Oh well in that case it’s completely ok!
How’s that boot taste?
Oh well in that case it’s completely ok!
How’s that boot taste?
Perhaps there are some false claims, but this isn’t one of them. This is their proxy for making being openly gay illegal again because they consider any queer representation to be pornographic.
Oi mate! Wankin loicense! Give it here. Noi!
I can use my published PGP keys with XMPP, for starters. And I can use OMEMO. Matrix supports neither afaik.
There is functionally no way to hide this kind of information from a state actor short of some onion routing scheme mesh networking.
Hojestly I never interpreted it as anything other than this. It doesn’t save cookies or history. Obviously it doesn’t actually do anything to hide telemetry.
My dude, this is pretty uncontroversial, mainstream economics and sociology, which is being backed up by actual data. You are so terminally online, you are literally rejecting any message which isn’t wrapped in populist fan service. Do better. Touch grass.
Can you provide a single metric which demonstrates that modern humans are worse off than they were 200, 100, 50, 20 years ago?
When we hit peak population. This will be the next historical epoch which dramatically changes the fabric of society, because it will lay bare the finite nature of surplus labor, as well as dramatically skew the ratio of workers to retirees. It won’t completely eliminate capitalism, but it will largely be the end of consumption driven economics, and will force more and more of this surplus productivity to go towards supporting populations instead of enriching a privileged few.
There will simply be no other option. In some places this will happen violently, but in many places it will be a slow but peaceful transition.
Same. There has been a man in Texas apparently using one of my early Gmail accounts for tons of important things for a decade at this point, to the extent that I know his name, address and phone number, and could definitely gain access to his cell phone and car insurance accounts if I wanted.
I know he doesn’t have access to the account, and I see all of his e bills and password reset attempts every few months, so I’m not really sure what his problem is. I kind of assume it’s an elderly person who pays for things with checks and doesn’t notice that he can’t access any of his online accounts, and then occasionally the kids try to pay a bill for him and try to reset the account passwords but can’t.
So if you are reading this, Mr Alvarez of Waco TX, don’t worry - I’ve got you covered and your greedy kids won’t add lines to your cell phone plan on my watch!
Yes friend, everyone knows the female orgasm is fake
Bend over and I’ll show you
Laughs in ass pennies
Yup, with 50B parameters or whatever it is these days there is a lot of room for encoding latent linguistic space where it starts to just look like attention-based compression. Which is itself an incredibly fascinating premise. Universal Approximation Theorem, via dynamic, contextual manifold quantization. Absolutely bonkers, but it also feels so obvious.
In a way it makes perfect sense. Human cognition is clearly doing more than just storing and recalling information. “Memory” is imperfect, as if it is sampling some latent space, and then reconstructing some approximate perception. LLMs genuinely seem to be doing something similar.
Gas peaker? I hardly know her!
More like “we’ve tried getting Russian money and it actually worked pretty well.”
This will actually be hilarious because it will out all the state propaganda who will be the only ones willing to pay
There’s just no reason to unless you are really skimping on phone data. Random wifi hotspots are one of the most dangerous things for an average joe in terms of infosec.
SMS has the same problem though. It’s only marginally safer because the tools to hijack a cellular session are a bit more complicated to use, but they are widely available and you can find plenty of instructions online on how to use maybe $3k worth of equipment to spoof a GSM base station and force a target device onto it. Hell, in some cases you don’t even have to force the target device onto your rogue ENB - you can just jam the phone and hijack the number through your own SIP gateway if you get the timing right.
Right, there is no lazy replacement for good opsec. If you are facing a state actor then you need to assume your device storage can be accessed.