Broken

joined 1 year ago
[–] Broken@lemmy.ml 4 points 1 month ago (2 children)

I like that idea bit it'll never fly. That software is an asset. A bankrupt company needs every asset to be sold to cover as much percentage of their debt to their vendors as possible. I've been in a company that went bankrupt and I've been the vendor of a company that went bankrupt. Being the vendor was the harder experience.

[–] Broken@lemmy.ml 3 points 1 month ago

I wouldn't think so. I see thrifty ice cream in the supermarket. Regardless of how many stores are open, that's a viable revenue stream.

Sort of like Marie Calendars restaurants. As far as I know, there's only a few dozen restaurants left. Check the frozen food aisle though and you'll see loads of their food in the supermarket.

[–] Broken@lemmy.ml 4 points 1 month ago

I've had the same thing happen for my own personal domain that I run through Addy. Its frustrating because people can't tell what a "good" domain is, so how can you have any rules about it? And if you do, then have a verification system with your customer service team.

But I've always said to myself, if this service won't take my email then I don't really want to be their customer. What else are they going to screw up when I give them my data?

[–] Broken@lemmy.ml 2 points 2 months ago

As a newer Linux user I think the priority in communication should be use Mint and then have some general information about how Linux isn't Windows, with some key differences and how to do things. I know that's more complicated than just saying it, but a "simple" get started guide would ease transition a lot.

[–] Broken@lemmy.ml 8 points 2 months ago

Despite that people love to talk about Tesla and also cybertrucks, this is reminder to never buy anything for promised features. If you wouldn't be happy with the existing features just don't buy it.

[–] Broken@lemmy.ml 2 points 2 months ago

Absolutely. Companies have every right to control what tools are authorized to use on their hardware, and what touches their data or users data. It could be as complex as security or as simple as don't use a competing service, but it all makes sense. Don't tell me how use my stuff and I won't tell you how to use yours.

If it's BYOD then that's another multiple layers of cans of worms not worth getting into.

[–] Broken@lemmy.ml 2 points 2 months ago (2 children)

I don't know. I'm sure it only transmits when active, but that doesn't mean its not collecting data at all times. If you're on windows you can turn it off with a script, but it might turn back on after major updates.

[–] Broken@lemmy.ml 4 points 2 months ago

I would probably argue they are the same in terms of security and privacy. Privacy communities tend to disfavor Proton because its all eggs in one basket, and also for political reasons. Both of those are subjective to your personal threat/privacy profile.

Its true that a single point of failure is more risk than separate services, but that fact doesn't undermine their security on a technical level, and has nothing to do with privacy. As for the political, yes it's something to watch but nothing wrong has been done. They are set up as a non profit with checks and measures in place to prevent corruption from happening. I'm OK with different points of view and having different points of view on a board is a good thing.

[–] Broken@lemmy.ml 16 points 2 months ago (4 children)

Steam has telemetry. They gather a ton of data on you. What details, how they use it, and how secure it is I can't answer, but it's clear that it's happening.

[–] Broken@lemmy.ml 19 points 2 months ago

I'm no ghost, not even close. Be careful though, "what's the point?" Is essentially the question everybody asks at every phase of that iceberg diagram.

A possible answer to your question though, is that even if the state doesn't know or care about him today that might change tomorrow.

That's not my threat profile but it's a valid one.

[–] Broken@lemmy.ml 2 points 2 months ago

This is very accurate. Highlights the cons of each system. The grass isn't always greener.

[–] Broken@lemmy.ml 1 points 2 months ago

Moving to GrapheneOS doesn't have to be full bore. While it obviously wouldn't be as private, you could run google services sandboxed. That restricts google quite a bit rather than giving it full rights to everything on your phone. Other features you can take advantage of are granular permissions per app and the ability to easily turn things on and off (such as mic, camera, location), restrictions to contacts, restriction to files/folders, etc... Youd be amazed how much you can clean up your exposure even with google services running. But yes, you'd need to give up using google apps like calendar for any of it to do any good.

view more: ‹ prev next ›