I found this: https://simonwillison.net/2025/Jul/11/grok-musk/
BeliefPropagator
soon (tm)
I agree with the first part, but I think the second part is unsubstantiated.
See my first sentence.
To maintain the anonymity goal you still want to obtain Talers in advance (otherwise you'd open yourself up to timing correlation) - so they will have to be in the wallet for some non-negligible duration.
Regardless of expiration that also means the device holding the secrets to use the Talers can be lost in that time, so you need some e.g. encrypted cloud backup to restore from. Since people are terrible at printing out recovery codes, you can either have key escrow (leading to a compromise of the anonymity properties), or you accept that some people will lose their money for reasons they will not understand.
Regardless, I would much prefer Taler as a CBDC to whatever permissioned Blockchain garbage the Big4 consulting companies will come up with.
Your purchase includes a 12-month Sailfish OS full license subscription
Didn't expect a Linux phone to be the first subscription based OS. Makes for a total cost of ownership of ~600€ if you keep the device for 5 years. (299+4.99×12×5)
vibe-syscalls
Didn't they release falsified sales numbers previously?
This is called plausibly deniable encryption, though you cannot hide the presence of the system itself.
GrapheneOS has a Duress PIN feature, which wipes your phone if entered.
How did he fuck up his liver? Do you mean that he was doing something that caused him to develop that tumor?
it collects call logs, contacts, location, your microphone, and much more
From my cursory look at the APK this looks to be complete misinformation. The app has no permissions beside accessing the Internet and reading some basic device status information. It is not a system app either, so it cannot elevate its privileges beyond that. Therefore it can already do less than most other Google apps you have on your phone.
There's one main service that's exposed: the ClassificationApiService. Further, a machine learning library included - most likely for local/offline inference. And that all makes sense if you read what Google has to say about the app:
Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a “speed bump” that contains help-finding resources and options, including to view the content. When the feature is enabled, and an image that may contain nudity is about to be sent or forwarded, it also provides a speed bump to remind users of the risks of sending nude imagery and preventing accidental shares.
Now all that said, Google should definitely communicate the intent of these applications better, and not silently install some suspicious looking app without consent. But if Google wanted more data from you - most of the time they can just ask you to share it - Where do you store your contacts? How do you share files with your other devices?
In any case I do think that this sort of client side scanning is still concerning, since it's now just one step away from forwarding images that trigger the classification service to law enforcement.
I've head in some small shops you can still get sim cards without id ("oh I forgot it at home" ...)