SUBSCRIBE to your propoganda notifications
SUBSCRIBE to your propoganda notifications
maybe ambiguos titles draw in more people if only to know what it means?
In the old days hamachi used to be all the rage to VLAN with your friends with pirated copies of games. Wonder how hamachi is doing nowadays.
If you aren’t going to turn out evil, raise your right hand.
Why not both? Telegram is bad for privacy, and governments still want to arrest the founders of systems they cannot control?
Are your concerns about how people can be so blase about potentially throwing their lives away for no particular reason at all, while you had to fight for your survival? I suppose none of us can really control what cards we’re dealt, only how we play them.
For what its worth, I’m glad you’re not dead.
I’m assuming OP didn’t just accept a position with the fucking Hezbollah, so Signal probably fits his usecase
It’ll be fine. If the fucking CIA wanted OP to spill the beans they’ll just send an agent with a wrench directly to OP’s kneecaps.
“I am not looking to start a fight”
That works, sometimes.
Exactly. Thats exactly the right thing to say on public social media. We are all obedient little pigs here.
bruh what industry is this? Defense?
For critical functionality like banking and stuff it’s also a good idea to put a bookmark to the right site on the toolbar and then only ever access it via bookmarks.
Do you keep a regular log of the work that you do? Beyond the commit messages I mean.
I suppose if you read/write code on your phone it might make sense
Every tutorial should be crafted for some hypothetical user stupider than their current stupidest user.
What are the chances the software is designed to throw errors and “See a technician” messages if you dk?
unlocked version? how do i tell if its an unlocked version or not? is there a good starting point to learn more about custom roms?
lmao maybe OP meant so invisible as to be transparent. "clear"ly
I beseech thee pull my merge request lest I smite thee (bitch)
You’re missing the most obvious thing the OP might have meant.
I took it to mean the case when the public-private key pair has been compromised. Systems been hacked, someone looked over his shoulder when authorising himself etc etc.
So OP is just asking what happens if someone steals my private key, and I need to tell the rest of the world my Identity cannot be verified using this key pair anymore.
Can you give an example?