I don’t see refenece in this article or any others, but how did prosecutors get access to SBF’s Signal messages?

Was it simply a court order that he unlock his phone (and agreed), or a codefendant who flipped to the prosecution and handed over the thread?

  • RaoulDook@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    8 months ago

    Just make a separate user acct for the kid. That way your stuff is separate and you can also implement parental controls if needed.

    • essteeyou@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      8 months ago

      Yeah, we have separate profiles, but sometimes I just let him use some software on mine, like a game, or whatever, and then I go and do something else. The use-case is there, along with encrypted messages, but people say things like what you said because they don’t personally have that use-case.

      I’d look at implementing it myself, but they wouldn’t merge it, and I’m not going to maintain a fork indefinitely.

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        8 months ago

        For your use case, running a VM on your desktop should be sufficient. The VM could have disc encryption. So when you’re letting somebody else use your terminal, they can’t access your interesting messages.

        Hyper-V has this built in I believe, QEMU does it as well, UTM on Mac OS makes it pretty easy. But there’s a thousand different ways to skin this cat

        • essteeyou@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          8 months ago

          Most sensible way in my opinion would be for the Signal app to have a PIN and encryption on desktop, just like it already does on the mobile apps.