In case you are serious: Lemmy.ml is known for being a tankie instance. So a nonsensical anti-west statement makes a lot more sense considering the instance the user chose.
In case you are serious: Lemmy.ml is known for being a tankie instance. So a nonsensical anti-west statement makes a lot more sense considering the instance the user chose.
Yay, let’s all hate on the one crypto messenger, that is independently verifiably secure.
If Telegram wasn’t good for privacy, Western governments would not be trying to shut it down.
They are not trying shutdown Telegram, they are trying to control it.
E2EE is nice, but doesn’t matter if the government can just sieze or hack your phone. Much better to use non-Western social media and messaging apps.
What kind of argument is this supposed to be? Governments can size your phone anywhere … oh wait … lemmy.ml … yeah, I see…
It IS the point. If Telegram was designed and set up as a pure carrier of encrypted information, no one could/should fault them for how the service is used.
However, this is not the case, and they are able to monitor and control the content that is shared. This means they have a moral and legal responsibility to make sure the service is used in accordance with the law.
I am going to quote myself here:
The issue I see with Telegram is that they retain a certain control over the content on their platform, as they have blocked channels in the past. That’s unlike for example Signal, which only acts as a carrier for the encrypted data.
If they have control over what people are able to share via their platform, the relevant laws should apply, imho.
Well, except Telegram isn’t a good tool for privacy.
There is no E2EE. Simple encryption is only available for 1:1 chats and disabled by default. Telegram doesn’t disclose their encryption methods, so there is no way to verify the (in)effectiveness. Telegram is able to block channels from their end, so there is no privacy from their end either.
Warhammer 40k Chaosgate Demonhunters if you are into turn based strategy.
Specific groups of hackers often have various markers that appear throughout their various malware.
Reused code fragments are the most obvious one. Others are specific code styles such as variable naming, even formatting. It’s basically the same stuff that is used to determine whether a specific text was most likely written by a specific person.
For what? Destabilizing the whole technological ecosystem of the planet is not a crime. ¯\(ツ)/¯
told an audience of Stanford students recently that “Google decided that work-life balance and going home early and working from home was more important than winning.”
Yeah, so I know for whom I wouldn’t want to work after graduating.
North Koreans, posing as American workers, had been hired for multiple remote IT worker jobs
They never leave the country.
The Chaos Computer Club Initiative Chaos macht Schule might be able to help you with some materials and guidance.