just a random stranger
codeberg: https://codeberg.org/asudox
aspe:keyoxide.org:D63IYCGSU4XXB5JSCBBHXXFEHQ
Runs on the TOR network, fully P2P.
Afaik new versions of Lemmy should figure out the language by itself. This, however, can be wrong sometimes.
Privacy win? RCS itself does not support E2EE. Google developed a proprietary extension for RCS to include their “E2EE”.
Your best bet would be to shred the data multiple times (for example with the shred command) and then break the card physically. But shredding takes time so I guess that’s not very applicable to your case.
If you have a lighter, you also can try to melt the SD card’s insides. That should be impossible to recover.
In any case, you should keep it encrypted all the time and only decrypt it on the fly. For example with LUKS2.
Ok, the post feels like it’s made by an LLM, that’s why.
Why use an LLM to make this post?
glory to the CCP stack.