• 0 Posts
  • 32 Comments
Joined 2Y ago
cake
Cake day: Aug 06, 2023

help-circle
rss

Third party anti-fraud database providers that have access to private databases with info on people. Things like public records, private records, data brokers, etc.


It’s impossible to de-google or meaningfully remove unwanted stuff from Smart TVs while keeping them usable for streaming purposes.

What you want to do is factory reset, don’t connect to the internet, go into settings and turn off whatever you can, and then use a streaming box.

Yes it’s an additional cost but it’s BETTER. The processors and memory in those TVs are lousy, the apps are often sluggish, the experience is simply not great. Frankly the hardware was built not to be usable for you, they are data collection platforms that include minimal low quality streaming experiences in order to collect data. No software is going to fix that.

Want something that “just works” and supports all the major streamers? Get an Apple TV 4k. It’s pretty private but importantly no ads, clean interface, powerful hardware. Is it maximally private? No. But it is easy.

Want to put in effort? You can get either a Dune-HD box (some have dual-OS without reboot where one is Netflix certified to get you full resolution while passing DRM checks while another is unlocked bootloader which you can install all kinds of things like Plex and Kodi on) or get some other Android streaming device of your choice (Walmart’s Onn brand 4k devices used to be very good and cheap though you might need to check as I heard rumors the latest devices can’t be unlocked).

You’ll have a better experience on more powerful hardware and will never want to go back to the bad on-board TV experience.


Wait until you find out they offer apps with ties to:

  • FBI
  • US military
  • CIA
  • NSA
  • The most awful fascist ghouls on podcasts and youtube
  • The “israeli” state and its war criminal institutions.

Curious then you pick on vague ties to China to fearmonger.

I mean FFS Microsoft and Google are actively abetting the most documented genocide in a century. Where is the outrage from these garbage people over that? Where’s the push to help boycott and pressure them to stop assisting the slaughter? Children are being killed right now in Gaza with the help of these American companies and where are the stories encouraging people to stop using them?


IMO focus on purchasing physical content from creators or distributors who NEED to get paid.

It’s one thing to foolishly throw money at these big companies for blurays of an already very successful series while they’re throwing their old libraries in the trash or ‘the vault’ or just shoveling most of their money towards low quality reality garbage.

It’s another to buy a Criterion or BFI or Vinegar Syndrome bluray of something out of print that they need to recoup the costs of restoring and scanning.

If someone buys a bluray of an MCU movie they are a chump, firstly for liking that stuff, secondly for giving Disney more money for it when those things already earn piles of cash in theaters and that alone would be enough to keep them paying salaries and producing that stuff.

Spend money on independent film-makers/releases, on restorations, on series you like on the verge of cancellation.

Sadly I think the conclusion is already written, physical media’s days are numbered, the big companies are going to shut down the overwhelming majority of bluray and dvd production within 5-10 years is my feeling because why sell you for $20-$30 a copy of something when they can get your rent in the form of streaming monthly payments for the rest of your natural life?

And best of all with the rent they can push ads which further increase their revenue. That bluray is a one-time payment, ads for watching the movie on streaming are a continual revenue stream. I predict that they will either have completely killed off ad-free tiers of streaming to push most of their audience into an even bigger and more valuable ad pool to sell to advertisers OR the prices of the ad-free tiers will grow dramatically away from the ad-supported tiers. Right now it’s a few bucks a month, I suspect within 10 years it will be 170-300% the cost of the ad-supported version.


Because their founder (Marlinspike) is probably under a National Security Letter, maybe it’s just that, maybe he’s done some crimes they’re also holding over him. If you look at his behavior it’s that of someone very paranoid that they’re going to be found out to be cooperating with the feds and get hit with charges for not upholding the bargain, someone straddling one or two big lies that have to be maintained to keep their life going. Very controlling of things they should be open about if they care about privacy as they claim. But exactly the behavior of someone under an NSL who’s terrified of getting hit with charges for that and maybe other things but who is expected to front and run a purported privacy first messenger. The secrecy, the refusal to allow others to operate their own servers, the antagonism towards federation, the long periods without publishing source code updates.

This doesn’t necessarily mean that signal message content is compromised, the NSA primarily scrapes metadata and would most care about knowing who is talking to who and to put real names to those people and building graphs of networks of people. Other things like what times they talk can be inferred from upstream taps on signals servers without their knowledge or cooperation via traffic observation and correlation especially when paired with the fourteen eyes global intercept network. With a phone number it’s also a lot easier to pinpoint an exact device to hack using a cooperating (or hacked) telecom. Phone numbers can also be correlated to triangulated positions of devices, see who in a leftist protest network was A) heavily sending messages and B) attended that protest and left last and begin to infer things about structure and particular relationships.

