

I understand, I’m where I’m at by chance, and I wouldnt want to try a different path either. I did go down the robotics/compsci path, but didn’t end up in either of those fields, so you never know how things will end up.


I understand, I’m where I’m at by chance, and I wouldnt want to try a different path either. I did go down the robotics/compsci path, but didn’t end up in either of those fields, so you never know how things will end up.


I’m more thinking along the lines of getting a cheap sim, signing up for signal and them letting the plan lapse and the number is released for use again. And then someone buys a new plan, but gets the recycled number. Not sure how realistic that is as a risk vector though.


This is definitely a shower thought. Good news, at 24 there is plenty of time to backtrack and reroute.
I’m a bit similar, I am only in my current career because I responded to an job ad email that was later rescinded.


Charitable explanation: by allowing people to use WhatsApp/signal etc without holding onto the sim card, it opens them up to risk that someone else gains control of the phone number, and can then take over that account.
But that doesnt really require that the number stays in the same phone, just under the same persons control. Periodic SMS code check-in would be sufficient.


This is just a gateway drug to a trebuchet.
I bet you’d love it if we were all launching 90kg objects over 300m away.


I dunno that is true, nothing in the docs indicates that it is explicitly anti-CDN. And using a CDN for a static javascript resource and an image isn’t the same as running the entire site through a CDN proxy.


A HTTP get request is a few hundred bytes. The response is 28KB. Thats 280x. If a large botnet wanted to denial of service an Anubis protected site, requesting that image could be enough.
Ideally, Anubis should serve as little data as possible until the POW is completed. Caching the POW algorithm (and the image) to a CDN would also mitigate the issue.


RGB LED strip kit. Can use as backlighting for a mirror or tv, and could later be used to make an infinity mirror.

Collecting the de-anonymized data and storing it appropriately is fine, no objections there. Its the sharing of the de-anonymized data with the general public that is the problem.
So:
Doing that will raise awareness, without opening yourself up to unnecessary legal risks, and without turning your app/platform into a doxxing site.
With that attitude, you dont need to be broke anymore.


Tempmail is no signup as well.


temp-mail.org for email, lie for the rest.
[email protected] <- you can even use that account if you like, password is the same as the email.

My point about the memory is that when you are riding along, you aren’t gonna see a car and go “Thats Mr X, better steer clear of them”. Having the licence plates and personal details of 100+ bad drivers on an app somewhere doesnt make actual riding any safer. Awareness doesnt require de-anonymised data.
They always side with the car at fault
Staying silent or resorting to vigilantism doesnt solve that though. You should also pass the info on to your local representatives as well. Drown them in evidence until they are forced to act.

This is a question for your lawyer. If they are a sleazy lawyer, they’ll tell you to go ahead, because they will make bank off you for the next few years.
If you want to do this, send the de-anonymised evidence to your local law enforcement, and post the anonymised stuff publically. Realistically, you cannot remember which driver is which while riding, so doxing provides nothing of value.
And flooding law enforcement with evidence is really the only way to fix things, only they have the power to do something.


I stand corrected, thanks.


ING works fine with no permissions.
The packages still exist, you can install them, its just not by default. Their argument for splitting is that they can be updated independently, but that doesnt explain why the h264 plugins aren’t just included by default.
Arch split out the h264 decoders from vlc, and its not installed by default, so last time I needed to use it, it didn’t work. No idea why they did that.


I’m willing to bet they don’t do dna sequencing to make that art.
Just send in someone else’s DNA. Stray cat maybe?
If you hold the number it can’t get recycled into distribution. Signal does fall back to MFA codes over SMS from memory (I’ve recovered the signal account for my grandma, as I own the number), so anyone who controls the number controls the account.