@dushman Is it shaped like Android mascot is using its hand to cover mouth? 😮
@p @jessica@mk.absturztau.be @lanodan It does. There is no reference toolchain for 32-bit PPC and there are some issues building gcc-go. I don't remember all the details now, but there are some header issues. Like some register structs are real structs in glibc, but macros in musl something like that.
No, I'm pretty sure it can be done, but requires more looking into. This is definitely far from being the "easy" solution so I just said that it's not there 😅
@colinsmatt11 @safiuddinkhan@fosstodon.org @iska@mstdn.starnix.network @cyberspook Like for posting cat pics? 😹
@colinsmatt11 @safiuddinkhan@fosstodon.org @iska@mstdn.starnix.network @cyberspook Exactly!
For example in Germany it requires consent from both parties: https://en.wikipedia.org/wiki/Telephone_call_recording_laws#Germany
@lanodan @ins0mniak @p Circumventing georestrictions is the most obvious use case. TOR is really inconsistent at this. There was a configuration file directive to control the country of the exit node, but I think it's no longer there.
There are other use cases, like your electric company could have blocked your address for some weird reason 😏 You are right though, you can easily just get new one for a small fee.
@iska@mstdn.starnix.network @cyberspook @safiuddinkhan@fosstodon.org If you are willing to spend time on unlocking bootloader and installing custom ROM, I'm pretty sure you can get call recording on iOS too.
Also AFAIK call recording is illegal in some countries so it's disabled in stock ROMs.
@lanodan @ins0mniak @p Well, of course! Like I said, it's to make inspection harder on the ISP side only. VPN provider CAN spy on you, but likely has less motivation to do so. And it's not like all traffic becomes unencrypted if you are using VPN, there is still HTTPS, DNS over HTTPS — which make traffic inspection even harder.
VPN on you own VPS is a good idea in general, but if you want to switch exit nodes you've got to have several VPSs which is costly.
@lanodan @ins0mniak @p They can if you use them in a barebones way e.g. openvpn configuration, not the "apps".
And of course you have to take ll the other measures.
@ins0mniak @p @lanodan That is true. It is necessary, but not sufficient.
@lanodan @ins0mniak @p Yeah, but don't forget about countries like China, Russia, etc.
You can't sue shit there and some guy in Zurich spying on you is still more trustworthy than ISP having direct connection to the KGB 😆
@lanodan @ins0mniak @p No one's using VPN to avoid browser fingerprinting I think. It still prevents your ISP from spying on you, helps circumvent georestrictions, countrywide IP blocks, etc.
@safiuddinkhan@fosstodon.org I don't think it's that easy. True, they use whatever OS came with their device, but most take the OS into account when choosing what device to get. I can't imagine a person who wanted an iPhone, but then went to the store and got an Android device. If they decide to switch, they do it before going to the store. So if most laptops come with Linux they just might look for the ones that ship with Windows.
@daksh The most vile thing I did while being employed by a certain tech company (far from Facebook or Google on the scale of being evil) — we've read crash reports and laughed at the names our customers' computers had. Some were hilarious.
I've never sent a single crash report ever since 😅
None
Just in case: DMs/PMs simply don't exist on this instance as concept — don't use them, use the other instance if you absolutely have to, or send an email to any address at m0xEE.Net or .Com or .Org, but I prefer keep most communication public.