while I appreciate the the iel jokes, this is the wrong subject. Nothing to laugh about piece of rotting shit Nazis.
so basically just the hackers to come up with this workaround :D
aren't perfect either
You misspelled "are fucking morons" :)
I honestly ran a bit out of energy to respond at length - but also, since we're mostly agreeing, I guess our energy is better invested in trying to talk some common sense into those who are not (although that feels like a Sisyphus task these days)...
The problem is how to realistically go from were we are now to that utopia.
Unfortunately, I have no solution. And while I don't, the only thing I can do is vote for those that most align with solutions I consider feasible and try and convince others to do the same.
Sadly, propaganda is working frighteningly efficient.
When individual copyright violations are considered "theft" by the law (and the RIAA and the MPAA), violating copyrights of billions of private people to generate profit, is absolutely stealing. While the former arguably is arguably often a measure of self defense against extortion by copyright holding for-profit enterprises.
That argument was only ever made by dumb fucks or evil fucks. The article reports about an actual occurrence of one of the problems of such technology that we (people who care about privacy) have warned about from the beginning.
right wing politicians are cunts. all of them.
As someone who knows a good portion of the Fairphone staff in person, and knows they have a great atmosphere and are mostly great people: Fuck you @Fairphone for leaving my perfectly working FP1 dead in the water without SW updates, and removing the spare parts for the FP2 from the store around the time my FP2 needed them (USB charging port, battery), and for making every new fairphone larger, not offering a SINGLE phone in a proper pocket size (like the FP1).
For users who can live with the tablet-size of modern smartphones: Yes, repairability and longterm support for more recent phones appears not too bad, certainly better than most competitors, but still - if you are someone like me, who treats a phone well, you can not expect to be able to find spare parts by the time wear & tear from normal use will make it necessary.
Zero useful info: what is the attack vector / vulnerability exploited? Without that info, this is useless
He probably wants to do worse, but can't say it out load yet. He's a fucking Nazi.
Your reading comprehension is non-existent.