

Gotcha. I misunderstood. I didn’t think it would be just that, because of course if they have your phone they have the contents. Signal encrypts end to end, but if they have the end device of course it isn’t encrypted.


Gotcha. I misunderstood. I didn’t think it would be just that, because of course if they have your phone they have the contents. Signal encrypts end to end, but if they have the end device of course it isn’t encrypted.


I know about the setting. Why are you saying that information is sent to Google’s servers? As far as I have found, that information is only stored locally on your phone
Edit: If this is just about the fact it’s on the phone locally, of course if they have your actual phone they can see it. Signal is end to end encrypted, but it isn’t go to be encrypted on each end, otherwise you couldn’t read messages. Them getting your actual phone is very different from them intercepting the communication without you knowing


Source? I am not seeing anything about that. The only problem I have seen on Android is when applications use firebase for notifications, which is most play store apps to be fair, just no FDroid apps or some privacy preserving apps


You also don’t need to do this on Android unless you are concerned about random people seeing the messages on your screen. Signal on Android does not use Google’s push notification service


As I already replied om one of your other comments:
It’s not because of push notifications. the message is not sent to firebase, just a signal that the app should do a refresh.
Is is 100% because of firebase. Here is an example payload from firebases official document:
{
"message":{
"token":"bk3RNwTe3H0:CI2k_HHwgIpoDKCIZvvDMExUdFQ3P1...",
"notification":{
"title":"Portugal vs. Denmark",
"body":"great match!"
}
}
}
https://firebase.google.com/docs/cloud-messaging/customize-messages/set-message-type
Notification history is purely local to the device. It is not sent to any servers.


It’s not because of push notifications. the message is not sent to firebase, just a signal that the app should do a refresh.
Is is 100% because of firebase. Here is an example payload from firebases official document:
{
"message":{
"token":"bk3RNwTe3H0:CI2k_HHwgIpoDKCIZvvDMExUdFQ3P1...",
"notification":{
"title":"Portugal vs. Denmark",
"body":"great match!"
}
}
}
https://firebase.google.com/docs/cloud-messaging/customize-messages/set-message-type
Notification history is purely local to the device. It is not sent to any servers.


This is not always the same on Android. Any app from FDroid will not use Google’s push notification service because it is proprietary, meaning it violates the rules for FDroid. Signal does not use Google’s notification service


It’s worth noting apps can avoid this on Android: https://tuta.com/blog/google-push-alternative#alternatives-to-google-push
Any FDroid app cannot use Firebase for push notifications since it’s proprietary: https://forum.f-droid.org/t/firebase-allowed-in-fdroid-apps/7540


Not all, no. There are alternatives on Android:
The good news is that alternative methods for push notifications are available, namely SSE (Server Sent Events) and WebSockets.
Additionally, a new open source project, UnifiedPush is becoming increasingly popular. UnifiedPush is an open source, private alternative to Google for notifications.
https://tuta.com/blog/google-push-alternative#alternatives-to-google-push
Signal for android uses web sockets for notifications


The only way apple is seeing it is when the notification is displayed. It only sees the contents of the notification itself. So it would still see who sent you a message, but it wouldn’t say what it was


I always boil the water first, so i can’t speak to that portion. But what I do is add the boils to a sealed container with cold water. Then give it a good shake so that shells crack, but not so hard the eggs themselves are damaged. But after that the shells slide right off


That’s assuming it is in fact a credit card.


They do? Huh… TIL


Unfortunately you do have to prove you’re intelligent


That is a different conversation. If we assume a legally trained AI strictly on data it was allowed to train on, they are saying the AI cannot hold copyright.
I also don’t see a loophole here, since it was denied anyway.


He admits to the affairs, but denies they had any relation to Epstein. He also denies having any relation or awareness to any of Epstein’s sex crimes. Idk if he’s telling the truth, or if he is doing a partial admission to make it seem as though he is not lying


The financial incentive would be open and standard document format to ease development and provide reliability


They explain it a bit more in the article:
According to Brave’s published technical materials, ad matching occurs locally on the user’s device. The browser downloads an ad catalog and selects relevant ads based on interest signals stored on the device. When a user views an ad and qualifies for a reward payout in Basic Attention Token (BAT), the confirmation process uses blind signatures to validate the event without revealing browsing history or identity to Brave’s servers. The company has repeatedly stated that it does not build centralized browsing profiles and cannot link ad activity to specific individuals.
I don’t use nor recommend Brave to people, but if advertising is going to be done this seems like the way it should be done.
Or maybe it’s the governments dislike of VPNs being used to bypass surveillance