gonna need some citations there, bud, otherwise i’ll safely assume you know fuck all about world history
Advocate for user privacy and anonymity
gonna need some citations there, bud, otherwise i’ll safely assume you know fuck all about world history
Yeah I get that occasionally, swapping to another endpoint fixes it right up
Its also about monitoring what people are saying privately about your shows
And even if it is your key, if you can’t see how they made the lock then you can’t prove other keys won’t unlock it.
OSS FTW
It’s the realization to raise kids in an unbiased way and let them make their own choices that’s killing it
Without access to indoctrinate children as much as they want, religions will die out
With that in mind, watch how they focus more on children to try and survive. Disgusting social parasites
Not the lies, theft, manipulation, and indoctrination of children?
Well, at least something gets them to wake the fuck up
oh gotcha
No, not exploitative of the recipients of the proselytizing any more than usual.
The base point is to separate the cultist from their support network and put them in an unfamiliar environment where they only that the cult to rely on, building and entrenching their psychological dependence on the cult. That’s the exploitation.
Yup. They’re really good at rationalizing nice sounding bullshit to justify what they were already doing.
You mean despite all the reasons i just listed?
My condolences. It’s such a stupid, dangerous, and exploitative practice.
In my former religion, it was 2 years in a foreign country. I’m lucky many of my family members came back alive, given the places they were sent. They “laugh” about stories of being assaulted, robbed, houses broken into, extorted and threatened, but it’s a joke now because it’s all part of “gods plan”
So disgusting.
(Edit: It’s also a way to make sure that they face stress and doubt away from any resources that might help them out of the abuse. Instead they’re at all times with another cult member tasked with keeping them on the straight and narrow. It’s more a 2 year indoctrination session where the member gets exposed to anti-religious views through aggressive proselytizing, but then is forced to work through that alternate view in a directed and monitored way so that they reach the “right” conclusion. When they get back, they’re so much more incredibly difficult to have a conversation with, because they’ve entrenched all the bullshit)
Linksys luckily still sells OpenWRT specific routers.
sure, and then you have to make sure you get the correct radio accessories, as the built in pi wifi isn’t going to do so hot acting as the hotspot for multiple video streaming devices.
Radios which you also have to vet against the approved hardware list for OpenWRT, and having multiple channels is even more of an issue with the lack of USB ports (depending on model)
In my experience it’s because it’s finicky as fuck and requires very specific (and often more expensive) router models, and even then it still crashes just as much as a proprietary os router.
It’s called an “MBA” and they are the tip of the enshitification spear
Not to mention Epstein was able to operate freely for decades while flying out high priority definitely-surveilled-at-all-times targets out to rape kids
Make no mistake, intelligence agencies are every bit as complicit as Epstein himself, and they don’t give a flying fuck about “protecting” kids
And oh darn, didn’t you know the only solution is permanent extension of and expansions to all the patriot act bullshit that has been violating our civil liberties constantly for 20+ years?
Shucks. Welp, if it’s “for the children” or whatever excuse they use this time, I guess we have no choice!
Using weak examples and how they are better served in a different way doesn’t mean much
With push data like this you can identify something like every other member of an encrypted group chat by correlating the push notification metadata
They are demanding this for a reason
This.
If there’s a notification for an encrypted group chat, you can use that metadata to identify the devices of all parties involved in that chat, because the push system has to queue all that up and send it at the same time.
That’s just one valuable use of this data.
In steps, and you kinda drive onto it
Not great for mobile operation, however 😬
and any that code their way out of it using publicly audited and verified technologies will get sued out of business, at best.
Individuals who implement their own encryption will be targeted next, if they aren’t already.