registrert

joined 2 years ago
[–] registrert@lemmy.sambands.net 63 points 2 years ago (5 children)

Please tell me you're ruining this on a Hackintosh.

To be honest I find that hard to believe, but who knows? It's a crazy world after all.

[–] registrert@lemmy.sambands.net 64 points 2 years ago (12 children)

Mysterious black spaceblobs? Now that's a scary though.

[–] registrert@lemmy.sambands.net 29 points 2 years ago* (last edited 2 years ago) (9 children)

What does it mean that e-mail, username and passwords must be complete and true? No anonymous e-mail? No unique usernames for Lemmy, it must correlate with an external service?

What are your demands for content federated to you?

How does it work if a user wants to delte their account and all relevant data as per GDPR or similar if it's federated?

Update: How does the 18+ rule relate to users on instances with lower or no age requirements?

I'm not trying to be negative, I think we all are trying to figure out how this new methods of interaction can safely occur between both users and instances.

Well Ronald is a clown after all. John Wayne Gacy was just the tip of the iceberg you know, haven't you heard about the term "clown world" before?

Wake up sheeple, all our leaders are clowns with human makeup!

[–] registrert@lemmy.sambands.net 2 points 2 years ago (3 children)

Apple being an american company, what's to stop high level surveilance from demanding backdoor access and printing out a letter of non-disclosure as per current US laws?

It would be negligent of any intel agency with the possibility to not make their own Room 641A at Apple.

It's funny that of all the Apple products I've used, an Apple computer is not one of them...

I don't think trusting the security software would be any harder to trust than the OS or anti-viruses, both systems designed to keep the users safe.

More of an issue would be how to find out who is trustable, and that will take both time and trust from the getgo.

[–] registrert@lemmy.sambands.net 3 points 2 years ago (2 children)

There are plenty of phones one can install notgoogled OS'es on, but it requires the buyer to look up the list of phones that are supported.

[–] registrert@lemmy.sambands.net 11 points 2 years ago (1 children)

Give a person a privacy phone and they'll install spyware on it.

Give a person a want for privacy and they'll get a privacy phone and never install closed source apps on it.

view more: ‹ prev next ›