Conversation

Replying to
But as long as your phone is turned on, even with "location permissions" disabled, the radios in the phone that connect it to all the nice things you like are screaming into the air, reporting your presence to nearby cell towers, which then create records that are kept forever.
70
2,282
Software is equally important. The iOS and Android operating systems that run on nearly every smartphone conceal uncountable numbers of programming flaws, known as security vulnerabilities, that mean common apps like iMessage or web browsers become dangerous: you can be hacked.
33
1,633
Making dishonest comparisons and misleading people about the state of privacy/security is a bad look. It's a clear pattern for the people involved in your project, which is quite sad. Maybe promote your work without dishonest comparisons to others doing something much different.
1
1
You're the folks putting other people down by making false and misleading comparisons. The unprovoked attacks and misinformation are not appreciated. You make completely bogus privacy/security claims and mislead people about other projects/products and also your own. It's scummy.
2
No, that's absolutely not what you did. You're continuing to be incredibly dishonest and manipulative. You've gone out of your way to try to cause harm and attack others. You can keep trying to project that onto others but it's completely untrue. It's you insulting others work.
2
From your actions, all you're doing is demonstrating that the project lacks ethics, not promoting it. I've shown others your posts and intend to write a post about the people spreading this kind of misinformation. You should fully expect to be called out by name for your actions.
1