• 0 Posts
  • 47 Comments
Joined 2 years ago
cake
Cake day: January 25th, 2024

help-circle








  • TLS handles security for the email sent from your device until it reaches the server, and various HIPAA compliance rules mandates security for that data once it reaches that server. It’s not alarmingly less secure than other HIPAA compliant methods of communication, unless the email provider on your end has poor support for TLS emails.

    Editing to include the disclaimer that this is for communications sent from your end. For communications sent from their end, this protection doesn’t necessarily apply (it depends on your email provider at that point, which may not be compliant), so for them to send you protected info via e-mail, they usually ask for your consent first, and usually the e-mail is just a link to a portal where you can access that information more securely.



  • tomalley8342@lemmy.worldtoLinux@lemmy.mlWhy did PinePhone fail?
    link
    fedilink
    arrow-up
    36
    arrow-down
    3
    ·
    3 months ago

    The only reason why consumers like you and me get to enjoy free software on modern PC hardware is because of the expectation of open standards and interoperability set way back when the industry was still growing and computer users gave a shit (or rather, when only the people who gave a shit owned a computer).

    Much to the industry giants’ enthusiasm, mobile hardware stacks were developed without this baggage, and so unless something fundamental changes, all mobile devices trying to focus on free software will be doomed to failure by abysmally poor hardware support and aging hand-me-down hardware.





  • Well, until we abolish capitalism, that’s the state of things.

    I can see that things are the way things are. Accepting it is a different matter.

    Unless you feel like Nazis MUST be freely given access to everything too?

    To me, the “access” that I am referring to (the interface with which you gain access to a service) and that “access” (your behavior once you have gained access to a service) are different topics. The same distinction can be made with the concern over DoS attacks mentioned earlier in the thread. The user’s behavior of overwhelming a site’s traffic is the root concern, not the interface that the user is connecting with.