Makes sense now, thank you
Makes sense now, thank you
instead of in an encrypted format on its internal systems.
Riiight, like that’s any better. Jokes aside, it’s hard to imagine what kind of “mistake” results in storing plain text instead of hashing, unless the mistake was in choosing whoever made the security assessment
Plot twist: they code in replit or smth like that
I guess you should use proxmox at this point 🤣
Basically translates to “despite me liking English, js is not my cup of tea”. “Вообще мимо” can also be more literally translated as “a complete miss”, but I’m not entirely sure if it’s used that way
Agreed, crab that anti-foss activist in particular
Do you like Russian, tho? Some Russians I’ve encountered did find it overcomplicated at times… Но в целом понимаю: мне норм заходит энглиш, а жабаскрипт вообще мимо
I think ppl just got pissed with the fanboys unironically asking to RIIR everything. The language itself is comfy AF, tho
App pinning has an explicit warning that “personal data may be accessible” and “pinned apps may open other apps”. I mean, it’s better than nothing, but I’d prefer not to rely on it anyways.
They’ve explicitly told in there FAQ 0 bytes of info was disclosed. And I suspect whatever they’ve shared with Germans alone wasn’t 7 bits long.
It’s not like they exactly didn’t before: https://www.androidpolice.com/telegram-germany-user-data-surrendered/
Also, nothing said about whether they’re going to start making transparency reports, not that I’ve expected anything else from this crapshow of a messenger…
You’re probably looking for these 2
They’re more secure (albeit in many wsys security through obscurity) than private, although the privacy aspect is probably among the best you can get by default as far as I can tell. On the other hand, if you’re willing to do some relatively simple steps and buy specific hardware, you can achieve better privacy and security on both mobile (graphene) and desktop (qubes) devices.
I personally dislike them for building unrepareable crap, tho.
I suspect those may depend on choosing a particular response to some of the previous questions
CPUs are also somewhat choked. I had to use throttled to make mine run above 2.4 GHz under load. (You need HWP_MODE and possibly Disable_BDPROCHOT, if anyone’s interested).
But other than that, waaaay better compared to …70 laptops, and some models seem to beat maxed out t440p-s. Also quicksync massively speeds up video decoding/encoding, so I’m overall happy with mine so far.
Phew, count me relieved. The keyboard on that clone was pretty linear as far as I can remember with no variation in force applied whatsoever
Wannabe crapple being wannabe crapple.
I’m wondering if something interesting will fall off the truck this time :D
Context: before that blogpost, cellebrite claimed they can “hack” signal (or they were kinda closer to the truth, and that was media talking abt hacks without reading stuff)
Depends on your definition of “what”, and the server you’re talking to, and what DNS you’re using, and your VPN provider, and maybe the phase of the moon.
So, pretty much the best-case scenario is when the site works via https, and the server supports “encrypted client hello” (ech), and your browser has ech enabled. In this case your VPN provider can see that you’ve sent something to the IP (one IP can host multiple websites with different domains).
Https and no ech = can see IP, can see the domain.
Http = can see everything (thankfully, quite rare now).
Some VPN providers may as well use their own DNS, then they can see what domains you’ve talked to regardless of ech (afaik, since domain lookup should happen before client hello, since you’re basically looking up whom to “greet”)
Some providers are Facebook with fake mustache and will shamelessly try to mitm you