Interesting. Since the CEO of Telegram was arrested in France last month, I’ve read countless threads on c/privacy about which messaging app is best for privacy, and the two names that seem to come up the most are Signal and any Matrix client (e.g. Element); however, some commenters point out Signal’s phone number requirement and I forget what the other caveats are.
I don’t recall reading about Wire in any of those threads, but at a glance it seems to check all the boxes (open source, always-on encryption, etc).
Am I missing something? Any ideas why this app wouldn’t come up in such discussions?
EDIT: Hmm, I just went back and re-read a thread from last week, and Wire is actually mentioned. Maybe I’ve just always mentally skipped over it until now.
Individual trees are mapped using natural=tree
, so I reckon a similar pattern could be followed for any plant. Checking taginfo, it looks like a very small number of mappers have used natural=plant
, maybe that’s the way to go.
Unlikely.
The in-house scanning service at the Internet Archive (IA) differs from the licensing agreements entered into by other libraries. These agreements see libraries license ‘official’ e-book versions from publishers, who charge for every book that’s lent out to patrons.
Short answer: Mobile hot spot (w/ your own cellular device) is preferable to public wifi from a security perspective.
There are other considerations, such as how much cellular data downloads cost to you, what sites you’re visiting, what you’re actually doing, etc. In general, it’s advisable to avoid public wifi if you can, but if you must connect to public wifi, then you should make darn sure you connect to the right network (watch out for imposter networks w/ a legitimate looking name) and use VPN (ideally a paid service) to encrypt your traffic. Even with both of these measures, you’re best off avoiding sensitive activities like online banking on public wifi. If you must do banking or other sensitive stuff, either do it on your phone or wait until you get home.
Hope this helps.
Editing to add: When I initially responded, I’d forgotten which community I was in. In this context, I believe the other responses are better than mine, but I’ll keep mine up in case it helps other readers.
The wiki has a lot of good info. The wiki also has a lot of vague, conflicting info. Because of this, when in doubt, I look at what other people are doing and follow their example. Use tag info to figure that out. For example, signal
is by far the most used value for traffic_signal=*
(sauce), so yes, just use that.
Aren’t we still vulnerable through VMs, though? I seem to remember reading something about why Qubes OS is safer than a regular VM, having to do w/ zero trust, etc.
Sure, but what’s the claim? I don’t understand playlists for FAST services, nor why an evil corporation would care enough to file a DMCA suit, no matter how frivolous. Is it because these playlists somehow magically block the ads? Do they give non-paying customers access to something normally behind a paywall? Like what am I missing here? Something is not adding up.
I don’t use any FAST services. I know what a playlist is in like Winamp and stuff, but why/how could a playlist be considered a DMCA violation for these FAST services? I read the article, but I’m still confused.
Should all of those tags get prefixed with
disused:
?
I think not. It’s been a little bit since I’ve studied or used the disused:*
prefix, but I believe it’s only needed on the main feature tag. (citation needed, ofc)
I dunno at what school this photo was taken, but in my day, it was not uncommon for students in dorms to have mini whiteboards on their doors so people could leave messages (often in the form of specific private body parts). Mind you, I went to school before everybody had iPhones.
What I believe we’re looking at here is a photo of somebody’s (presumably Joseph Silva’s) door with a mini whiteboard and someone’s (again presumably Joseph Silva’s) contact info, which happens to be a Lemmy user.
The key word here is Lemmy, which would explain why OP shared this photo on [email protected].
Why do people use crypto for what?
+1 for PrivateBin, which has a public instance at https://privatebin.io/.
deleted by creator
I use a locally run open source LLM.
How? GPT4All + Llama or something else? I just started dipping my toe in locally run open source LLM.
not fine tuning a LLM to match tone and style counts as either misuse or hobbyist use
You’ve hit the nail on the head with this one. I think the other commenters are right, that a lot of people will misuse the tool, but nonetheless it is an issue with the users, not the tool itself.
I wonder how much of it is Disney thinks this might actually work versus the ole delay, delay, delay tactic. Probably a little bit of both.
I started out with Memmy and was kinda meh about it. Not bad but not great. Then I found Voyager and never looked back. As a paid Apollo refugee, Voyager makes me almost forget that I’m on a different platform from the days of yore.
Separate but related topic: What controller(s) do you use?
I haven’t dug around too much, but by searching “elite dangerous edmc linux” I found a thread about a year old about a flatpak version of EDMC.
EDIT: Just re-read your post and realized you’re mostly asking about Voice Attack. I’m not sure about that one. Sorry I couldn’t be more helpful. Good luck, Commander! o7
In addition to software solutions, how’s your hardware setup?
Gotcha. So is Wire like, the privacy seeker’s dream messaging app? No phone number, always-on encryption, zero-knowledge servers, open source… any caveats?