Trusting X to be competent and not to be conspiring with Y is not the same as trusting X to provide you binaries.
See, these are the arbitrary restrictions. What system is this where they can't use the binary from you? Give me a *specific* example, don't just make one up that *could* exist.
-
-
I also already did that. Signal app: I might trust
@matthew_d_green that he actually looked at the code (his face is even on their website, you know). I sure as hell don't want Matthew to become upstream of signal just because he is *someone I trust*. -
Specccifics. Matthew can totally give you an app to install, so that doesn't work, you need to add more restrictions.
- 23 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.