![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
No, I don’t have any suggestion for how should Apple circumvent laws. But if they can’t improve on it, they shouldn’t lie that they did so.
Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045
No, I don’t have any suggestion for how should Apple circumvent laws. But if they can’t improve on it, they shouldn’t lie that they did so.
It’s not bad design, it’s definitely intentional, however I agree that it’s probably not for having backdoors, but for convenience. Average people forget their passwords all the time, and with encryption that level of carelessness is fatal to your data if they have not saved it somewhere, which they probably didn’t do.
Very few devices are rooted and usually you cannot get root without fully wiping your device in process.
I’m pretty sure the system is not flawless. Probably it’s harder to find an exploit in the OS than it was years ago, but I would be surprised if it would be really rare. Also, I think a considerable amount of people use the cheapest phones of no name brands (even if not in your country), or even just tablets that haven’t received updates for years and are slow but “good for use at home”. I have one at home that I rarely use. Bootloader cannot be unlocked, but there’s a couple of exploits available for one off commands and such.
Not lying that they are improving the privacy of users would be a good start
I don’t think there’s a factual answer to this question.
My take on it though is why would they delete it? They can make use of it in various ways, and in new ways every once in a while, and it’s not like as if you could prove it in court or even just find out that they didn’t delete your data.
NFS
waiting for locked database
I agree that sqlite is slower through the network than a database server that was made with that in mind, but I think in your case the majority of it was something different.
I’ve recently read in the Jellyfin docs about problems with fs locks on an NFS share, and the point is that NFS does not enable locks by default or something like that, and you have to configure it yourself.
That depends. More of the popular ones don’t encrypt the secret keys, they can just be read out with root access or even with the use of ADB (the pull command), not even speaking about reading the memory contents while booted to a recovery.
Some even uploads the keys to a cloud service for convenience, and they consider it a feature.
Have you ever logged in to a linux shell? If so, the below or similar may be familiar:
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law.
As I see they are just
What is an ULEZ camera?
Without details, it seems a bit weird that people are called extremists who don’t like their country being converted to china by covering every inch with a camera, maybe even if they used explosives against these in a way that didn’t hurt anyone.
Immich is a selfhosted photo management server with a user interface that’s similar to google photos. Also has mobile apps.
Their motto is “privacy should not be a luxury”.
I was planning for long to try it out because it looks very promising, but I was waiting for… I don’t know what? Fuck it I’m installing it today.
are there applications where zfs/btrfs is more or less appropriate than ext4 or even FAT?
Neither of them likes to deal with very low amounts of free space, so don’t use it on places where that is often a scarcity. ZFS gets really slow when free space is almost none, and nowadays I don’t know about BTRFS but a few years ago filling the partition caused data corruption there.
In case of ZFS and bcachefs, you also have native encryption, making LUKS obsolete.
I don’t think that it makes LUKS obsolete. LUKS encrypts the entire partition, but ZFS (and BTRFS too as I know) only encrypt the data and some of the metadata, the rest is kept as it is.
https://openzfs.github.io/openzfs-docs/man/v2.2/8/zfs-load-key.8.html#Encryption
Data that is not encrypted can be modified from the outside (the checksums have to be updated of course), which can mean from a virus on a dual booted OS to an intruder/thief/whatever.
If you have read recently about the logofail attack, the same could happen with modifying the technical data of a filesystem, but it may be bad enough if they just swap the names of 2 of your snapshots if they just want to cause trouble.
But otherwise this is a good summary.
ext4 certainly has its place, it’s a fine default file system, there’s really no problems with it.
But others, like ZFS and BTRFS, have features that you may want to use, but ext4 doesn’t do: fs snapshots, data compression, built in encryption (to a degree, usually only happening for data and some of the metadata, so LUKS is often better IMHO), checking for bitrot and restoring it when possible (whether it is depends on your config), quotas per user group or project, spanning multiple disks like with RAID but safer (to a degree), and others.
I’m not entirely sure if iMessage still works right now for phones that ran out of support, but such a change would kill it for those phones too.
It’s not about someone, it’s about something. A lot of us aren’t (only) using Linux as a server OS, but for desktop too, and desktop usage involves running much more different kinds of software that you simply just can’t afford to audit, and at times there are programs that you can’t choose to not use, because it’s not on you but on someone on whom you depend.
Then it’s not even only that. It’s not only random shit or a game you got that can edit your bashrc and such, but if let’s say there’s a critical vulnerability in a complex software you use, like a web browser, an attacker could make use of that to take over your account with the use of a bashrc alias.
I think it should also be possible to use named profiles
If it’s that Beeper then it’s not just about imessage, but facebook messenger, whatsapp, instagram, telegram, viber and a few others too. Beeper supports all that, by using Matrix bridges.
Where did they say that they were comfortable doing that? I don’t see a word or an acronym of it.
Sometimes you must do things that you are not comfortable doing, but you just can’t avoid it. Doing that for the ISP (who need to set up the cable into your home and the gateway) is not the same as doing that for e.g. netflix or facebook.
At first I thought this is about letting random users transcribe 2 voice messages a week.
That would have been very weird and uncomfortable, but this limitation makes me think that the messages are uploaded to a transcription service.
If it would be run by Telegram, that’s not really a problem as they already have access to the message contents, but if it’s through a 3rd party… how can I disable this for anyone for my messages?
Also, I expect this limitation to later be eased for premium users.
In the linked github issue it has turned out that the company is expected to turn up data mining and ads as much as they can
The problem is mostly not the people, but the social media services, that take advantage of them for as much profits as inhumanly possible, and in the process affect their personality in a wrong way.
Sometimes I too feel that they shouldn’t have a smartphone, but in reality it’s a problem with these corps and their motives, who affect everyone else too but has deeper effects for young people.
But the solution also involves parents raising their kids, instead of youtube, facebook, tiktok and whatever else. To some extent it also means having some oversight on what their kids see online.