IIRC She earns around 400+k per year. Which is a nice salary, but rather low compared to other execs.
IIRC She earns around 400+k per year. Which is a nice salary, but rather low compared to other execs.
As a cishet person, I like to keep to myself as much as possible as well. That way, you can call people out on their homo-/transphobic behavior and make them really regret what they said.
For all hard drives you are looking to bring, look into plausible deniability using a hidden volume. Veracrypt supports this.
Just let me use the university wide template everyone uses instead of having a dedicated template for your department that looks like shit, uses a shitty ass font, and integrates packages I despise. god fucking dammit
That’s not entirely correct. The Ultra-Orthodox spectrum is composed of different factions/sects that hold widely varying beliefs and interpretations of Judaism.
While a majority of Ultra-Orthodox are represented in the current government, there are also some Ultra-Orthodox factions that reject the Israeli state completely. Some won’t fight due to their religious studies, some due to their pacifism, some due to their pro-Palestinian sentiment, and other will fight because of their convictions or their desire to settle in the west bank.
The infighting between these groups and their sometimes messianic beliefs and discussions are sometimes very intransparent from the outside. Sometimes internal feuds even erupt in street riots between groups or police.
The government can then know you use Signal. This may be problematic in heavily autocratic regimes, but besides those, what threat scenario are you arguing for here? The Sealed Sender concept disallows building a social graph. However, you can utilize a VPN to mask your point of origin or, if necessary, even use a burner number. Under the worst case scenario that the US gov takes over the whole AWS infrastructure and tries to correlate connections to users, there’s still very high information entropy. At that point, we’re talking about the US gov as a targeting threat actor. If that’s your opponent, you shouldn’t use everyday customer electronics or applications anyway. That’s some spy shit, even domestic activists won’t fall under that much scrutiny.