Signal can add backdoors to their own app and, if the app get compromised (or the device) the security of the encryption model is not relevant. It’s the reason because I see comparable Signal and Telegram.
Signal is open source, but (info based in this 3 years old thread on f-droid):
Which no seems FOSS friendly.
nd when a judge or a 3 letters agency will request to Signal that they want access to the messages that somebody will send from a date?
It’s their app, and they can do it. Do you think that they will refuse?
At least one of your down votes is for being racist and ableist. Could you remove it?
Source?
deleted by creator
This article is a not sense. There is not a monopoly of identity: a lot of corporations and big tech have an ID about us or, at least, about me.
Also, in my case, the state have paid most of my education, my healthcare, the street where I live… nor google not other big tech have paid a dime for it.
The critic in the article has his points, but the proposed solution—using capitalist enterprises to issue IDs—is nonsense. We will lose track of people from a fiscal point of view, and it will not solve the problem of the people that not any corporation would issue an ID.
Debian has a list of vendors who sell it in a media (USB, DVD…), some of them also sell other distros.
I think that this question from my non bot account has not reached you:
@carlesmu@lemmygrad.ml wrote:
Thanks for the wrapper :)
Two questions:
Where can I find the relation between languages and the languages_id ints?
When I log in into a lemmy instance I check the protected member _requestor.nodeinfo to detect if the problem it’s the connection or the user/password:
lemmy = Lemmy(instance) if not lemmy.log_in(user, password): if not lemmy._requestor.nodeinfo: raise LemmyException(f"Sorry, cannot connect to lemmy instance {instance}.") raise LemmyException( f"Sorry, cannot login {user} into {instance}. Bad user or wrong password." )
There is a better way to validate it?
I agree that signal has a more robust security model. What I mean is that itbhasbalso habe risks, and a lot of people are ignoring it.
The backdoor could be a sleeping function activated from outside to targets of interest or ‘special’ updates from the google store (i.e.: with the help of google install a different version of the app to the target). But I’m not a security nor android expert, and it’s all theoretical if this attack vector is possible, but I think that is unlikely.
Also, if the NATO country where I live wants to spy my mobile, it would use Pegasus 🤷🏽♀️
Off topic: The Signal reproducible builds don’t work since, at least, may.