Ain’t that the damned truth.
Ain’t that the damned truth.
I was just about to ask that myself.
The only stupid question is the one you don’t ask.
First, I don’t like calling proprietary software “official”. Proprietary software is just software with closed source code. What makes something official is someone deciding “OK, this is what we are going to use” or that it definitely came from a particular source. Getting Docker directly from Docker repositories rather from a distributions repository for example.
My general take is if FOSS can do the job, I use FOSS. If FOSS can’t do the job I need, then I will go with the best proprietary solution to my problem. If I go with FOSS, I tend to prefer using the repository of the project in question rather than my distributions repository. The projects repository tends to be more up to date and there are fewer opportunities for ba actors to play with the code. Downside is that these repositories may introduce changes that may bork your OS when/if you upgrade to a newer major version. FlatPacks and AppImages help to mitigate this.
Hope that helps.
Gee, ya think?
I know why studies with seemingly obvious results like this are conducted, (sometimes the obvious answer is wrong) but the waste of money still bugs me.
Last I’d heard, even the NSA hasn’t been able to find an encryption that is quantum safe. And the some of the one they had found were broken using traditional computers. I strongly suspect that your messages will remain reasonably private for at least the next decade or two.
Fax isn’t encrypted. What keeps it alive is just inertia.
As for why your insurance company won’t take emailed photo, that probably has more to do with whatever system your insurance is using for their backend.
Email content can be end to end encrypted by GPG and S/MIME as well as through a few other standards. Email in transit can be (but not always is) encrypted via TLS.
The reason encryption is not default is because (I think) of backwards compatibility. E-mail originated at a time when almost nothing electronic was ever encrypted, including the username and password you used to log into a system with. Most of the encryption we use of today has simply been “bolted on” to standards that were already in place at the time and it did take a few tries to get it right.
When the internet was first getting started, few people, if anyone, thought it would become as invasive (possibly the wrong word) as it has become. Everyone on the net knew each other. They were friends, why would they ever need to hide anything from each other. /s
That and the early systems couldn’t really spare the processing power for encrypting and decrypting things.
That’s about right. The matrix protocol, while quite big on protecting messages, is not quite so worried about the metadata. This can be minimized if both users are from the same server.
Whether the metadata leakage is important depends largely on your threat environment.
As for Signal not having anything to be able to hand over… I’m not sure I take them at their word. That may just be me though, I’m a distrusting bastard.
Lol, mine likes to do the same. She’s learned though if she doesn’t move SHE will become my pillow! 😂
Not familiar with the site, but it sounds like some one uploaded something directly related either to WMDs or the manufacture of drugs. Otherwise I suspect they would have used the provisions related to copyright infringement.
Knowledge related to both are publicly available, and the tech is simple enough that even a southern high schooler could build something truely nasty, but if it is too directly related…. Well, the people that do the day to day work of the government aren’t completely stupid. The best they can do, though, is try to keep the knowledge out of sight, out of mind.
Well, first thing, you should read “allow list” as “federate ONLY with these instances”. Block list is the opposite of that, “DO NOT federate with this instance “.
Try removing everything from your allow and block lists and see what happens.
From my vantage point, things in the US are much as they have been since roughly October, 11th 2001: SNAFU.
Consider the following:
I now face a decision on whether to vote for a series of political candidates whose policies may result in the destruction of my nation in 10 years. Or a series of political candidates whose policies may destroy the nation in 100 years. Some choice.
As far as I know, there isn’t an account migration mechanism in Lemmy yet. I’ve heard (fourth hand at best) that it is in the works but hasn’t been implemented yet. You may have to do it the hard way. Copy, paste and search.
From the article:
Ultimately, this bill would cut off a vital avenue of access to information for vulnerable youth.
I strongly suspect that this is the real point of the bill.
Incredibly stupid question, but, if she was charged and convicted of this, wouldn’t she have to register as a sex offender? That would be rather amusing.
Following that link directly is giving me a server error, and it doesn’t bring anything except up in search except your comment. Is there a particular way I’m supposed to use it?
That sounds like an overloaded server. If you not willing to put up your own server, you might try a few of the smaller public instances.
There is only so much traffic the larger instances can handle, and right now it seems like everyone and every community is on only a handful.