You must like me if you came to look at my profile… buy me a coffee if you want
BTC: bc1q0usqs8damxwq5rj3f4k6djl8sqlnn4mg3guqcj
XMR: 87iTuMDLbqUiLGpTfFdPpnP4dbf38UW8tadbrHKcUB8H6oG6PB15kJHhnvA8zCb7dgSBWiN65PC
RVN: RBCRFeu3Pc4NbAf92HGxzVwf8M7VmHArje
LTC: ltc1q75mazkeepya2gzheu9apkfrzapy9q2cvutll6z


“I’ve heard somewhere that they’ll require a constant api calls from each system to an external verification system that is even paid”
or what? you can’t use the software store? most of the stuff on there is open source and you can compile it yourself
if it comes down to it you can just compile your own kernel that doesn’t do that.
what about airgapped systems?
It just doesn’t work


You could just put a fake date in at user setup from what I understand. It adds the field to the user database but there isn’t any verification that that date is true


Oh well if Dessalines says so it must be true


I’ve been using it for years, very few problems


you can start a war on your own, but pretty sure both sides have to agree to end a war.


The DOW is currently too high to investigate pedos


/b/ and /pol/, occasionally /bant/
Obviously you have to sift through the usual 4chan shit to get to it but it’s there


Yup, same. Even now, despite how bad it’s gotten over there. They’re usually ahead of certain types of news


My partners midwife googled stuff in front of us and parroted the AI summary back to us when we asked if a specific drug was okay for pregnant people


The new bimmers are ugly as sin.
I say that as someone who loved his e90


You went to a school where they had no controls over what you could and couldn’t access?
My school was blocking harmful content on their computers when i was there in the mid to late 2000s.
When i got home i had something called CyberSitter on my computer in my room that sent logs of all my internet usage as reports to my dad.
It took me until 16 when i went out and bought my own computer with my own money before i had “unfettered” access to the internet.
Were these tools impenetrable fortresses? no, of course not. but they were a damn sight better than the ISP level blocks and legislating the “good” companies out of existence that the UK (and others) Government is currently engaged in.
Not that any of this is really about “protecting kids” anyway


I’m not, but I also don’t live there
So they can still fuck off.
Also I have free healthcare and consumer protection laws


As an iPod owner, I wish I got a zune
My local pub is older than your “empire”
gotta be honest, i wasn’t a huge fan


I was thinking of RCS security apparently, but was mainly talking about what’s theoretically possible.
There’s nothing stopping someone creating a E2E encrypted SMS app. The medium doesn’t matter, only the data. You could have end to end encrypted carrier pigeons if you want.


Yep, you lock with the public key and unlock with the private.
You can’t unlock with the public, it’s one way only


don’t they also receive the public keys and can then also decrypt the messages??
A public key is used to encrypt a message, you need the private key to decrypt.
That’s why you have public key servers. it doesn’t matter who has the public key, all they can do with it is encrypt information that only the private key holder can decrypt.
The more I think about it, the more I am convinced I don’t understand how any encryption works because the intended recipient needs the key to decrypt it
The way it was explained to me that finally made it click was so:
Imagine you have a lockable box (public key) and a key (private key), the box is empty so you give it to your friend. it doesn’t matter if anyone sees the open box because there’s nothing in it. your friend puts something private for you in the box and locks it. People see the box as he’s bringing it to you but they can’t see what’s in the box because neither him nor the people watching have the key to the box; only you do. once it gets to you you can open the box with your key
So advanced the Americans did it in the 40s
And the north Koreans beat them to it