And those saying it has to do with spam prevention, that’s kind of nonsense. First I still get the occasional spam, second a phone number that can receive a confirmation text is something all these criminal organizations have access to which the average person doesn’t. Third it’s possible to prevent spam just by looking for people (especially new accounts under 120 days old) sending very small amounts of messages (1-3) to a very large amount of other users especially in a short amount of time. Third there’s no reason to keep the phone number tied to the account, a confirmation text could be required with a promise to delete the phone number immediately after (would still be technically useful to the NSA though less useful for keeping track of people changing numbers or using a burner for this who might be higher value targets).


This is going to get DV victims killed. At least on phone tracking like iPhone’s family sharing makes it clear it’s happening and often has a way of disabling it when you make your final run for it allowing you to keep your phone.


Look less suspicious. Be fingerprintable easily. Look unique but in a normal way. Be logged in. Look like a “normal” web user not using a hardened browser. That’s what tends to trigger them and what tends to escalate them to demanding more work to get past them.

There’s no turn-key solution that fakes all of this flawlessly I’m afraid.


You do know his wife is a Republican right? A proud Bush/Obama era Republican? They literally met at the GOP convention in 2008.

What is with liberals and playing fantasy games with politics? On the one hand liberals will say elections are important and have consequences and on the other they’ll treat it like a game of putting in your celebrity faves without bothering to care about their actual views.

Who knows what Jon himself actually thinks given he married a proud Republican and the fact he’s a TV comedian playing a character. For all you know deep down he could personally be a never-Trump Republican himself.


I doubt they would be allowed to hand out keys (which they do not hold) to another government that would compromise American businesses, agencies, etc.

Um, yes they would. The very point of eyes agreements is they allow countries intelligence agencies which aren’t allowed to spy on their own people to spy on each other’s people then pass each other the data. Snowden revealed this all a decade ago.

The CIA and FBI do not store classified sensitive info on iPhones that are backed up anywhere. At least not anything that would come as a surprise to the British or be a risk. Nothing they wouldn’t have access to via the existing intelligence sharing.

The UK and the US are thick as thieves and have been since the end of WW2.


This is frightening.

They do not have the ability to just remove e2e back-ups in the UK alone and walk away from this, that’s not how the law is written as I understand it.

The snooper’s charter gives the UK government the RIGHT to DEMAND access to encryption keys of any user GLOBALLY. The law is that they can force the cooperation of Apple to decrypt the account of an American user, of a German user, of a Russian user, of a South African user, of a Brazilian user, of a Japanese user who have never stepped foot in the UK.

So they’re claiming that this protects their users, that they haven’t complied but the only way to avoid complying with these secret gag orders for compromising encryption GLOBALLY at the demand of the UK government is to remove themselves entirely from the jurisdiction of the UK. Is to remove all executives and technical personnel from UK soil, to not hire such people who live in or are citizens of the UK as technical personnel as they could be gag ordered and compelled to cooperate. To basically entirely pull out of any presence but maybe storefronts in the UK and take steps to prevent the arrest and pressuring of their executives and key technical people with access from being subject to UK coercion.

That they haven’t done that means all users globally are still at risk. This may be a big PR stunt to convince people they haven’t caved when in fact they have in secret and will hand over data of global users to the UK which shares it via eyes agreements with the US, with France, Australia, etc. This has the added benefit of allowing the UK to keep such access secret by acting annoyed with Apple but not actually pressing any case. If they try and actually prosecute or pressure Apple that’s a sign that they haven’t cooperated globally, if they only offer angry words to the press IMO that’s a sign that in secret they’ve given access globally and only informed UK users that their cloud data isn’t protected.


An interactive firewall.

One that blocks programs from accessing the internet and prompts the first time they try until you click a button that says allow or you choose the alternative which is deny. A program like this you’d have no reason to give it internet access, it’s something whose operations should be entirely local.


Yet another reason for people to run a default prompt (deny until prompt answer) firewall.


As an extra step you can block DNS requests to external services from within your network to prevent devices trying to reach hardcoded for example Google DNS servers to bypass your filtering which isn’t uncommon with some IoT/streaming devices. Best to both block the known IPs as well as have DNS redirects for the urls that point back to your firewall at whatever IP it’s using to serve DNS from. There is a list called DoH servers by name or something like that which you can add to the blocklist to try and prevent usage of any DNS but your own.


