
31 Mar
2025
31 Mar
'25
1:02 p.m.
whoops whoops!
for example, in my experience, my devices were compromised in sophisticated ways indicating a lot of funding or power and likely connections to governments or government contractors
of course eventually i realized that any big criminal organization would try to have that,
i experienced tactics that came from some of the worst forms of human trafficking there is.
cryptographers and security engineers are asked to put backdoors into their software and hardware for governments, when these governments can be entered by criminals and used for some of the worst crimes known to our species
meanwhile the people working on decentralized security are attacked, disreputed, in favor of backdoored security like cloud storage