0xD

joined 2 years ago
[–] 0xD 5 points 1 year ago

Sure they can, it just isn't as simple as "just" ;) How do you, for example, determine who picked which item if two people are standing next to each other? Or if something is put back?

Sure, a proof of concept will always work. Building it for the real world is a completely and utterly different beast.

[–] 0xD 2 points 1 year ago (1 children)

The firewalls are all backdoored too!

[–] 0xD 2 points 1 year ago

Cry more because of one article focussing on women, lmao.

[–] 0xD 4 points 1 year ago

Jia Tan is most definitely not a person, just the publicly facing account of a group of people.

[–] 0xD 2 points 1 year ago

What is the trail of crumbs? Just some random email accounts?

This was in a big part a social engineering attack, so you can't really avoid contact.

[–] 0xD 2 points 1 year ago (1 children)

Lemmy's development is to a large part subsidized by some kind of OSS fund.

[–] 0xD 2 points 1 year ago (1 children)

Have you thought about e-ink readers? There are ones you can write/draw with, and since I got mine I completely skip paper!

[–] 0xD 6 points 1 year ago* (last edited 1 year ago) (1 children)

Those companies do, and they maliciously manipulate them for their own profit. This is not on people, this is on toothless regulation.

[–] 0xD 6 points 1 year ago (1 children)

Should change your name to antiintellectualist.

[–] 0xD 1 points 1 year ago (1 children)

Caring about the technology of an app more than about its privacy is really strange to me, but you do you.

[–] 0xD 0 points 1 year ago (1 children)

If you had any idea about how it works, you would not compare them. If you had any idea about how hard Apple makes security research, especially without a Mac, you would not compare them.

But you don't know what it's about. Being a consumer does not make you an expert.

view more: ‹ prev next ›