minus-squarebndkt@lemm.eetoPrivacy@lemmy.ml•Austrian government agrees on plan to allow monitoring of secure messaginglinkfedilinkEnglisharrow-up2·4 days agoYou just have to infiltrate one end, e.g. the smartphone of one party linkfedilink
minus-squarebndkt@lemm.eetoPrivacy@lemmy.ml•Austrian government agrees on plan to allow monitoring of secure messaginglinkfedilinkEnglisharrow-up2·4 days agoProbably by infiltrating the end device using something like NSO linkfedilink
minus-squarebndkt@lemm.eetoPrivacy@lemmy.ml•Mullvad or Proton VPN?linkfedilinkEnglisharrow-up1arrow-down6·2 months agoWhat about NordVPN? I use it and I’m pretty happy. linkfedilink
minus-squarebndkt@lemm.eetoTechnology@beehaw.org•Why do AI company logos look like buttholes?linkfedilinkEnglisharrow-up1·3 months ago Manus joined the room… linkfedilink
You just have to infiltrate one end, e.g. the smartphone of one party