I am relatively new to the fediverse.
What is the verification process?
I am relatively new to the fediverse.
What is the verification process?
From the second article:
But I'm not on Bluesky and I don't have any plans to join it anytime soon. I wrote about this in 2023: I will never again devote my energies to building up an audience on a platform whose management can sever my relationship to that audience at will
Link to the full article that matches the posts title:
https://www.972mag.com/ice-immigration-israeli-occupation-surveillance/
yeah, my point is that if it were Proton instead of Google, Proton wouldn't have the option of providing the contents of the emails, because they would be encrypted. Correct me if I am wrong.
Do we know what the hacked version of the app actually did after installed? For example, did it send all opened files back to some server owned by the hackers?
What's the theory how the pwd was obtained?
I haven't heard exactly how the DOJ obtained the files/emails. It would be interesting to know that. I only see this from DOJ:
These files were collected from five primary sources including the Florida and New York cases against Epstein, the New York case against Maxwell, the New York cases investigating Epstein’s death, the Florida case investigating a former butler of Epstein, Multiple FBI investigations, and the Office of Inspector General investigation into Epstein’s death.
It's the facial recognition piece that I find particularly concerning.