<a rel="me" href="https://layer8.space/@helix">Mastodon</a>

Pretty cool demonstration on how streamlined a social network can be. It doesn’t look like much, but then again, it’s not a lot of code and simple enough to have a small attack surface.
I can see this being a good candidate for teaching people how social networks work. I don’t think I’d use it with a friend group when other applications exist (see: network effect) but imagine the whole internet is down and you find a mirror of the python libraries used in the rubble.
Could be used off-grid, for groups of informants to a journalist or in disaster scenarios aswell. Looking forward to a proper release :)

I didn’t question the reviewability of your code, but best practices regarding software development. I don’t mistrust the safety of your code, but the quality of its development process.
You can simply create another account with your Lemmy username to publish your code in a repository.
It’s fine if you have a local or private git repository and publish via pastebin, but you didn’t write that’s the case.
I’m pretty sure he’s far from the only one. Databases with such a vast amount of “forbidden” knowledge will always be misused.
That’s why we shouldn’t have global surveillance, espionage and “highly classified material” wherever it’s possible for agencies to do their jobs without them.
And I’d argue most of the data the contractor had access to was neither relevant for his own work, nor for the work of all of the CIA.
Chipolo. Small company but it works. Doesn’t really help you find stolen stuff but you can be notified and the things can beep loudly if they are distanced from you.
It helps me find my keys and not forget anything when I leave the house. I guess they already paid for themselves by reducing the time I spend backtracking.
They also have an airtag compatible version.
You’re not as intelligent or elitist as you think you are. Grow up and leave Lemmy if you don’t want to be here.