- Ring zero
- Bootkit/Rootkit
- Attacker in the middle
- Intercepting proxy
- Daemon
Sad soy boi beta cuck from the webbernets, planet Erf.
I’m also interested to learn more. Quick search yielded nothing, so I dunno what they’re referencing.
I wouldn’t rely on the size of the address space to provide security. It’s possible to find hosts through methods other than brute force scanning. I remember seeing a talk from a conference (CCC? DEF CON? I can’t remember) where they were able to find hosts in government IPv6 address space (might have been DOD?) through stuff like certificate transparency logs and other DNS side channels.
Man, I need to go find that talk now…
Edit: I don’t think this is the one I saw previously but is in a similar vein: https://www.youtube.com/watch?v=AayifEqLbhI
Scenario time: A loved one has recently passed away, and I want to find all the photos I have of them. I would love to be able to have a local AI perform facial recognition to help me find these photos. The classification and tagging info doesn’t get fed into surveillance capitalist garbage, and I’m still able to benefit.
“What is this level of grand security…” Enumerated here: https://grapheneos.org/faq#future-devices
Once manufacturers can implement those things, then you will have an alternative to Google hardware for running Graphene. I’m not telling people to trust anything, don’t put words in my mouth.
Who is PrivacyPhones and why should I believe they are in any way affiliated with Graphene?
GrapheneOS has defined a set of security standards for their operating system which have hardware requirements. These standards have been published and there have been efforts to engage with hardware manufacturers to adopt the required hardware. Blame the manufacturers for skimping on security, rather than Graphene being unwilling to compromising their values.
I wouldn’t because I am not a dev. I stay in my wheelhouse and don’t try to pitch features as something they aren’t.
Calling the anti-features indicator a rating system is a biiiiiit of a stretch.
The security of your key is determined by the strength of your passphrase. Am I missing something?
Smash sparrows?
deleted by creator
So something changed between then and now. Wish the picture had absolute timestamps instead of the relative ones. I’m on mobile so I’m not about to try to dive into EXIF to find out when that was happening.
Highly recommend, you’re in for a ride. Enjoy!
You have far more faith in capitalists to do the right thing than I. They’ll put this shit behind user hostile DRM the same that Disney does for drink refills.
Let me know when they actually close the loop on that. Right now it’s just externalized by dumping it all into the atmosphere.
Buy a domain, set up a catch-all and use servicename@yourdomain. Boom.
Can we not with the “basement dweller” bullshit? Developers of free, open source software are volunteers putting forth a lot of time, energy, and effort only to get derided for it.
You could try making your own oat milk in a blender, it’s pretty easy if you have the filtering bags. Took me a couple batches to figure out the right amount of blending, but once you get it right it’s great. Blend too much and it comes out almost slimy, too little and it’s watery. I had to adjust blending times by about 2-3 seconds to dial it in.