Fair enough. I tried HeliBoard because it was recommended and stuck with it. I don’t use voice to text, but got swipe texting to work on HeliBoard
What are your thoughts on HeliBoard compared to FUTO?
Try Molly instead which is a hardened fork of Signal. Molly uses the same servers and is transparent to the operator.
You can install Molly through F-Droid or Accrescent.
In depth review validating the credibility of Signal’s encryption by a Security Engineer who specializes in encryption.
Reviewing the Cryptography Used by Signal by Soatok
The bottom line was in total, no vulnerabilities were found.
I recently learned this as well. Thanks, Fediverse!
I read in a previous post that Trump’s plan leaked:
The plan requires Ukraine to give up land in Russia’s Kursk region and also to accept Russia’s land grab. European soldiers would also occupy and monitor a demilitarized zone.
Ukraine would also have to agree not to seek membership in NATO
If true, Russia is getting what it wants.
So he definitely still has those views.
Don’t worry, Vance thinks he should get a second chance.
Wow. This looks great. I’m blown away by the art and the story sounds engaging.
Reminds me of Angelica Pickles
I was just looking into building an RSS feed to escape social media. This list is perfect! Thank you.
Be the change in the world you wish to see.
The hardest part is when you have to curate by yourself. To me RSS feels like a lot of work upfront. Is there a tool to help discover items to add to your feed aligned with your interest?
What are everyone’s thoughts on Molly, advertised as a hardened fork of Signal?
There is an android version distributed on github, but it’s no longer listed on the loops.video page anymore for some reason.
The android app is on GitHub here. Version 1.0.0.9 from 15 November. Seems they are either no longer developing the android app, or at least prioritizing the iOS version.
Before the internet, Cliff Notes were popular books that summarized and provided insight into meaning for classical literature. Students used them in place of reading the actual book.
Malicious QR codes were used to establish a separate device as a ‘linked device’ which would allow the attacker to receive and read Signal messages sent to and from the target