• 6 Posts
  • 1.26K Comments
Joined 2 年前
cake
Cake day: 2023年6月15日

help-circle








  • Apple Maps -OSMandMaps. Seems like a good option, but it’s not ready out the box. I need to do more tweaking with it. -Magic Earth. Haven’t tested it yet, seems good. But I’m looking for free options first before I dabble with paid stuff.

    If you like OSM but want a more user-friendly interface (disclaimer: I’m an Android user so I have no idea what OSMandMaps looks like), check out CoMaps! It was forked from Organic Maps due to heavy transparency concerns surrounding the former and uses downloadable OSM maps as a backend! It’s available for iOS too!

    https://www.comaps.app/download/

    Google Docs -OnlyOffice. Seems like it does everything I want.

    I’ve heard OnlyOffice is great, but if you don’t need or want any AI stuff, don’t mind a slightly less-modern UI, and collaboration isn’t a requirement, then LibreOffice is pretty awesome too. Just giving you another option. ;)

    https://www.libreoffice.org/






  • Okay, so, originally, I was going to look it up to prove you wrong, but after looking it up across multiple sources, it seems that you’re right and I’m wrong.....mostly.

    How-To Geek, Proton, and CloudFlare all mirror what you say.

    However, the Wikipedia page section “Definitions” does back me up somewhat. It says:

    The term “end-to-end encryption” originally only meant that the communication is never decrypted during its transport from the sender to the receiver.[23] For example, around 2003, E2EE was proposed as an additional layer of encryption for GSM[24] or TETRA,[25] ... This has been standardized by SFPG for TETRA.[26] Note that in TETRA, the keys are generated by a Key Management Centre (KMC) or a Key Management Facility (KMF), not by the communicating users.[27]

    Later, around 2014, the meaning of “end-to-end encryption” started to evolve when WhatsApp encrypted a portion of its network,[28] requiring that not only the communication stays encrypted during transport,[29] but also that the provider of the communication service is not able to decrypt the communications ... This new meaning is now the widely accepted one.[30]

    (Relevent text is embolded.)

    So, I’m not misunderstanding, just misinformed that the definition changed.

    Make no mistake, of course: I do appreciate you correcting me as I hadn’t realized the definition had changed. Lol.