountable, and made sure not to be accounted for.

Kinda like how attackers who intrude on a system delete the logs and other traces of their presence.

[–] [email protected] 3 points 7 months ago* (last edited 7 months ago) (3 children)

There's a wonderfully complex system of deferred responsibilities making sure that the people who actually caused this can have all the plausible deniability in the world, see themselves as having nothing to do with it, and enjoy a very relaxed life with riches we can only imagine.

[–] [email protected] 41 points 7 months ago (5 children)

on their conscience

🤣

Thanks for the laugh, I needed that. 🙂

[–] [email protected] 0 points 7 months ago (1 children)

In that case, your second and subsequent points should have no text, since the source material has no text for them. And the last point can't arguably have text at all either way. 😉

More seriously, the source material has both texts and images, and it was your choice to only represent half of that. You could have easily written:

meme explanation

Note: Descriptive information is in italics.

text image
understanding a meme with text Small brain
understanding a meme without text Normal brain
understanding a meme without text Nor image
understanding a meme without meme

Or:

This meme is taking the classical "expanding brain" meme, and removing increasingly more content with each panel, implicitly prompting the reader to interpolate more information at each step, to practically illustrate the concept of the meme itself. The last panel has nothing at all.

view more: ‹ prev next ›