Same lol
Ok then, sounds like a lot of potential for a Darwin Award nomination. I’m sorry you have to deal with this shit, even if it’s just on a level of slight inconvenience.
One can only hope it wontget any worse
Isn’t it just like “Ostrich” but with N and without the “ich”?
It’s not. Durov never submitted it to the govt if RF afaik.
That kind of stupidity is dangerous, I would assume. No security guards?
Well, close. 3 million worldwide!
A million $$ in their accounts from the lobby firm helps, doesn’t it. Disgusting.
I understand it’s hard to fight them but if you have a different purpose than simply becoming a corrupt politician, be ready for a tough fight.
Nigeria is great (according to my Nigerian acquaintances). But it’s HUGE and the states are not equally developed and there’s endless corrupt politicians working in favor of the British interests as opposed to their own. I only wish the best for them, stay strong, you can make it!
Speaking truth shouldn’t be considered toxic, quite the opposite, and yet some people somehow think it is. SAD!
How easy it is to forget that they’re supposed to be the “public servants” and not “public masters”
Can’t wait for this to become one of those memories where it’s so weird you actually wonder if maybe it was just a dream
And freedom is for everyone. Except for you, WEF ancaps and Stalinist commies
Considering that meshnet is used to distribute data across devices linked to different apple ids I’m sure it’s as secure as it gets. I hope someone smarter than myself will figure this out one day.
In a meanwhile - what do privacy cautions people use? GrapheneOS?
I was thinking more of a traffic sniffing. e.g with nothing installed and after the initial activation traffic has passed, icloud disabled, take picture of a gun/whatever they could be interested with, see what happens then, apart from the obvious yahoo weather pulls etc., compare with 10 other phones in the same scenario. But I’m sure the hashes, if they exist, are bundled and sent via encrypted channel and I’m not a hacker or pentester anyway so I don’t really know what I’m talking about.
Happy Valentines Day from mempool lol
Interesting points. But have the hashes of these detected and categorized objects been captured or somehow distinguished from the remaining iOS traffic by anyone? Would like to see this hypothesis tested out.



