

That’ll be 3500, and 2 months of tweaking please.
That’ll be 3500, and 2 months of tweaking please.
Then you need a Trusted Third Party, right? Still requires some though on how to prevent that third party from blocking applications they don’t like but I can see how a group of trusted authorities could work.
Doesn’t work, the reason they can expire is to make certificate rotation possible. If an expired ssl certificate is cracked it doesn’t matter because no browser will accept the expired certificate, with your idea the expired certificate just signs an app with the date of 1984 and it works.
Certificates in SSL can’t change the date because that date is signed by a certificate higher in the hierarchy.
Their lifetime depends on the usage I guess.
At the same time?
Can i also double it and pass it to the next guy?
Surprise: He’s not dead
Yeah that’s their excuse, luckily the law explicitly says that:
(19) Verification by radio equipment of the compliance of its combination with software should not be abused in order to prevent its use with software provided by independent parties.
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014L0053
You can switch banks you know, it’s not convenient but easier than switching your email.
It isn’t, now that apple is using that to block installation of third party apps I’m expecting the EU to once again step in.
Does anyone read these or does it just go through ai?
Linux mobile phones won’t have to be ready if smartphones become un-ready.
If you sue now you can get a second lawsuit for free!
And here I thought I wouldn’t root or flash my next phone.
Just because it’s a bad idea doesn’t mean it wont be implemented.
I’ve searched for something like this in the past and didn’t find anything.
I’ve though of hacking together a few scripts or 8n8 to interface with freshrss to do this but it’s far down my list™
Had to read this twice.
Just great.
Obviously the customers don’t need to know that their audit logs not only could have been turned off for conversations without any extra authentication, but also are so easy to turn off that it happens by accident without any extra intervention.
Also their entire Vulnerability disclosing guideline is security/compliance/image theater.
Something like yggdrasil would work or a daemon that publishes mdns and connects to known peers.