Avatar
plebonaut
0ae2a45b027158be179912222db53f6daa8357a211da49a1d01a98ecdadcc6a0
Freedom Privacy Decentralization stay calm and stack sats

Isn’t it just like “Ostrich” but with N and without the “ich”?

It’s not. Durov never submitted it to the govt if RF afaik.

A million $$ in their accounts from the lobby firm helps, doesn’t it. Disgusting.

I understand it’s hard to fight them but if you have a different purpose than simply becoming a corrupt politician, be ready for a tough fight.

Nigeria is great (according to my Nigerian acquaintances). But it’s HUGE and the states are not equally developed and there’s endless corrupt politicians working in favor of the British interests as opposed to their own. I only wish the best for them, stay strong, you can make it!

Replying to Avatar corndalorian

Liked this and don’t want to undo it lol

Speaking truth shouldn’t be considered toxic, quite the opposite, and yet some people somehow think it is. SAD!

How easy it is to forget that they’re supposed to be the “public servants” and not “public masters”

And freedom is for everyone. Except for you, WEF ancaps and Stalinist commies

Considering that meshnet is used to distribute data across devices linked to different apple ids I’m sure it’s as secure as it gets. I hope someone smarter than myself will figure this out one day.

In a meanwhile - what do privacy cautions people use? GrapheneOS?

I was thinking more of a traffic sniffing. e.g with nothing installed and after the initial activation traffic has passed, icloud disabled, take picture of a gun/whatever they could be interested with, see what happens then, apart from the obvious yahoo weather pulls etc., compare with 10 other phones in the same scenario. But I’m sure the hashes, if they exist, are bundled and sent via encrypted channel and I’m not a hacker or pentester anyway so I don’t really know what I’m talking about.

Interesting points. But have the hashes of these detected and categorized objects been captured or somehow distinguished from the remaining iOS traffic by anyone? Would like to see this hypothesis tested out.