Who holds the encryption keys? If it's X/Twiiter, I wouldn't trust it at all, especially considering who owns it.
kipo
I agree, but what will happen is that every time a trans guy goes into a woman's bathroom in Texas, someone will verbally abuse them and possibly assault them, the police will come and arrest them, they'll be detained for a while, then released, and the trans men will have no recourse because of police officers' qualified immunity.
That will potentially happen any time a trans man uses the bathroom: abuse, assault, arrest, release, no recourse.
I think the law should be changed; copyright law is kind of a mess, but I don't know how to make it better. It would also need to be changed in a way that's fair, which these companies absolutely do not want; fairness would mean the end of laws like the DMCA.
I learned to moisten the eye of the needle instead of the thread. It makes threading a needle way easier. Also, making sure the thread is cleanly cut at the end and not fraying.
You think I give a damn about a Grammy?
Thank you for mentioning that. I am able to see it by clicking through to the post in the Europe community.
Even after refreshing, I still can't see your additions. 🙁
You don’t have to be insane to not be happy about this. I believe in ‘harm reduction’, which is to say: If joe biden were still president, i would probably not be upset if some medical condition removed him from the presidency, because then he could no longer actively do harm from his position of power.
But now? He has almost no active power or influence over anything. His suffering doesn’t benefit me or reverse any previous harms he’s caused.
Yeah Google claims it's not recording, storing or being sent the conversations or sharing them with anyone, and that this is all done 'on-device'.
The thing is, I don't trust them. At all.
Maybe the terms and conditions will silently change. Maybe their definitions of "recording" and "save" will change. Maybe they're blatantly lying and are willing to pay a fine if they get caught.
Google's whole business model is harvesting and selling people's data, so I have to assume the worst intentions.
A gram of prevention is worth 1.6 decagrams of cure.
I would imagine the risk depends on the app, your use case of the phone and the app, and if you're a high-profile target.
That said, Android phones have an Android ID, an Advertising ID, a sim ID, wifi ID, bluetooth ID, MAC address, IMEIs, and more.
There is an Xposed module called Android Faker that claims to spoof these IDs. It requires root and something that can manage xposed modules, such as LSPosed. I only use it for a few super sketchy apps that I need and don't trust.