Fair enough. I was speaking towards the perspective of op. We were encouraged, not required, so there were definitely some folks who would do that.
Other accounts:
Fair enough. I was speaking towards the perspective of op. We were encouraged, not required, so there were definitely some folks who would do that.
That sounds like poor IT policies to me. In previous office jobs I’ve had, our computers were configured with our working hours and we wouldn’t shut them down at the end of the day, so that any updates could happen off the clock and minimize that sort of disruption.
This is why we need a corporate death penalty.
There’s also WSL though your mileage may vary.
There are already plenty of companies that sell managed data removal like this, Mozilla claims to be doing it better and perhaps they are incrementally more trustworthy than the smaller no name ones
What are you talking about? There are endless services where you can get a free email address without spending a cent. Verifying that an email is genuine is a much harder ask than you might think.
Compared to more traditional messaging protocols it could seem that way depending on various factors like time zone differences and how often devices can be online.
It seems like in general, 1:1 conversations will require both participants to be online simultaneously to communicate. Group conversations can have any online participant act as a relay for new messages to offline participants, more or less.
Check out their documentation, particularly the article on how the distributed network works. Also the FAQ is massive! I wish I had the time to read about this in more detail right now
Silicon and silicone are two very different things, just FYI. But that does make sense
It’s still bonded to silicon carbide…
Don’t get me wrong, it’s an important advancement in semiconductor technology if the claims they’re making hold up. But it’s grown on silicon wafers. “Post-silicon chips” feels somewhat misleading here
You are on a different instance than the community. Because it’s a new community it probably just hasn’t federated to your instance yet.
Edit: also if you’re the FIRST person to access the community on your instance, that should be establishing federation in the first place
A ginormous smidgen. A massive skosh. An anemic plenitude.
Yes, enforced pseudonymity would work much better. You can have up to three, or some number, of identities, they’re not linked to your info but they are all linked to each other.
I appreciate your optimism.
You can lead a horse to text, but you can’t make him read
While I appreciate the nitpick, I think it’s likely the case that “kills a bunch of people” is also something we want to avoid…
If a malicious actor has physical access to your machine, you have already lost. Been that way since the dawn of computing. Full-disk encryption can potentially protect your data from unauthorized access, but it can’t really stop a thief from wiping the laptop and making it their own. And if you get it back you probably want to wipe it anyway.
According to your link, hosting an exit node was not a crime by itself, this person pretty much encouraged the illegal activity
The Austrian Court found that this activity may lead to criminal liability for aiding and abetting of a crime of distribution of child pornography when coupled with other circumstances. Of course, mere provision of Tor Nodes would not be enough to establish at least indirect intent (bedingte Vorsatz), which such aiding and abetting under criminal laws usually requires (§ 5 StGB).
In order to find such circumstances, according to PCWorld, the court cited transcripts of chat sessions uncovered during the investigation in which the Weber told an unidentified correspondent “You can host 20TB child porn with us on some encrypted hdds”, “You can host child porn on our servers” and “If you want to host child porn … I would use Tor.” Weber defended himself against this on his blog saying: “Yes, this logs existed – Yes, i recommended Tor to host anything anonymously, including child pornography – Yes, this is of course taken out of context.”
“This cyberattack on a hospital not only could have had disastrous consequences, but patient’s personal information was also compromised,” said Chris Hacker, Special Agent in Charge of FBI Atlanta.
Irl relevant username
And probably contracted out to a company, so they can say it was outside their knowledge/responsibility/control when evil shit inevitably happens
I mean… yeah. A real telco. I figure it has to be one of a few things:
a) The profit margins baked into existing SMS services are razor-thin and there’s no room for a startup to undercut that (unlikely);
b) The monopoly of the existing telcos is thorough enough that they can shut out newcomers;
c) The initial costs of any potential newcomers are great enough that nobody can secure funding;
d) Nobody both wealthy and moral enough has had this idea yet
Front trunk. It’s aggravating slang, but it’s been in use for decades, well before Tesla.