algebro
AFAIK it’s not that easy to access data on the machine while it’s running unless they can bypass the lock screen. People pick stupid passwords for their user accounts so it’s totally possible to get in in those cases, but otherwise dont you need really sophisticated side channel attacks to get data out of memory on locked system? It’s not like there is some port on the MOBO you can just plug into to get access to RAM
The point of open source isn’t necessarily that you can self host it for free. If you want to only use services you can host yourself that’s fine, but that doesn’t make proton’s model wrong or bad.
As for the server, you have no way to verify they’re running what is in the repo, so you have to trust them anyway. Open sourcing the server-side components doesn’t accomplish anything other than making their spam filtering easier to bypass.
In models like this (and bitwarden), all the magic happens on the client (which IS open source), so the server can be dumb and more or less untrusted. If you use the Open source bridge application you don’t even have to trust the JavaScript coming from the server. I can compile the bridge and mobile clients myself and have reasonable confidence that things haven’t been tampered with without having to trust the server despite it being proprietary.
Same actually, it didn’t look quite how I expected but it actually has some very fine grain patterns that don’t show up well in the pictures. With the way it’s finished it almost looks more like some kind of shiny gem stone than bone, but maybe that’s how ivory always looks. I also have a Ralf aust that I put bison bone scales on and they definitely look more matte and “boney” for lack of a better word…
- Brush: Maggard SHD Badger
- Razor: Custom Koraat 7/8" Bellied Full Hollow with Mammoth Ivory Scales and Copper Hardware
- Soap: Tabac
- Splash: Tabac
- Fragrance: Tabac EDC
- Bowl: Captain’s Choice Obsidian Copper