

There’s also the question of what happens when Gabe dies or retires. Unless he’s a secret communist and has plans in place to make it into an employee coop it’ll be sold by his estate to private equity.


There’s also the question of what happens when Gabe dies or retires. Unless he’s a secret communist and has plans in place to make it into an employee coop it’ll be sold by his estate to private equity.
I get your argument but the broaderidea here is that people in the psych ward aren’t generally making good decisions
Worse yet a lot of mental health conditions have genetic components so the kids are basically getting the worst hand you can possibly deal them.
Okay so yes it’s green text but…
I know people who work at inpatient acute facilities and they are constantly having to cockblock people to prevent truly horrible things from happening (think anorexia dating borderline or NPD + NPD)
So while this particular story may not have happened, this general story happens daily.


Fuck it, I’ll upvote this, see you guys in CECOT, I call top bunk.
That said, I do think we’re at the point where we need an armed anti ice protest/QRF to send the message that this isn’t acceptable.
He gets all the parking tickets for NA citizens parking like that
Idk if people are aware, but this is the original concept for the car. It was designed to be short enough to fit into parking spots sideways deliberately.


Someone finally drop a wildly viral TikTok “100x chance to get laid with this one simple trick”?


Yeah, the systems in place right now took 40 years to build


It should be noted for the record, if you ever have to use your duress code, do it before you hand the device over, don’t offer it up to them, and SHUT THE FUCK UP.
If you have time, turn the phone back on and you’ll get a “recovery” screen asking to do a factory reset. Select this and let it boot back to the setup screen then turn it off again. It’s now in a state where, if you remembered to shut the fuck up, they’ll have a much harder time proving that you destroyed evidence and didn’t just hand over a device you hadn’t setup yet, as is a somewhat common (good) practice with border crossings.
As with all things you may have to depend on, ideally you should test this flow. Carefully make a backup, verify the backup integrity, then use the duress pin ensuring that everything works the way you expected.
I always love these AI generated “interesting looking objects”.
What we have here is some plastic, aluminum or pot-metal frame with a piece of obviously fake suede screwed to it with undersized screws so that it’ll rip off at the slightest provocation. It then has some sort of shitty OLED display crammed inside of it for…reasons?
Depends on your goals and your threat model. Tails is kinda 80% “I think a TLA will kick down my door or take my computer at the border physically” or you want to use untrusted hardware and 20% “I want to avoid online tracking”. If you’re worried about online tracking only it might not be the place to start out.


Yeah, I do believe it’s a good tool for search, just with the caveat that if it can’t find an answer it makes one up or otherwise kinda just fills in little missing details with noise.


That’s the question, what are they actually providing to warrants. You don’t need to provide a name to be able to identify someone. Do they provide logs or data that could be uniquely identifying before the police pull a tower dump? Who knows…


The LLMs are just somewhere between an averaging and a lossy compression of everything on GitHub. There’s nothing about the current paradigm of “AI” that is going to somehow do better than just rehashing that training set but with the inclusion of various classes of errors.
I think it’s better to view it as spicy search rather than any form of intelligence.


Okay I looked over their stuff, a couple thoughts:
I want them to be more clear in their privacy policy about what exactly they can and would reveal for a court order, what their screening process is for those orders, under what conditions they would fight one and if they will reveal anything outside the context of a full court order.
Reason: this is one of your biggest areas of vulnerability when signing up for a phone plan.
The lexipol leaks showed that many police departments use phone information requests so much that they include a set of request forms (typically one for each carrier) in the appendix of their operations manuals. Frequently the forms are the only data request tool in that appendix.
If you happened to have a call with someone who then did something Cool™ and got picked up, expect the detective to have your name and address on a post-it on their desk by the next morning. If you talked to them on some online chat platform they’ll send a court order to that platform for your IP then do the same to your carrier to unmask your identity.
Yes, if you were also sufficiently Cool™ they’ll start doing more invasive things like directly tracking your phone via tower dumps, but that’s a significant escalation in time and effort. If things got Cool™ enough that this is a concern though, it may buy you time to get a new phone if you live in an area dense enough for that to not be immediately identifying.
Also: I suspect the zip code is completely unverifiable so put whatever you want in there, basically pick your favorite sales tax rate.


Points 2 and 3 and just innate to the project, not something that can be fixed in a custom ROM. Point 1 is not something any of those projects choose to fix, you need to either root or use a particular ROM to get around that because of how baked into the network stack those limitations are.


We really need an open source mobile operating system that isn’t controlled by tech megacorps.
Android is far too compromised by corporate profit motives.
it helps network operators identify tether traffic and prevents it from being hidden by the systems VPN.
it facilitates vendor pre installed adware, bloat ware, and malware that can’t be uninstalled
it facilitates carrier locking to prevent users from switching carriers
On Linux, selecting LUKS when you install encrypts the disk without the potential for this problem. So far it’s proven to be very reliable at stopping state level actors, just don’t use a password that you use elsewhere