Philip answered him, 2 books is not sufficient for them. And Jesus took the books; and when he had given thanks, he distributed to the disciples, and the disciples to them that were set down. Therefore they gathered them together, and filled twelve baskets with the new copies, which remained over.
@TheHooligan95@lemmy.dbzer0.com Lol. Torrenting is sharing. And for now you haven’t been visited, but I’m certain Hollywood will pay a visit to your local enforcer chief to explain to him the technicalities over fine wine & dinner.
The risk is still there. Keep your share ratios to 3 so you don’t look like a big problem as @Melkath@kbin.social put it. And when you get a letter from somebody complaining, it’s time to start looking into a VPN.
The second best thing to do is your own research into your country’s laws, and subscribing to e-mail alerts so you can know if the law will change. At least a google alert at a minimum.
I take issue with the statement “passwords are protected by the fifth amendment”.
SCOTUS is not guaranteed to affirm that above statement.
Well you see, those victims are just untouchables, whereas Pirates attack the property of the rich…
I kinda like the baseline security advantages. Not that android can’t be better in security, but none of my friends give a shit, and so my iphone friends walk around with better baseline security.
https://old.reddit.com/user/ghostinshell000
hello ,
ok, here is more than a few posts on this. that said: both have made alot of strides recently, basically the order of consensus is:
also, how the devices are setup and used matter alot. other than a pixel + graphaneos, iphones tend to be better at privacy but the devil is in the details. iphones are also more “hygienic” in alot of ways, that you cant see. BUT android is open source for the most part, and are HGIGHLY configurable. and hardware wise has wider variety of choices.
security wise also pixel + graphaneos tends to be top shelf. but iphones, tend to have decent track record. and with proper setup and some addons, it really locks down pretty decently. for other androids, the proper addons, and adb mode to remove all the junk.
support wise? pretty much apple kills it, and everyone else is second and in some cases really distant second or even worse. also google does csam scanning and has blocked folks in false positives and the support structure does not have any way for manual review to get your account back it takes months of fighting them from the reports I have read.
this is all part of the really bad support model thats google. while, google one support of easy things is decent, when it gets real your chances get dicey…
apples support is decent on all levels, not great but decent and in almost all cases better then googles.
data protection? its an apple game now, you can enable adp and the key that encrypts your data is yours and apple documents what key encrypts what data. google, on the other hand, says they encrypt things but the dont really have any good documentation on whats encrypted and whos key encrypts what noor do they allow you to use a key you create like apple does.
backup and recover? while they both do it, apples backup and restore is light years better, googles works, but app level stuff the app devs must create a manifest which tells the backup process what to backup etc. so, over all they both work, its just that apples works better.
applepay vs googlepay, they both work and both are secure, but apples doing full tokenization and googles doing virtual credit card numbers to front for your real card, googles nebales more compatibility with banks easier, apple requires actual setup and key exchanges to onboard each bank. but in the long run while both are considered good, apples is the better way.
IOT and automation, both have a ton of automation, tho googles probably ahead here. but for the iot and home stuff a new standard “matter” will standardize it all so future state wont matter what device you have.
thats it for now.
SCOTUS has not yet decided that a password in your brain is protected by the fifth.
Your phone is protected by the fifth.
Until SCOTUS decides that passwords are protected by the fifth, you can be held in contempt of court by a judge indefinitely because you forgot the password (theoretical scenario, has not yet happened).
The apps requirement pisses me off. Both Android/IOS have some sort of pass system.
They have those cars. You’re not rich enough.
The right to not surrender a pass code has actually not yet been decided. We already have differences between regions.
That’s ok. Most won’t do so. And if you have a “malfunctioning” module, then you probably aren’t maintaining your car properly, so rates will have to be adjusted accordingly.
It is a civilized world. All autonomous worker drones are using 94% of cognitive resources just justifying maintenance resources. And the ones who accidentally got better CPUs are too small in population to matter.
Your phone isn’t trackable? You avoided all the license plate scanners? Your work/home has a higher rate of accidents between them?
Here’s a “funny” story. Back in the day I was working (IT) for insurance companies. I’ve pitched an idea to one of the larges companies about a device connected to an OBD port to track a driver’s habits and adjust premiums based on that. I was turned down, but I heard from an unofficial source that the company was already testing such a device. That was 15 years ago.
Privacy regulations? They don’t know how to handle all the data? They realized they’d have to triple rates based on the actual data they were receiving?
Maybe the insurance cooperatives might. And then the private ones might alter strategies to compete.
I haven’t heard the alternative candidates talk about how they’ll fight for our privacy.
That’s just giving up your rights from the get go. They can get a warrant to compel the fingerprint.
In this computer age, warrant requests are a button press to send a docusign e-mail to a judge, who can click the sign button while he sips his cappuccino. Make them work for it.
It makes them more money. And most of their customers couldn’t even explain how their engine works. And if the customer had an actual choice they would have purchased a more expensive car without this tracking.
Does nobody use the god given Repository of all human knowledge?
There are privacy issues that still have not been addressed as of 2023:
https://www.ctrl.blog/entry/tribler-onion-routed-bittorrent.html
Daniel Aleksandersen 2022-01-11 10:35Z
Hi Anth0rx, yes — I’ve looked into all of them. Here are some hot-takes:
Loginet is just a front for a cryptocurrency. It’s decentralized but not distributed. It’s primary purpose is to selling you hot air, though.
I2P can only talk to other I2P users. There are far from enough users on it to reliably use it for P2P. There’s nothing inherently wrong with it, it just never reached critical mass. The set-up process is probably too complicated for most potential users.
GNUnet has been “fixing the internet” for literally two decades. They‘ve yet to deliver anything. The software download pages clearly warns that it’s still “not yet ready”. It’s an interesting project, but it doesn’t seem to be going anywhere.
Daniel Aleksandersen 2023-07-02 15:17Z
The project change log does not indicate any work on any of the things discussed in this article. I might revisit this after the next beta release.
Different purposes. Tor was intended so you could access the real web anonymously.
I2p the whole thing is an anonymous web. Everybody is a node. Tracing a packet never ends because you can’t be sure you found the origin of the packet. Which only gets worse the longer somebody remains connected to i2p. And it even can handle torrenting, a torrent client is built in.
I2P sadly gets a lot less funding/support.
Bottom Right sees freedom as not being told by other rulers what to do. Your own rulers get to tell you what to do obviously.