It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that's only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.
Which means encrypted messaging without a backdoor would be illegal if this passes! That's a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.
It's interesting that this is kicking up some controversy. Personally I've held similar thoughts since the time of AOL, that once it leaves your system it's no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn't and lied about it. I've actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn't remember them ever being on.
One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.
Neighbor here has one of those for her kids with an adapter to plug in batteries from Ryobi tools. Nice idea if you have a stack of batteries around already that can be swapped on the fly.
The fuck they do. I had to go hunt down some tool grooming and using my kid at that age. A lack of confidence and want of external validation are powerful drivers to do stupid things that can have massive life changing impacts.
Oh fuck off on both sides of that headline. Sure, we'll let you create more monopolistic ISP lock in, just so long as you're not making any effort at not being a biggot while you do it.
All the fediverse stuff is pretty well plugged into each other, how well they interact is another matter though. I'm wishing for the day when federated ID happens so the same ID can be used on multiple platforms.
Specifically it's one of these, or at least in the nearby product line. A mere 32GB of storage and 4 GB RAM so you can get away with some pretty lean specs. Used the XFCE version if I recall. Basically just give it a try and there's a good chance it works
Tech people are prone to self created superstitions largely because that was the process someone did before and it worked, and nobody knows why, but damned if we're going to change it and risk it not working now.
Updated: 4/28/2025, 10:30 AM EDT: This article has been updated to reflect that 4chan appears to have come back online, according to a blog posted on the site on April 25.
Short lived but even if 4chan died the various spinoffs, some far worse, still exist. There will always be a place where the wild things are and they'll continue screwing with society just for the lulz.
Hey, maybe if everyone stops buying all our death machines we'll stop making so many and build something useful instead? Wishful thinking I know but...
Routers don't even need to be old to be targets. A sizable chunk of people will plug in a router, set up the WiFi and never touch it again other than to reboot so the firmware is never updated again.
It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that's only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.