Spyware with some limited desktop abilities.
Technically all security is only possible through obscurity. If everyone had your private key, it would no longer be secure because it is no longer obscure.
That's not what this means at all. Security by obscurity is referencing software that itself has secret pieces that are (to the software authors) "security features" which are only secure so long as their implementation details remain secret.
Software using a key is not security by obscurity, knowing that a key is used by the software does not result in the application being compromised.
Software that uses one secret key for all users embedded in the binary is security by obscurity.
I thought it was referring to something being secure because few people are using it, so nobody is targeting it.
this proprietary chat app is secure because it uses E2EE
Every single time I recommend Signal to anyone, I get told, that WhatsApp already has E2EE and that there is no reason to switch because of that. Like, give me the proof the keys aren't sent to Facebook man.
Windows... When even the virus needs a day zero patch...
🤫 "It's not used in the wild...yet."
Also, made me think about how micosoft has applied this to their settings. The microsoft account settings are horrible.
That is a fantastic wojak.
linuxmemes
Hint: :q!
Sister communities:
- LemmyMemes: Memes
- LemmyShitpost: Anything and everything goes.
- RISA: Star Trek memes and shitposts
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
- Understand the difference between a joke and an insult.
- Do not harrass or attack members of the community for any reason.
- Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
- Bigotry will not be tolerated.
- These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
3. Post Linux-related content
- Including Unix and BSD.
- Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of
sudo
in Windows. - No porn. Even if you watch it on a Linux machine.
4. No recent reposts
- Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
Please report posts and comments that break these rules!
Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.