=== ANCHOR POEM ===
════════════════════════════════════════════════════════───────────────────────────
 @user-579 
 
 I think I remember reading once that you can opt-in to encryption with
 Telegram? But it's kinda pointless unless both parties do so. My understanding
 is that everyone should be using Signal, or if you're really paranoid use PGP
 encryption
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

=== SIMILARITY RANKED ===

--- #1 fediverse/4930 ---
════════════════════════════════════════════════════════════════───────────────────
 hi does anyone know of an app that non tech people could use that's like
 "signal but organized like discord" with channels and threads and such?
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════════──────────────────┘

--- #2 fediverse/4194 ---
═══════════════════════════════════════════════════════════────────────────────────
 I guess I'm used to messaging applications where it's expected that you'll
 send what you're typing after every complete thought
 
 giving people space to return their own completed trains of... "thought" but
 without saying "thought" again because I just said it at the end of the
 previous... sentence? paragraph? idk anymore it feels weird to post like this
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #3 fediverse/5913 ---
══════════════════════════════════════════════════════════════════════════─────────
 Did you know that any wifi chip can be used as both a sender and a receiver?
 how do you think you'd get data in and out of the device?
 
 trick is... you don't actually need a router. How fun is that!
                                                           ────────┐
 similar                        chronological                        different════════════════════════════════════════════════════════════════════════════────────┘

--- #4 fediverse/1693 ---
════════════════════════════════════════════════════───────────────────────────────
 "if I work on the TTY then they can't forward my X session without my consent"
 
 - ramblings of the utterly deranged
 
 as if they couldn't just look at your unencrypted source-code as you save it
 to your hard drive smh
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════──────────────────────────────┘

--- #5 fediverse/1254 ---
═══════════════════════════════════════════════────────────────────────────────────
 @user-889 
 
 I'm always here if you need me. Let me know if you'd prefer Telegram or
 something.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════───────────────────────────────────┘

--- #6 fediverse/5369 ---
══════════════════════════════════════════════════════════════════════─────────────
 @user-138 
 
 you can use a username now. They added that functionality recently.
 
 it's supposedly more encrypted or something. But, it's still a centralized
 point of failure. If you want to say something privately, pretend like you're
 ordering drugs on the dark web and use PGP encryption or SSH keys or whatever
 it says in the "how to order drugs on the dark web" guides.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════════════────────────┘

--- #7 messages/635 ---
════════════════════════════════════════════════════════════───────────────────────
 Yeah, sure, signal is encrypted, but they could just put a virus on your
 miniature pocket tv that streams your screen into a text recognition bot which
 streams that text into an LLM trained to report on suspicious seditious
 activity.
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════════──────────────────────┘

--- #8 fediverse/4172 ---
═══════════════════════════════════════════════════════════────────────────────────
 this is what I got so far for a messaging client that uses SSH
 
 ... so you need someone's public key in order to talk to them
a picture of a notebook page that shows an initial design for a SSH based messaging client
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #9 fediverse/624 ---
═════════════════════════════════════════════──────────────────────────────────────
 You know, there's no guarantee that Youtube or Gmail has to show you the EXACT
 SAME video or message that your friend shared with you. Or did they even share
 it at all? So hard to tell when they know all the communication you've ever
 had, because you only know each other online on their platforms, [read: US
 government observed platforms] [like, HTTPS] surely there's no room for
 someone to sneak in and edit your conversations. Surely the only way to
 securely communicate is to send pure PGP encrypted bytes to another target,
 wrapped in a TCP/IP header, with unknown intent or expression. Worst they
 could do then is just, y'know, block it entirely.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════─────────────────────────────────────┘

--- #10 fediverse/2281 ---
══════════════════════════════════════════════════════─────────────────────────────
 I'd be a terrible spy. Not only is my opsec something that someone needs to
 teach me, I'm much too busy to implement things without their help. I am
 unabashedly compassionate though, so just ask and I'll pour love from my heart.
 
 But hey! There's always time to practice, each moment you can think "what kind
 of a sign is this?"
 
 Like a crazy person following the will of god, or a nature witch listening to
 the wind in the trees.
 
 What they often get wrong, and what they could be better at hearing, is that
 signals are not signs unless they're out of the ordinary.
 
