@meowski@sally@SuperDicq@david@sun@captainepoch@newt If you use your computer offline, or behind a firewall running on an up to date computer and don't run proprietary malware on your computer, you'll be plenty secure.
@taylan@SuperDicq@aetios Spacing is somewhat hard as computer input methods are all setup to insert double-width spaces by default and it tends to waste space when it comes to handwriting.
@SuperDicq@aetios >everyone write the kana and reduce the character set of your language? It'sannoyingtoreadwordsifeverythingiswrittenlikethis - Kanji works as a separator as for some reasons spaces are not used.
@porzellanladen More or less, libreboot used to be free and osboot was the nonfree release.
Leah then decided that convenience is more important than freedom and decided to exploit how libreboot was well know to be fully free and renamed osboot to "libreboot"; https://www.gnu.org/software/gnuboot/web/
https://libreboot.org/news/policy.html (of course this policy is intentionally misleading and intentionally contains factually incorrect claims - for example it claims that Intel Wi-Fi cards, which run proprietary software, with digital handcuffs to ensure that it is cryptographically impossible for the user to replace it, is superior for software freedom than the Atheros Wi-Fi cards that don't run proprietary software, but do contain ROM, which appears to not contain malicious circuits, unlike the proprietary software for intel's Wi-Fi card; "No reverse engineering, decompilation, or disassembly of this software is permitted." (don't forget that all hardware must at least contain some ROM for a bootloader - how much ROM is mostly irrelevant as long as it functions properly and doesn't contain malicious circuits)).
@icon_of_computational_sin Rolling your own crypto is fine, just don't delude yourself into thinking it's secure and actually use it, until at least many people have looked at nobody has worked out how to break it (most hand-rolled crypto falls apart in minutes or hours even if it's beyond you to break it, if someone else looks at it).
The more complicated you make a cryptographic protocol, the higher the chance it has a cryptographic flaw - the simpler the protocol, the better, as nothing makes the NSA seethe more than a trivial to analyze protocol that is secure.