/s
notated as ∨
“constant performativity, brand management, status seeking” ;P
☞ “Information wants to be free”
“arguments” alone don’t suffice.
a demonstration of how easy it is to use proton drive (to share videos and millions of photos she’s going to dump on relatives who are barely interested in seeing another baby photo) and protonMail would be more convincing.
Privacy interfaces have evolved to be attractive to lambda users.
when it comes to your wife uploading your daughters photographs to google servers, she can’t decide alone: you share the authority (but would this argument matter in a marriage? No?
would having a protonMail matter if the photographs are attachments and recipients have gmail? No.
good luck. Not an easy task
this one does ☞ trackbook
OwnTracks allows you to keep track of your own location. You can build your private location diary or share it with your family and friends. OwnTracks is open-source and uses open protocols for communication so you can be sure your data stays secure and private.
ios + android ☞ https://owntracks.org
ungoogled chromium is a free and open-source variant of the Chromium web browser that removes all Google-specific web services. It achieves this with a series of patches applied to the Chromium codebase during the compilation process. The result is functionally similar to regular Chromium.
I’ve read good things about Vivaldi, which also is chromium based.
if op can prove that her apprenticeship is terminated for refusing to share her personal information on U.S. servers, like i wrote, it would turn into a greater problem than keeping op’s apprenticeship and respecting her European rights
did i just write the same comment with modified wording?
she just needs to “know her rights” and remind what her rights are
Criminalization of encryption : the 8 december case
Op-ed: ʻEncryption protects our rights, privacy is not a crimeʼ
The beginning of the “8 December” trial is also the judgement of the right to privacy and encryption
In this case, protecting one’s privacy and encrypting communications is no longer merely suspect, but participates of constituting a “clandestine behavior”, a way of concealing criminal intentions. In several memos, the DGSI keeps on trying to demonstrate how the use of tools such as Signal, Tor, Proton, Silence, etc., would be evidence of a desire to hide compromising elements. And on top of this, as we denounced last June, the DGSI justifies the absence of evidence of a terrorist project by the use of encryption tools itself. According to them, if they lack of elements proving a terrorist intent, it’s because those proofs are necessarily hold back in those much-vaunted encrypted and inaccessible messages. In reaction of such absurd vicious circle, lawyers of a person charged denounced the fact that “here, the absence of evidence becomes an evidence itself“.
maybe because some of us are living around those places.
If osm information around you isn’t accurate enough, you can always easily complete it for you and everybody else: streetcomplete
what do you mean by “thumb-key”? when i search, i see custom hardware keyboards
edit 1
found it: https://github.com/dessalines/thumb-key
i have to read more about this, and try for some time to learn
edit 2
it’s so awkward to use. Do you use only one thumb or both? Where are the predictions?
passing from 10 fingers to 2 is already a handicap. sometimes i put my screen on a surface to use the keyboard like a ‘real’ keyboard with 10 fingers. a thumb-key is torture for me 😬
how is your speed with this layout? did you test it?
m’kay