When it comes to transferring money and power to politicians, federal agencies, and the politically connected rich, they are already extremely efficient.
Isn't that nostr:nprofile1qqsth7fr42fyvpjl3rzqclvm7cwves8l8l8lqedgevhlfnamvgyg78spz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3qamnwvaz7tmwdaehgu3wwa5kuegpz4mhxue69uhk2er9dchxummnw3ezumrpdejqj9swg4, but sustainable?
If you find yourself forced to use a network that is under the control of, designed by and/or operated by a potential adversary, then you're going to need end to end encryption.
- Phil Zimmermann
If you find yourself forced to use a network that is under the control of, designed by, and/or operated by a potential adversary, then you're going to need end to end encryption.
- Phil Zimmermann
Is encryption allowed on the ameteur radio network?
If you find yourself forced to use a network that is under the control of, designed by and/or operated by a potential adversary, then you're going to need end to end encryption.
- Phil Zimmermann
nostr:nprofile1qqs827g8dkd07zjvlhh60csytujgd3l9mz7x807xk3fewge7rwlukxgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qgswaehxw309ahx7um5wghx6mmd9usjfpck
How does Citrine work when I am connecting with Amethyst via TOR? Will my IP get leaked on Citrine because it doesn't use TOR?
nostr:nprofile1qqsza7flq8xjfylqgg66dwrmzrfuff6w9flt0s72795zdrm27ue3fdgpp4mhxue69uhkummn9ekx7mqpzamhxue69uhkzapwdehhxarjwahhy6mn9e3k7mgpzemhxue69uhky6t5vdhkjmn9wgh8xmmrd9skcf3ywc0 wrote a book: Clean Code. Best book on code documentation out there.
Notes by graffiti | export