

Like most supply chain attacks, it’s targeting developers and other people who use tooling like this rather than Bob and Alice on the street.


Like most supply chain attacks, it’s targeting developers and other people who use tooling like this rather than Bob and Alice on the street.


That doesn’t make you safe from supply chain attacks generally. There’s no reason a supply chain attack couldn’t be applied to software repos you do use if a vulnerability exists within them and a bad actor is sufficiently motivated to exploit it.


That’s the neat part, the definition is whatever is most convenient for them in any given moment. They’ll define the most milquetoast liberal as a socialist if they get in their way.
Noted, totally_not_a_gun_pinky_promise.stl will print just fine


Did you use as much AI to write the game as you did this pitch?
The stated goal of age verification is safety, I have only seen evidence that complying will make everyone using the internet less safe.


Another subscription service. Woohoo.


Damn man, go for a walk or something.


You’re very angry for a person who literally used the term themselves a couple of comments ago. What term would you rather use then? It’s colloquial, everyone knows what I’m talking about. Are you the kind of person who gets angry when someone doesn’t call it “GNU/Linux” too?


Obviously capitalism makes pretty much everything worse but let’s not pretend AI wouldn’t have issues without capitalism too.


The Most Moral Army In The World™
I’m not really sure what people want when they raise this complaint about Proton, it’s going to be true of any company. They can’t refuse a legal order, there’s very few jurisdictions on earth where the authorities will just allow a business to refuse to comply with a legal order and the ones that do are not worth running a business in. As far as I know, they’ve never given up content of emails or traffic logs.
If your threat model includes the authorities of the US or any country you might happen to be in, then you shouldn’t be trusting any business that might be compelled by them.


That’s horrifying. I really hope he’s triple-checking everything.


People hate inconvenience more than they hate their data being mined.


If we’re being real I don’t really trust anyone with my data.


Honestly, not really. You’ll miss out on some of the backstory but nothing that would impact your enjoyment. You could watch a play through to get the details, it’s pretty short.


Interesting that she apparently had knowledge that would tear down “corrupt system” before but wasn’t interested in sharing it until the corrupt system turned on her.


Yet you participate in society. Curious.
The rules of cybersecurity:
Under no circumstances should you own a computer.
If you absolutely must own a computer, under no circumstances should you connect it to the internet.
If you absolutely must connect it to the internet, it’s too late and they already have you