• 1 Post
  • 19 Comments
Joined 4 years ago
cake
Cake day: October 2nd, 2020

help-circle

  • happy to get into into these subtopics, but it’s also possible i may not be understanding you properly because i agree with alot of what you just said.

    what are you attributing the close to 0 probability to?

    if you wanna say “whats the probability that CMG was at least partly talking out their arse about their capabilities (and especially any claim they were currently in possession of that capability)?”

    i’d also give it like >90% probability they (CMG) are full of shit. in which case you could say i agree with you (to within say 10% error margin).

    if you’re instead saying the probability is ~100% that audio surveillance capability cannot possibly currently exist outside TLAs because “someone would’ve published it already” then i really cannot agree. (and afaict that ars article does not support that stance either)


  • Not disputing the three letter agencies

    The capability they were claiming to have would make a three letter agency very excited.

    sorry i didn’t understand. didn’t you say you don’t doubt TLAs likely already have this capability?

    oppressive regimes

    most (all?) of whom are operating outside typical legal constraints and likely already have access to the million dollar exploit trade which already exists.

    further, i’m not sure how this changes the landscape anyway? its not without precedent that variations on capabilities can be useful to more than one market segment concurrently?

    trivial to discover and flag as malware

    can you explain further what you mean by this? i’m not sure there’s anything trivial about conclusive analysis of the deep complexities and dependencies of modern smart devices

    Apple and Google would also be very keen to find and squash whatever loophole let’s them record without showing the notification.

    historically we’ve seen google can take over half a decade to address such things, afaict (welcome correction on this) apple’s generally been faster to respond, and i do agree apple’s current public image attire would be contrary to be seen to enable this. [not simping for apple btw, just stating that part of their brand currently seems to be invested in this]

    in reality there are a confluence of many agendas and there’s likely ALOT of global users running non-bleeding edge or other variations on the myriad of sub-system components, regardless of what upstream entities like google implement. if you are aware of any conclusive downstream binary analyses please link

    which if true would have been exposed/validated by security researchers long ago.

    i agree the probability of discovery increases over time. and the landscape is growing more hostile to such activities. yet i’m not aware that a current lack of published discovery is actual proof it’s never happened.

    tbh we have our doubts this leak is directly connected to solid proof “they are listening”.

    but we’re not currently aware of any substantiated reasons to say with certainty “they’re absolutely not listening”




  • When you work in an industry where the entire collaborative workflow of everyone is based on software that doesn’t run on Linux, then not running that software is equal to not being able to work in that industry.

    there’s no denying that’s true, though ofc it has alot to do with microsofts very agreessive and anti-competitive practices.

    though its all a bit tangential, the main issue i think comes down to what someone means when they say “everything”. certainly if someone said “you can do everything”, i’d expect them to qualify what is (should be) obviously a slight exaggeration as parlance. they don’t literally mean “everything” they just mean most everyday things. i think its fairly common in everyday speech for someone to be able to work out thats what they meant.

    in the few rare cases when someone literally means absolutely everything, then yes that silly statement would be incorrect. and if strictly intended with that meaning would certainly qualify as misinformation.












  • ganymede@lemmy.mltoLinux@lemmy.mlGeany 2.0 is out! | Geany
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    11 months ago

    not customizable

    themes, plugins, ridiculously easy custom configurations/build commands etc you can even control the window manager from config files if you want to, its insanely customisable

    lacks support for a lot of things

    edit: trying to sound less snarky, but do you have a lot of examples?

    i could see these criticisms arising from a quick glance. or we may have slightly different definitions of these terms. which is fair enough.

    imo geany’s ratio of features to weight is remarkable, perhaps singularly so?