deleted by creator
deleted by creator
deleted by creator
deleted by creator
I get where they’re coming from.
If there’s a probe that results in no substantial findings, it would likely still impact sales for some period of time, simply because there was a probe. In that case, Tesla’s concern is justified.
If, however, they do find that Tesla is exaggerating their range, then I hope the lawsuit is spectacular and expensive.
My parents have a Tesla (they bought it used), and its range is shite.
Nah, they don’t sell your data. They sell their ability to serve you ads based on their data about you.
Holy based. I always thought it’d be funny to get into a little cyber war with someone, so thanks for the laugh.
Yeah, I’m confused by this video (which is from nearly a year ago, btw). It looks like a gnome shell overview more than anything.
YouTube does exactly that if you disable your watch history. Or rather, they just disable video recommendations on your home page altogether.
Do you have a quote from the license to prove that? Louis Rossman himself said we’re free to grab the code and edit it.
It’s soul vs soulless, not clunky vs robust. The modern Internet is arguably much more robust and secure, but the internet of yesteryear was actually pleasant to use, even if it was more prone to random crap going wrong. Each website had a unique look and feel, and things were less predatory. There wasn’t as much of an arms race between companies to control every second of your attention, because they don’t know yet how to harvest data generated by your usage meaningfully.
The source is available on their gitlab instance, so whether it not it conforms to some specific definition of open source, the source code is readily available for anyone to view and modify.
Pretty good privacy. It’s an unexciting name for a public/private key encryption program.
I believe WhatsApp uses the same protocol (or at least the same crypto algorithms), though I’m not sure if they were involved in its development.
Good point on the metadata. Signal has the “sealed sender” thing, which (I think) helps with the metadata problem somewhat.
As the other commenter mentioned, your best bet is being selective about which services you use to communicate.
Unencrypted (plain text) is the worst, since data is easy for a third party to sniff (think of it as a wiretap). For example, HTTP and SMS are unencrypted.
Encrypted is a good start, since third parties can’t sniff your traffic, but the server handling your communications can usually see everything that passes through it. For example, HTTPS is an SSL-encrypted variant of HTTP, and services like Facebook messenger are encrypted, but Facebook can still see all of your messages, since it’s stored on their servers.
End to End Encrypted (E2EE) is the golden standard. Only the endpoints (i.e. you and your friend) can see the content of your messages, and all traffic is encrypted in a way that even the server cannot view it. Signal is end to end encrypted, as are many other modern messaging platforms (WhatsApp is E2EE in theory, as is Google Meet, but we can’t verify this ourselves).
Well, not the highest one. This was a state supreme court, fortunately.
Username checks out.
You can easily create a firearm with a short length of steel pipe and a nail. I don’t know how this will do anything. Plus people can just drive to another state.
So you’re admitting that people were eating tide pods, which makes it not, as you would say, “complete fiction”.
Bonus when you disable software flow control: In addition to Ctrl+r to reverse search through commands, you can search forward via Ctrl+s