refalo

joined 2 years ago
[–] refalo@programming.dev 1 points 1 year ago* (last edited 1 year ago)

I wouldn't be surprised if more than one root CA was compromised... especially the free ones.

[–] refalo@programming.dev 2 points 1 year ago (3 children)

everything has some weaknesses

[–] refalo@programming.dev 1 points 1 year ago* (last edited 1 year ago)

How do you think relevant search results get to you?

[–] refalo@programming.dev 0 points 1 year ago

check their post history.

[–] refalo@programming.dev 0 points 1 year ago

I'm not here to persuade you

Then what was the point of your original comment? Saying "this person is awful because X" sounds an awful lot like persuasion to me...

[–] refalo@programming.dev 0 points 1 year ago (1 children)

I guarantee you will learn something new

What was I supposed to learn exactly?

[–] refalo@programming.dev 6 points 1 year ago (3 children)

The first link doesn't show what you say it does.

I read the entire second link and I do not agree with your conclusions. Do you have any specific examples that illustrate them?

[–] refalo@programming.dev 22 points 1 year ago (1 children)

She has her hand in too many strategic places, unlike Telegram.

employed at Google for 13 years

speaker at the 2018 World Summit

written for the American Civil Liberties Union

advised the White House, the FCC, the FTC, the City of New York, the European Parliament, and many other governments and civil society organizations

[–] refalo@programming.dev -4 points 1 year ago* (last edited 1 year ago) (8 children)

I wouldn't consider that acting like an ass... users often make loads of super-niche requests that most people will never use, and then they're ungrateful when you don't do it, so I'm not really surprised at the tone of responses I read in that thread.

It's easy to judge someone when you haven't walked in their shoes.

view more: ‹ prev next ›