- Ring zero
- Bootkit/Rootkit
- Attacker in the middle
- Intercepting proxy
- Daemon
Sad soy boi beta cuck from the webbernets, planet Erf.
That’s what the Senate is for. Two senators per state regardless of population. Wyoming has as much of a say as California does.
I’m also interested to learn more. Quick search yielded nothing, so I dunno what they’re referencing.
I wouldn’t rely on the size of the address space to provide security. It’s possible to find hosts through methods other than brute force scanning. I remember seeing a talk from a conference (CCC? DEF CON? I can’t remember) where they were able to find hosts in government IPv6 address space (might have been DOD?) through stuff like certificate transparency logs and other DNS side channels.
Man, I need to go find that talk now…
Edit: I don’t think this is the one I saw previously but is in a similar vein: https://www.youtube.com/watch?v=AayifEqLbhI
Scenario time: A loved one has recently passed away, and I want to find all the photos I have of them. I would love to be able to have a local AI perform facial recognition to help me find these photos. The classification and tagging info doesn’t get fed into surveillance capitalist garbage, and I’m still able to benefit.
“What is this level of grand security…” Enumerated here: https://grapheneos.org/faq#future-devices
Once manufacturers can implement those things, then you will have an alternative to Google hardware for running Graphene. I’m not telling people to trust anything, don’t put words in my mouth.
Who is PrivacyPhones and why should I believe they are in any way affiliated with Graphene?
GrapheneOS has defined a set of security standards for their operating system which have hardware requirements. These standards have been published and there have been efforts to engage with hardware manufacturers to adopt the required hardware. Blame the manufacturers for skimping on security, rather than Graphene being unwilling to compromising their values.
I wouldn’t because I am not a dev. I stay in my wheelhouse and don’t try to pitch features as something they aren’t.
Calling the anti-features indicator a rating system is a biiiiiit of a stretch.
The security of your key is determined by the strength of your passphrase. Am I missing something?
Smash sparrows?
So something changed between then and now. Wish the picture had absolute timestamps instead of the relative ones. I’m on mobile so I’m not about to try to dive into EXIF to find out when that was happening.
You have far more faith in capitalists to do the right thing than I. They’ll put this shit behind user hostile DRM the same that Disney does for drink refills.
Not my post, dude. Look at the people you are replying to.
I didn’t suggest shit, so please don’t put words in my mouth. Thanks for the citations though.
Can’t have any nuanced discussion here! Glad to see people such as yourself engaging in reductionism and shutting down thinking, because all interactions online have to be boiled down to five words TL;DR pithy sound bites.
Leave the shit on Twitter, we can do better here.
Having a hard time finding the evidence you mention, got a citation? First few articles I saw were actually advising against blanket pornography bans.