The people around him makes him like that, it’s unhelpful to his behaviour. Their sensitivity is making people insecure and fear. This is unhealthy.
The people around him makes him like that, it’s unhelpful to his behaviour. Their sensitivity is making people insecure and fear. This is unhealthy.
Typical dickheads authortorians
Laugh my ass off
Epic Games
I still prefer firefox for other reasons
Jeez not wiping the server
Mfw you think mass surveillance is so scary
It seems like they collect the data from big tech and not directly from the users.
Depends what mean by owning a gun but some people are so insecure about their personal safety that they probably want one
Idk but it’s a work computer I suppose
One thing it should note that most Linux distros does not encrypt the boot volume
I suppose it’s easier to access the cloud storage than the phone given how secure the iPhone is and with lockdown mode, it’s even harder.
You know some people like to hack real people’s phone for fun
Yes Apple has their iCloud key, if you live in China, the key is controlled by the Ccp, potentially dangerous for abuse from lea, highly recommend not to use Apple devices if you live there. The other problem is if they same set of keys for global users that it is possible to crack encryption for global users using the same keys, hence compromising security if one day Ccp want to access to the files of some American’s phone through iCloud.
The thing they could do is block the servers of Meta or route to tor for anything sent to meta.
The only thing it improves is data security which can in some extent resist against identity theft, financial fraud, etc. Does having an eSIM card improve my data security?
Yes, there are significant security benefits. An eSIM card cannot be stolen without stealing the phone, whereas removable SIM cards are sometimes stolen, and used in port out scams. That’s when identity thieves fraudulently swap stolen SIM cards into different phones to gain access to the victim’s calls and text messages. The thieves may then try to reset credentials and gain access to the victim’s financial and social media accounts.
For more information about SIM swapping, port out scams, cell phone cloning and subscriber fraud, see our consumer guide on cell phone fraud. https://www.fcc.gov/consumers/guides/esim-cards-faq
Good