 Trick is, if you're a spy, then you need to leave signals that are visible
 enough to your quarry, but not to the stars.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #11 fediverse/3454 ---
════════════════════════════════════════════════════════───────────────────────────
 deleting messages is pointless.
 
 it's always better to assume that they'll be screenshotted before you post.
 
 anything you say on the internet can and WILL be used against you
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════════════──────────────────────────┘

--- #12 fediverse/2252 ---
══════════════════════════════════════════════════════─────────────────────────────
 ┌──────────────────────┐
 │ CW: tech-encryption  │
 └──────────────────────┘


 users don't want to have to think about encryption keys.
 
 they should be available for them if they need them, in like... a folder or
 something somewhere, but they don't need to really know that they exist.
 
 more friction like that keeps people away from being secure.
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════────────────────────────────┘

--- #13 fediverse/6209 ---
════════════════════════════════════════════════════════════════════════════───────
 okay just to clarify: if anyone is recording me or storing data about me, I
 would really prefer if you didn't delete it just because I realized it was
 happening. I like data! It's cool to know such things!
                                                           ──────┐
 similar                        chronological                        different══════════════════════════════════════════════════════════════════════════════──────┘

--- #14 messages/352 ---
═══════════════════════════════════════════════════────────────────────────────────
 Though, of course, can you ever be sure who is who they say they are? You must
 consider all messages anonymous by default, and unencrypted (untrustable) and
 yet impossible to ignore. Like the messages they had to ignore at Bletchley
 Park to avoid the suspicion that they'd figured out the secret code. You know
 how it goes.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════───────────────────────────────┘

--- #15 fediverse/3366 ---
═══════════════════════════════════════════════════════────────────────────────────
 I don't know who needs to hear this, but if your friend sends you a paragraph
 you don't have to respond with a paragraph.
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #16 fediverse/2044 ---
═════════════════════════════════════════════════════──────────────────────────────
 honestly I think everyone should have two mastodon accounts - one for people
 you like, and one for people you trust
 
 (I have one)
                                                           ┌───────────┐
 similar                        chronologicaldifferent═══════════════════════════════════════════════════════─────────────────────────────┘

--- #17 fediverse/4356 ---
═══════════════════════════════════════════════════════════────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: don't-even-get-me-started-on-people-who-don't-lock-their-phone-with-at-least-a-pin │
 └──────────────────────────────────────────────────────────────────────────────┘


 if they can't get into your phone, they can at least record all of the
 received notifications.
 
 meaning they already know who it is that you know...
 
 without having to find people that are distant or unrelated
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════════───────────────────────┘

--- #18 fediverse/1293 ---
════════════════════════════════════════════════───────────────────────────────────
 ┌──────────────────────────────────────────────────────────────────────────────┐
 │ CW: re: fedi meta, the bad space, fediblock, misleading and untrue cw, uspol, speedrunning discourse, industrial revolution, aquarium tips │
 └──────────────────────────────────────────────────────────────────────────────┘


 @user-921 
 
 where tf is all this discourse I always hear about like what are ya'll talking
 about
 
 ... are you talking about me
 
 [silly intrusive thoughts teehee pay no mind]
                                                           ┌───────────┐
 similar                        chronologicaldifferent══════════════════════════════════════════════════──────────────────────────────────┘

--- #19 fediverse/3313 ---
═══════════════════════════════════════════════════════────────────────────────────
 what if it was illegal to add network connectivity to a device that the user
 didn't explicitly request to have network connectivity?
 
 I'm picturing any device being sold going forward to have a little radio
 button with like "add network features (+10$)" and "no networking included
 (+0$)"
 
 boom, no more IoT
 
 no more dishwashers phoning home telemetry
 
 no more consensual privacy invasions desecrations
 
 no more "I thought it was just a polaroid camera why does it have bluetooth
 enabled without broadcasting a pairing request?"
                                                           ┌───────────┐
 similar                        chronologicaldifferent═════════════════════════════════════════════════════════───────────────────────────┘

--- #20 messages/701 ---
══════════════════════════════════════════════════════════════─────────────────────
 one sec  gotta send something else from my phone... now, what was it, hmmmmm
 lemme think
                                                           ┌───────────┐
 similar                        chronologicaldifferent════════════════════════════════════════════════════════════════────────────────────┘