they/them, ona/ona

mi toki e toki pona

  • 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: August 18th, 2023

help-circle

  • i mean, thats great! but the moneys gotta come from somewhere, and in most cases someone else is being exploited.

    most non-profits actually suffer from this issue where getting funding is the number one priority.

    the organization has to bend its methods to what will look good on paper vs what would actually be best for their cause



  • theres companies making money off of prison labor, if u want a not very subtle example. in the US, prisons are also for-profit institutions, making it even more insidious.

    then ur typical capitalist labor situation ofc. ur boss makes more off of their workers labor than their workers get paid. this “surplus value” is how bosses get richer than the ppl who work for them; all without having to do any actual work of their own.

    ow also landlords who rent housing to ppl for a price, often providing very little or even no maintenance at all for that building. this exploits peoples need of shelter for the landlords personal gain, as landlords squeeze as much money out of ppl as they can get away with (also for example, keeping security deposits for no good reason).



  • sooo theres no way of preventing ur phones storage from being copied. it has to be stored on a chip somewhere, and that chips contents can be copied.

    there is however a different way of protecting the data.

    a strong encryption password is the only real protection against this kind of attack. modern phones have a chip called a Trusted Platform Module, that is capable of storing secret keys in a way thats very difficult to get to even with physical access to the device.

    the way i understand encryption on modern phones, is that ur unlock PIN is passed to the TPM, which then passes a secret key (longer and more complex password than ur PIN) to the system to decrypt ur files.

    this way, if u only copy the phones storage, u will have to bruteforce this very complex key thats stored in the TPM. or u would have to try to hack or brute-force the TPM itself, which is hardened against those types of attacks specifically.

    having said all that, idk if its even reasonable to expect a phone to ever be secure against targeted government agencies attacks. best protection is not having anything personal on ur phone in the first place. so set disappearing messages on messengers, etc.

    TL;DR use a long pin or a strong password for ur phone and try to remove any incriminating information from ur phone as soon as its not needed there anymore.








  • i think what youre referring to is the seamless integration of windows. that was a feature of xen’s windows 7 drivers, which are no longer available due to some security vulnerabilities.

    they never supported any modern windows OS and now arent even on xen’s website anymore bc of these security issues.

    so im afraid to say that running a windows template on qubes os is the same as running a full vm on any other host OS :/