Shooting cops with guns.
Shooting cops with guns.
The terminal lets you delete the system with the same checks as GUIs, i.e. you’d be prompted for a privilege escalation password… If you delete random user files in the terminal then you can do that in a graphical file browser too. Just don’t run random commands without knowing what they do.
I really do think that’s their problem, and software shouldn’t cater to people who are afraid of checks notes typing. There can be real accessibility reasons why some users may require graphical tools due to various disabilities, but I don’t think it’s reasonable to feed into irrational fears of terminals when they can just copy paste in commands. It’s not programming, it’s very simple to understand the syntax of any command the average user might have to use (ie they’re not doing scripting or anything like that).


Auto upload to a remote location (e.g. VPS), ideally somewhere out of the country to really minimise chances of deletion. Could also have it auto upload to several places. You’ll need good enough internet connection to upload it though, so if they’re using signal jammers at a protest that could be a problem.
In terms of preventing deletion on the phone itself, you can’t really stop them from “losing” your phone, even if they can’t get into it.
For Android? K-Mail. I think they renamed it to Thunderbird now.


Daddy’s money (USA)


“yall keep promising me the roman empire is gonna collapse but it never does”
No state lasts forever, least of all an apartheid state with such a resilient resistance movement against it. Israel’s only 78 years old—there’s plenty of living people older than that. It will fall, because Palestinians aren’t going away, and they will continue to want to return.


I didn’t say it categorically wouldn’t happen, just that if that was the person’s real intentions then they’ve been very stupid about it. If you’re going to commit a murder don’t create evidence pointing to you. Like the other commenter said, a gun and self defence skills will cover you in both cases.


I’m a she. But yes, I think arming yourself is a good idea regardless of the likelihood you’ll need it.


Get a gun and learn how to use it.
But as other commenters have said, if he was actually intending on killing you, it’d be real stupid to call you in advance to say so. Most likely just wants to scare you.


If you can’t feasibly vet the code yourself (I think it is feasible for things like scripts and other small projects) and the star count is low/it’s not already well known and trusted, probably try running in a VM first and look out for signs of it doing things it shouldn’t, e.g. if it’s sending HTTP requests to the internet despite it being a program that should be completely offline. Using things like AppArmor and SELinux to prevent programs from doing things they shouldn’t need to do is also good practice.
Also, the tool itself may be low star count, but is the developer known at all? Someone with any kind of a reputation wouldn’t risk putting malware on their profile.
I suppose you could also look at the list of dependencies of the program. Is it using any libraries that don’t make sense? e.g. with the above, is there some kind of HTTP request library being used for a program that shouldn’t need to access the internet at all?
I think generally the risk is quite low as the author would be hiding their malware in plain sight if the source code is available. They’d have to bet on literally nobody checking. Which is fine for very obscure projects, but if you want your malware to spread, you want a good number of people to use it, at which point someone would presumably look at the code and notice it’s malware.


I use SpamAssassin. It’s fine, but definitely needs training. I might look into migrating to rspamd as it seems better, but I don’t have time atm.
The key was published in the files. It’s not suspicious to use the key given that it’s public info; it’s not illegal to read the released files.
I think the point of the reddit screenshot is to show what Windows users are putting up with, not to share the meme itself.


This is just an archive. No different from using the wayback machine or any other archive of web content.
10 years old is 2016. That’s not that old. I still have multiple devices from 2017 going strong, and they don’t feel old.
That’s why you don’t keep clothes if you wore them while committing a crime. Burn them.


So it mirrors repos before they go down? I think I get it if that’s the case; I thought it was just a host for “lost” software/source code in which case if you have a copy you can upload it to any software forge (if permitted by the licence). But if it’s meant to contain all software that currently exists, even if it shows no sign of disappearing, that makes more sense.


My point is that you don’t need a separate website for this; you can use existing software forge software and websites.
I don’t think any of those types of guns count as “non-violent”. None of the movements that have been the most effective have been strictly non-violent. You don’t have to be killing people at every action you do, but all the most effective movements have been willing to strategically use violence whenever the situation calls for it. Every strictly non-violent movement I’ve seen has simply been shooting themselves in the foot. When you’re shot at, shoot back, or you’re a coward obsessed with losing.