merde

@merde@sh.itjust.works

/s

notated as

This profile is from a federated server and may be incomplete. Browse more on the original instance.

merde,

try tracker control and you will see that swiftKey doesn’t respect that “disable”

merde,

in the “traffic log”

merde,

futura ❤️

recently, upon reading about its typographer’s ideas about it, i’m trying avenir over frutiger

merde,

sadly

merde,

isn’t cross-app communication from fecesbook messenger available yet?

Help wanted

I live in the EU and the company I work at has been bought out by an american company. They now want me to sign a document that lets them transfer my personal data from my employer to the USA. They want my Name, full address and birthday. It says that they need this for some “compliance regulation” which includes the...

merde,

it depends on where she lives. This is not the U.S. and it’s not that easy to fire people with unjustifiable reasons.

She may not want her information to be stored on servers in U.S. and if she’s fired for refusing to do just that, it may easily become a problem for the company.

merde, (edited )

if op can prove that her apprenticeship is terminated for refusing to share her personal information on U.S. servers, like i wrote, it would turn into a greater problem than keeping op’s apprenticeship and respecting her European rights

did i just write the same comment with modified wording?

she just needs to “know her rights” and remind what her rights are

merde,

Monty Python and the Holy Grail

all hope is lost, the rabbit is massacring our heroes “and something happens”

merde,

Criminalization of encryption : the 8 december case

Op-ed: ʻEncryption protects our rights, privacy is not a crimeʼ

The beginning of the “8 December” trial is also the judgement of the right to privacy and encryption

In this case, protecting one’s privacy and encrypting communications is no longer merely suspect, but participates of constituting a “clandestine behavior”, a way of concealing criminal intentions. In several memos, the DGSI keeps on trying to demonstrate how the use of tools such as Signal, Tor, Proton, Silence, etc., would be evidence of a desire to hide compromising elements. And on top of this, as we denounced last June, the DGSI justifies the absence of evidence of a terrorist project by the use of encryption tools itself. According to them, if they lack of elements proving a terrorist intent, it’s because those proofs are necessarily hold back in those much-vaunted encrypted and inaccessible messages. In reaction of such absurd vicious circle, lawyers of a person charged denounced the fact that “here, the absence of evidence becomes an evidence itself“.

Any way to listen to music (privately?) (lemmy.ml)

I’m going insane. I cannot for the life of me find a suitable way to listen to music privately. I’m on iOS, and I don’t know whether to just stick to Apple Music or give up on music in general (I tried, TRIED to go local, but all the apps are shitty). Any way to listen to music and not have your data compromised? Should I...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #