We could just have that. A contest where you bring your cat, they get to play around for an afternoon, and the only outcome from the judge is “yep, that’s a cat”.
We could just have that. A contest where you bring your cat, they get to play around for an afternoon, and the only outcome from the judge is “yep, that’s a cat”.
So they have access to your crypto keys right? Not necessarily, no. I won’t even bother reading the stuff, but it is perfectly possible to have systems where user’s cryptographic keys are kept under the sole control of the user, being using client-only known secrets for encryption, wallet-like software, or even more basically keeping the key only in local storage and telling the user the seed so he can “recover” it if the local storage gets wiped/lost.
Bottom point is, it is very possible to do so, and it can be done in a safe-enough manner for most people without much hassle. Of course, that’s theoretical; weither or not corporations care about actual privacy, control, and are willing to work toward these is another matter entirely. But the technology have been there for years.
Is there some documentation somewhere about what we’re allowed to have on our desk and what we’re not?
I’m still baffled that some people can argue “why are you so worried?” about this. We have twenty years of history of shit hitting the fan, how much more do you need to not trust Facebook/Meta?
Me, looking at both the top and bottom parts: “These are the same picture”