yah thats what i meant.
in a way.
yah thats what i meant.
in a way.
noice thanks.
luks will also prevent or uphold the encryption if e.g. the power is pulled?
+this means that if someone breaks in, cuts the cables during running decrypted the data is still safe?
you mean that even if the next user formats it you make sure that leftovers/artefacts cannot be read right?


probably bot?


where do you get that stuff with a dev key?
sideloading is completely fine, only requirements are the tools on the pc and a cable.
asking out of curiousity: what benefits does encryption have here?
as long the server runs everything is decrypted right? so you are encrypting for the case when someone actively steals your hardware?
edit: stealing as in taking away. but this would mean accessing during runtime is nonetheless possible in a decrypted way?


because no soldier is an IT literate and 99.9% of those people are used to ms office + every document template (which are many) would be easier to work with.


does anybody know why libreoffice and not only office? user experience and ms office compatibilty is way better for onlyoffice at leas from my perspective.


thats pretty common, in my country as well.
like a two factor authentication. but without TOTP. but with a proprietary app by the bank provided.
I just love how they giving you a link on an disfunctional pc. und do not mention which process died.
but damn this one must be important.


exactly.


for everyone who walked this path of finding (or making) the perfect note app. there is no general perfect. everybody will find eventually a workflow which works - and evolves.
but I whish you all the best and that you may built an app which inspires many. :)


Unlike many other tools, VOID is not just another note-taking app.
no offense. but if I got a penny for everytime Ive heard this…


if they do something, it’s not in your interest
lets make billboards out of this and place it everywhere


i feel that. Hetzner support has a special place in my heart
haha me too. although it was ported to fortran 4, 77 and 2003 respectively. still the logic remained in its core.
But i must admit. working on such organic grown is harder then doing yourself. comments was devils work at that time. variables shortened to 3 chars for memory sake. really a pain in the ass.


we built this shit. thus we are always to blame.


it only enabled its operators access to encrypted communications…
what the heck? isnt this much worse than simple microphone access?
I think that goes similarily with the plan that app publishers need to be authorized to publish on play store? same as with a key. KYC everywhere
so you mean unauthorized apps wont be running on android?
that would be anyway the enshittification of android.