The difference is that the dev paid for their training themselves
The difference is that the dev paid for their training themselves
Could maybe be worked against using a reputation based system to disqualify bad actors from the general rotation
Tragic airplane crash: Over 2700 suspected dead due to airplane data log
3 out of 4 of these demands presented in the link are measures for more transparency. I do not understand the parallels you’re trying to draw?
But that’d already entail control over the whole Signal AWS in- and egress as well as any VPN you may be using and/or your local ISP. And then you still have to prove the actual link to the natural person. At that point we’re speaking of a threat level assuming the US DoD as adversary. While not impossible, I think if you’re willing to pick that kind of fight, you’re clever enough not to rely on Signal (or most digital communication).
Signal is not WhatsApp, there aren’t a lot of data points linking your communications to end points in the same way Meta does link them.