I migrated to ProtonMail out of curiosity after more than a decade, but when they turned over the IP address of a fucking CLIMATE ACTIVIST to police, I decided to halt that process
The police was able to get just the IP addresses. Hide your IPs with Tor for political activism, etc.
It’s cool. It’s hip. It’s Blockchain! Come on, folks, let’s invest in boring and colorful monkeys. You WILL be rich beyond imagination!
deleted by creator
I totally agree with you. They probably missed a few. Thx for adding one more.
Probably some commercial played in a certain Colorado hotel.
“That momentum is surely gathering pace in the age of generative AI, which we believe presents a remarkable opportunity to create a new stream of revenues, while allowing us to reduce costs across the business” …
News Corp recently reduced staffing costs through widespread redundancies.
And the arms in this case.
No kidding. The email itself is smooth. But now, I bet you would have caught it by the sender, though, the paper mentions using gmail addresses for the from field.
When I was a student, if someone gave me free stuffs, I wouldn’t have thought too much about it. People nowadays have to have 0-trust policy for their online comm; this is pretty dystopian.
Sorry it’s not clear. It’s the example phishing letter sent to the student, in the GPT-V-triad email case.
You don’t need admin access to do a lot of damage on a windows system. From the user space, a malware can:
See this same class of malware at (unfortunate link, but you can see the detailed discussions there): https://www.reddit.com/r/Bitwarden/comments/14r29p6/meduza_stealer_will_steal_on_windows_browser/
You might already be aware, but there have been instances of information leaks in the past. Even major tech companies restrict their employees from using such tools due to worries about leaks of confidential information.
If you’re worried about your personal info, it’s a good idea to consistently clear your chat history.
Another big thing is AI hallucination. When you inquire about topics it doesn’t know much about, it can confidently generate fictional information. So, you’ll need to verify the points it presents. This even occurs when you ask it to summarize an article. Sometimes, it might include information that doesn’t come from the original source.
Haha, it also belongs to 12-13 year-old. Probably not the most representative.
While technology is being used to oppress people, it can also be used to liberate them.
Free encrypted tools like the chat app Signal and the encrypted email service Tutanota help activists around the world to protect their private communication. Keeping messages confidential can be a matter of life and death for activists, journalists and whistleblowers in many countries.
That’s why we … will keep fighting for privacy and against and attempt to backdoor encryption.
This is probably not going to answer your question, but the law doesn’t seem to focus on protocols/network topologies, but focuses on providers with certain sizes. So if the protocol is used by large techs, then they might have to do something on their side to comply with the law, depending on etc…
At least Apple, Signal, and Whatsapp. https://techcrunch.com/2023/06/27/an-encryption-exodus-looms-over-uks-online-safety-bill/
Unhappy kitties.
If your account is that sensitive, generally no. Fastmail wouldn’t escape the court order to turn over some email account’ IPs either. Plus, for accounts that are not e2e encrypted, the law may just demand the contents of the account.
If you have the state actors as enemies, you have to dial up your securities to a different category altogether.