D3
D3
@rambda Happens all the time. There are several records. I usually warn anyone who shares intimate photos with these tools. Even with P2P encryption it is possible for a user...
@PaulNewton > Shadow banning is a moderation tool businesses can use to coral the efforts of potentially malicious accounts by making them continue to operate as if they are having...
Conclusion: People demand compliance with the presumption of innocence and their right to defense as set out in human rights. Even if it increases the attack surface and the number...
@ValZapod > No defense is allowed in FISC, FISCR and grand jury part of lower courts. I don't know what FISC is, but violation of the right of defense is...
From here we get this impression that the US does not uphold human rights in certain circumstances. I'm sorry that US citizens have to go through this.
> Just block people who tweet the same things over and over? Or filter it client side with custom JS?... Although probably not a bad feature request. Maybe they can...
I believe that there should be a credibility scale for accounts in principle. The level of credibility should be visible at least to the next user of the account. The...
I'm developing a proprietary system that has a similar purpose, but it works with document verification. If I may suggest, instead of creating a blacklist, which is easily circumvented, you...
Additionally, it is possible to cross this with the inconsistency of the language used by the user. It is more laborious but reinforces the accuracy of the technique. Let's say...
#1760 In my suggestion I work with the balance of the echo chamber. I still think hiding certain things is important to the user when it doesn't create an echo...