

12·
1 day agoFor a small price, Malus.sh will use AI to ingest any piece of software you give and spit out a new version of it that “liberates” it from any existing copyright licenses.
How isethat a “clean room”? The program is scanning the actual software and making a version based on what it learned from the scan.
I think for this to be legit, you’d have to give malus a spec (no source code) of the program and then have it generate new code from that.

I think for talking to friends and family it’s fine I think.
If you’re someone that would get more scrutiny from goverment organizations because of your activities (journalist, crime boss, sex worker, etc) you might want to use something more secure.
I have no idea what these more secure applications are.Edit: Just did a quick search to see what i2p has for messaging:
I2P has messaging applications such as I2P-Messenger and I2P-Talk, which provide end-to-end encrypted communication without the need for servers. These applications allow for anonymous messaging and file transfers.
I2P-Messenger: A serverless, end-to-end encrypted instant messenger that allows users to chat anonymously. It does not log conversations, ensuring privacy. File transfer is also supported.
I2P-Talk: Another instant messaging application that provides similar security features as I2P-Messenger but is incompatible with it.
The above our super hardcore solutions that isn’t neccesary for regular day to day messaging, but useful for more extreme cases. I’ve never used i2p or these two chat apps so I can’t speak to how well they work.