I can't. Thank god I'm the only one you need to worry about π
Only Matrix manages to leak almost as much metadata as NIP04 DMs π
They are missing out on all the fresh olympic shooter memes
We've become aware of another company selling devices with #GrapheneOS while spreading harmful misinformation about it to promote insecure products. We're making our usual attempt at resolving things privately. However, we need to quickly address what has been claimed regardless.
Downloading and installing an app followed by entering sensitive data into it or granting it powerful permissions isn't a vulnerability/exploit. Accessibility service access can't be directly requested but rather has to be granted via Settings app in the accessibility section.
Accessibility service access is extremely powerful and essentially gives the same control available to the user to the app. This is explained with clear warnings. It's also not possible to enable it for an app not installed from a modern app store without an extra hidden menu.
Apps not installed through a modern app store have extremely dangerous settings including accessibility service access restricted. Users have to navigate to a semi-hidden menu to enable this. UI doesn't explain how to do it. It's a higher barrier than simply phishing info, etc.
Accessibility services are required by many users and the feature can't simply be removed. It's possible to disable this and other dangerous features for end users via a device management app. This is the right approach if you have a userbase you want to protect from themselves.
If you purchase a device with GrapheneOS, we strongly recommend booting it into recovery and wiping data before using it. Next, verify it's running genuine GrapheneOS:
https://grapheneos.org/install/web#verifying-installation
Due to complete verified boot, wiping provides the same assurance as a fresh install.
Our web installer is very easy to use. If you're able to use a web browser and follow basic instructions, you have the skill set required to install it:
https://grapheneos.org/install/web
However, if you do buy a device with GrapheneOS, you can verify it's the real deal without malware.
Simply going to a mainstream local business and purchasing a device to install GrapheneOS is the most secure way to obtain a device.
Consider the risk of buying a device from a company marketing to cryptocurrency users, and at least follow our wiping and verification advice.
Purchasing a device with malware installed is something we defend against. We provide a way to block this through verified boot and the verification process recommended on the site. But you can't prevent something like replacing battery with one including a standalone tracking device...
It's absolutely inconceivable to me that many trust and use the OS that comes preinstalled in the devices they use.
The very first thing I do with any phone, computer or even hardware wallet is wipe it and flash with whatever I want.
I'm enjoying the bell curve meme successor

If you need to use it, use it through the FOSS version:
https://github.com/Mercurygram/Mercurygram
Sign up for a brand new account without using your real phone number by using sms4sats.
That apps natively supports Orbot so that you can connect to telegram servers exclusively through Tor.
My #reddit looks like this. So should yours. 
My #YouTube it looks like this. So should yours. 
Prove it: shit on the coin you pose in your name and profile pic and I'll believe you.
If you can't criticize it, you're a maxi
That makes way more sense
Take the L on this one. I honestly don't know who are you hoping to convince.
Laser eyes will take everything you say as truth because "shitcoin==bad". Anyone with half a brain knows this argument of yours is pure disingenuous bs.
Playing in the edge of semantics and speaking half-truths that take time and effort to dissect are not the proper way to argue
You should trade some of your coins for some extra neurons, you're going to need them.
Protip: browse while logged off using a VPN. Only log in when you actually want to purchase.
Kind of. Whenever I want to use it, I need to wait a good amount of time for the chain to sync π
Both can be true: the firm being actually connected to the CIA and the poll conducted being real and truthful. To me, that looks like the most plausible scenario.
As per usual with any linux tech, the Archlinux wiki has the most comprehensive and incredible section on setting up Wireguard. I got some really nice, really clean configs from this, used pure systemd-networkd to manage the tunnel (and even do routing), and some IPtables sprinkled in.
https://wiki.archlinux.org/title/WireGuard
________________
< internet tubes >
----------------
\
-=(')
;;
//
//
: '.---.__
| --_-_)__)
`.____,'
\ \
___\ \
( \
\
/
This is the way
I can see from the red nipple that it's a real computer. Congrats!



