• 0 Posts
  • 28 Comments
Joined 2Y ago
cake
Cake day: Jul 07, 2023

help-circle
rss

Low odds because “you aren’t worth the effort required” agreed.

But the distance officially is like 33 feet to 300 feet depending on the adapter.


The firmware on the devices likely isn’t updated much by the manufacturers.

So “it really depends”

Unfortunately unlike WiFi, the encryption is built into the firmware in ways that don’t update much because they make everything backwards compatible so you don’t notice.


It’s actually entirely horse shit.

Only the very newest products that are on the latest standard are secure.

It all look secure and sounds secure and feels secure with all the encryption….

But about 2 years ago there was a downgrade attack that was proven to affect basically everything.

Bluetooth security might as well be a flashing neon sign of your data.

Now it’s not quite that simple and some people have updated their devices etc……

But almost nobody actually has done that because Bluetooth devices are “fire and forget”

I mean when’s the last time you updated the firmware on your headphones or keyboard?

Mostly “never”


Gotta pay the bills somehow, and I’m just happy they care about privacy.


I’m very sorry that your life feels so out of control that you need to lash out so quickly with condescension.

Did you want to talk? Or perhaps explain where you think I misunderstand?




Probably just MAC address lookups, but also possibly something weird like “ttl “ stats


It’s a rarity afaik, I’ve only heard of one or two cases, but a concerning report to me personally.

Though I’m Canadian so it’ll be a few years before it filters here (assuming it catches on)


Yeah, they can still tell that you’re Nat behind another router.

But they don’t like it because it gives them less access to your network and more possibility for something to be wrong


Some isp’s have been detecting the second router and giving people shit for it.

But I’m with you on that, I don’t trust the isp’s backdoored router-modem. Hard pass.


With physical access to the device and encryption chips, you basically can’t defend against those kinds of resources.


They’re fed propaganda to believe that privacy doesn’t matter….

But just imagine a Google admin had access to all the information about you and wanted to blackmail you into doing something…. The sheer power of that is terrifying.


Could be another “ai is just cheap labor from India” scam.

But more importantly, at what cost here? I mean how much processing power and engineering time is required and at what cost….to try and detect bike thefts?

Wouldn’t it be cheaper just to buy them a new bike?


Tineye was the first, I don’t know if it is still around


I felt so lied to when I left high school, having been told my entire life that people eventually grow up…. And now I’m 40ish and they really don’t.



Most people don’t have any concept why their privacy matters.

And until something awful happens to them, they aren’t interested in learning it either.


I’d trust the “non officers” more than the officers in most scenarios.



In many unzip utilities, they use temp files that you wouldn’t be paying attention to. These temp files will contain your credentials and you won’t know where they are or if they got deleted.


Right? Like “make sure you get a warrant” isn’t a hard answer.


The problem is that so many site hyper-optimize for chrome. Add that to Google helping create web frameworks that seem to almost intentionally break Firefox and you get a de facto standard on chrome because ANYTHING else seems broken.

Long live FF


That’s fair and I see your point, I just haven’t seen any quality messaging apps that aren’t walled gardens in that sense.


Is it?

You can run and connect to your own signal server, separate from the world if you wanted to…

Interoperability with other messengers Vs privacy are separate requirements and use cases.


But don’t worry about Google’s web environment integrity….

There should be no reason to block ads


…… if you’re using chrome, Google baked these things in anyways sooo……


Whaaaaa?

No a vpn is NOT just about dns.

Dns is the starting point, but the main idea is to route your traffic through a central point without logs.

This means that from a network sniffing perspective, I know you’re sending data to the vpn endpoint, but the data is encrypted (also a vpn important point) and I don’t know where it’s going at all after that.

Even if I’m sniffing the traffic going out of the vpn endpoint , because there’s many people using the same point, while I can see that someone on the vpn was looking up pages on the pirate bay looking for the latest movie, I’m unable to match that to. A person connected. It could be one of thousands of people browsing with this vpn. So I don’t know that it was you looking for the latest minions movie.