

The competition of who can fuck over everyone else the fastest.


The competition of who can fuck over everyone else the fastest.


I get panicky from time to time.
Then I try to remind myself of my threat model.
It helps me to re-center myself.
In a storm of emotion, logic can be my rock.


So I guess you could say it’s…Metadata?



I 100% agree, but to be fair, in some jobs there really isn’t much to do. Lol.


With dumbphones, you’re usually limited to regular phone calls or SMS/MMS messaging.
That’s kind of the point.
Sure, you can’t do much with them, but by that very fact you also won’t have nearly as much data to be spied on.
Likewise, you can do much more with a smartphone, but that comes with a much higher surface of attack, and you also have to work a lot harder to keep all the data away from spying.


That’s something I did not know. Thanks for educating me!


Well that’s interesting! :O


here
Where?


Honestly, it might be I’m wrong about this since I don’t live in a big city so maybe it’s different in like NYC or some shit, but I’m under the impression that QR Codes have kinda been dead in the US. At least I hardly ever see one in the wild anymore. Mainly I presume for that reason. It’s a prime way for malware injection.


Speaking as an ignorant American who still happily uses card, I have to ask:


Apple Maps -OSMandMaps. Seems like a good option, but it’s not ready out the box. I need to do more tweaking with it. -Magic Earth. Haven’t tested it yet, seems good. But I’m looking for free options first before I dabble with paid stuff.
If you like OSM but want a more user-friendly interface (disclaimer: I’m an Android user so I have no idea what OSMandMaps looks like), check out CoMaps! It was forked from Organic Maps due to heavy transparency concerns surrounding the former and uses downloadable OSM maps as a backend! It’s available for iOS too!
https://www.comaps.app/download/
Google Docs -OnlyOffice. Seems like it does everything I want.
I’ve heard OnlyOffice is great, but if you don’t need or want any AI stuff, don’t mind a slightly less-modern UI, and collaboration isn’t a requirement, then LibreOffice is pretty awesome too. Just giving you another option. ;)


I was more referring to telemarketers. Lol. I don’t use landlines anymore for that reason. I’ve thought about it from time to time, but then I hear about the experiences of other people who still have them, and apparently it’s just a telemarketer cesspool at this point.


NO.
LINE MUST ALWAYS GO UP.



Weary traveler, I beseeth thee to not harken down this path.
I hear tales of dark spirits haunting those old byways. Ones of greed, with an emotionless façade, and hunger for gold from too-eager souls.


Okay, so, originally, I was going to look it up to prove you wrong, but after looking it up across multiple sources, it seems that you’re right and I’m wrong.....mostly.
How-To Geek, Proton, and CloudFlare all mirror what you say.
However, the Wikipedia page section “Definitions” does back me up somewhat. It says:
The term “end-to-end encryption” originally only meant that the communication is never decrypted during its transport from the sender to the receiver.[23] For example, around 2003, E2EE was proposed as an additional layer of encryption for GSM[24] or TETRA,[25] ... This has been standardized by SFPG for TETRA.[26] Note that in TETRA, the keys are generated by a Key Management Centre (KMC) or a Key Management Facility (KMF), not by the communicating users.[27]
Later, around 2014, the meaning of “end-to-end encryption” started to evolve when WhatsApp encrypted a portion of its network,[28] requiring that not only the communication stays encrypted during transport,[29] but also that the provider of the communication service is not able to decrypt the communications ... This new meaning is now the widely accepted one.[30]
(Relevent text is embolded.)
So, I’m not misunderstanding, just misinformed that the definition changed.
Make no mistake, of course: I do appreciate you correcting me as I hadn’t realized the definition had changed. Lol.


WHAT. THE. SHIT. ಠ_ಠ


You are clearly misunderstanding me.
If the keys are stored server-side, that means it’s stored by either the “sender or recipient”. The server is among those two options.


I mean it’s in the name. A message containing media and not text is simply not a text message. Many people use them incorrectly but it’s literally in the name.
Hey, I get it now. Lol. I was just explaining what my mindset was.
RCS is (supposedly) E2EE so keys are stored locally.
Well, you can have E2EE with keys stored server-side. It’s just kind of pointless from a security/privacy standpoint, but I’ve seen it happen.
OF COURSE they called them domestic terrorists. That’s what all authoritarian regimes call groups that are a threat to them. 🙄