bloubz

joined 2 years ago
[–] [email protected] 2 points 1 year ago

Cheese??? No no

[–] [email protected] 5 points 1 year ago

Organs contain neurons, part of the neural network, they know something

[–] [email protected] 3 points 1 year ago

I did! They felt betrayed, as I had

[–] [email protected] 14 points 1 year ago (2 children)

3 years of a toxic relationship with my ex. I did something awful by reading her Messenger texts, could not say anything about the terrible things I saw

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago)

The hacker on the other side of the RAT is getting scared but comes back as a kink

[–] [email protected] 4 points 1 year ago (2 children)

Extensions will soon be ported to mobile Firefox, if the developers do it

[–] [email protected] 3 points 1 year ago

Why would you be in trouble legally and why jail time??

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

Well this is not particular to Beeper, that's always the case when using Matrix + Bridges for third parties right? Even though they are the main mainteners of a good part of the existing bridges

[–] [email protected] 5 points 1 year ago (1 children)

Pink Floyd and Roger Waters concerts are getting out of hand

[–] [email protected] 3 points 1 year ago

Dotworlders are so weird

[–] [email protected] 2 points 1 year ago

You're drunk. Nobody said HTTPS

But we said IRC

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

Ok thank you so much. What I would like to point at in the difference between having an end-to-end encryption between two recipients and at-rest encryption for information owned by Signal (in this example), is the purpose of those two different things. E2E encryption means only the two agents at each end have the mathematical possibility to decrypt the info: this is privacy by design. At-rest encryption on Signal servers of different things is a security layer meant to protect users' privacy against attackers, but Signal have the means to decrypt it, and they would do it in the normal usage of the service. This would also mean they can (and have to) transmit decrypted information to whatever agency demand them to

view more: ‹ prev next ›