Linux kernel 5.14 went GA yesterday! This is super important for Fusion on Apple silicon... we can finally start getting bits out there! #soon#SOOOOOON
Is there someone who loves sending you voice messages but… um… has a hard time… well… getting to… like… you know… the point? 🐌
Update to the latest Threema version to adjust the playback speed of voice messages. 🐇
@1337_1338@ThreemaApp Self-deleting messages don't make sense, when a modified/hacked client doesn't accept those operations. Not many will have the skill to do that, but relying on incompetence is silly. Also screen shots. How about just being thoughtful about what you are writing to your peers. 😉
It's not just the Southwest border. Sinaloa cartel cell rolled up in Washington State. Transnational Drug Trafficker Sentenced to 26 Years in Federal Prison for Conspiracy to Distribute Fentanyl, Heroin, Methamphetamine, Cocaine and for Money Laundering justice.gov/usao-edwa/pr/t…
@matthew_d_green Crypto will eventually join long list of mainstream tech that started with the promise of liberty and evolve to being another tool of surveillance and control.
Between recent FinCEN proposals to regulate self-hosted wallets and the rocketship growth of companies like Chainalysis, how confident are you that censorship resistant on-chain activity will be possible in a decade?
Also: if youre concerned about latency using Tor or chained/nested/cascaded VPN:
Killing services you dont need (which may be problematic from a privacy/anonymity standpoint anyway) is one way I run long, nested VPN chains of multiple providers with little latency on 512 MB ram.
If you want to tunnel UDP thru Tor, the key is to first encapsulate/tunnel the UDP traffic itself using a library/tool that allows UDP to TCP tunneling.
I use something like this idea for some functionality in the anonymity/privacy harness I'm building:
whonix.org/wiki/Tunnel_UD…
Anomaly Six, a small US company w/ ties to defense and intelligence communities has embedded its software in numerous mobile apps, allowing it to track the movements of hundreds of millions of mobile phones world-wide. wsj.com/articles/u-s-g…
@micahflee@danarel I don’t like it either Micah. But to discount everything he has done based on this one action and to call him a Nazi does more harm than good to both your reputations. Better ways to approach by starting the discussion and asking the question.
@ElaineShannonDC@rfh02 Encrypted comms = protect content in transmission only. Does not protect metadata which is arguably more interesting and useful (and does not require title iii).
@rfh02 Not saying it happened. Saying it COULD happen. If the feds considered demonstrators criminals and set out to tag, track and locate them. TTL is the feds acronym. I study the tech for this capability.