

You may underestimate user dedication. I love my instance and totally would come back after a few months away temporarily.
You got me on the communities though.
Fediverse is designed to handle servers with less than stellar reliability.
This is a secondary account that sees the most usage. My first account is listed below. The main will have a list of all the accounts that I use.
Garbage: Purple quickly jumps candle over whispering galaxy banana chair flute rocks.
You may underestimate user dedication. I love my instance and totally would come back after a few months away temporarily.
You got me on the communities though.
Fediverse is designed to handle servers with less than stellar reliability.
Shockingly accurate even for my unremarkable small town. It even has the tree shadows!
Great move for Facebook. It’ll let them claim they’re doing something to curb horrid content on the platform without actually doing anything.
ProtectEU?
Weaken and soften EU!
You do it because it makes an attacker’s life harder because now I have to find two bugs instead of one.
The entire boot chain of the phone up to the apps you run are verified successively by the component that loads it. A digital signature helps ensure that only trustworthy code ever runs. A bug must be found to bypass these checks to load malware code. For example, a bug in the image code in a web browser might cause loading of code that isn’t checked. This way the malware gets smuggled onto the phone.
This means that if you get hacked via one bug and malware is loaded, the attacker has to work harder to solve the problem of how do I convince the phone to load it again at boot because the code it’s made of isn’t going to be approved code. When you reboot, you are effectively forcing a validation that all the code you have running is authentic, which would exclude the malware. Trick me once sure, can you survive a full pat down? Probably not. It’ll get caught.
Unless I have a second bug to fool the normal code loading systems too, the malware can’t run. You have to go back and trigger the first bug again somehow, which places more strain on the attacker.
This looks fake. Real events provide event information before you provide your personal information.
For example, many attendees might want to look up requirements or details about the event. It’s also really suspect that you can only get one ticket per mobile number. What if you have a child who doesn’t have a phone number? What about accessibility? Just follow the instructions we text you?