Yeah they include a gigabit ethernet port which is really useful for full quality 4k, amazing how many cheaper streaming devices only have 10/100 ports which I suppose is adequate if all you do is stream Netflix.

But to me it’s just cheaping out to save a dollar or two on the manufacturer’s part that with ethernet & protocol overhead could result in problems potentially even for 1080p streams. Whereas gigabit even with overhead and lackluster conditions you’re going to get 700-800mbps sustained. People think for 1080p bluray dumps for instance that oh bitrates are only around 40-50mbps average but if you fast forward, if you’re seeking around the actual bitrate being consumed jumps to double or more at times and that 100mbps port will choke on that and buffer whereas the gigabit will not flinch. And though I don’t use the playback speed option myself much Infuse does allow playing back at 1.5 and 2x speeds which consume around 1.5x and 2x the bitrate respectively.

But it’s just nice to not have to deal with wireless hiccups too.


Yes. An Apple TV will be about as private as you can get for something that supports mainstream streaming apps (running a mini-pc won’t allow better than 720p quality and you’ll struggle to get remotes to work, it’ll be a clunky experience via web browsers often). It will be a lot better than a smart TV, especially a Roku who are among the worst.

If you want a bit more privacy consider running a pihole and redirecting DNS traffic at your firewall to your pihole or blocking all DNS traffic not from your pihole. I run a firewall solution that includes DNS redirection and blocking and there are a lot of measurement endpoints for streaming apps that you can block without the app breaking so that’s another little ounce. This doesn’t require a ton more effort though it is more effort it can be a set and forget type of thing. Importantly this does not block in-app ads.

For me the fact they don’t have any ads is what sells me on it. I don’t want ads on my homescreen. I don’t even want them in the apps but getting that peace and lack of clutter on the homescreen is so nice.

Apple TVs are also just so smooth. Smart TV’s feel sluggish and pathetic compared to how well everything just works on a device that’s properly powered for the task and not constantly sucking up all your data.

Apple TVs also have a lot of Apple privacy settings though obviously some of them apps may not allow like many streaming apps require a location check at least intermittently for licensing reasons to prove you’re still in the country but you can limit it as much as possible.

If you have a decent wifi network and you know you’re not going to be streaming say homemade BluRay rips the wifi entry model is excellent (currently it supports wifi 6 and has a really good wifi chip). I personally run Plex and a media server so I choose the wifi+ethernet model to have the reliability of ethernet and don’t regret it but it’s understandable if your situation precludes being able to use a wired connection or you want to save the $20 extra they charge.


Why not HEVC 10bit? We’re quickly approaching the age of AV1 and HEVC has been on the scene for a decade now so might as well have a relatively recent codec and HEVC offers improvements of 20% bitrate reduction for same quality even for 480p content vs 264. Modern devices don’t have any issues decoding it either even in software and open source encoders are mature enough. AV1 might be an even better bet but encoding time takes a really noticeable hit compared to HEVC and client device support still isn’t entirely there, the encoders are also still a little more finicky than HEVC.

As to ripping DVDs to EAC3, I wouldn’t.

Almost all DVDs are natively AC3 regular dolby digital. You can’t add more quality by doing lossy conversions and the bitrates typically present for DVDs are low enough that doing a conversion to lower the bitrate doesn’t really make sense. We’re talking 512-640kbps for 5.1 audio (and 192 to 240 for stereo) which isn’t unreasonable and the damage incurred in conversion to save say half that IMO just doesn’t make sense with modern storage prices and the amount of storage being used for 480p content. You can easily save as much without damaging the audio by choosing HEVC10 as your video encoder. If you insist on doing a conversion for DVD audio I would suggest doing so to either AAC if you have a good encoder and know how to use it or Opus but I wouldn’t recommend it (all TVs pretty much natively play/decode AC3 audio so given you’re not saving that many bits you’re just inducing degradation of conversion from AC3 to AAC/Opus and again back to AC3 for playback).

Now for BluRays I fully agree converting from those massive 2000-4000kbps DTS-HD MA, TrueHD, PCM audio streams to EAC3 at 640kbps for multi-channel audio can save a fair amount of space at scale and doesn’t incur meaningful audio degradation (while offering equivalent quality to 1000kbps AC3).


Yeah as far as “just works” goes AppleTV with infuse is really high up there.

Support for all the lossless audio you want, dolby-vision, perfect framerate switching, etc. Either that or something like a Dune-HD box (no framerate switching bugs, lossless audio, DV, etc) or an NVIDIA Shield Pro (though the value of this last one is not great, hasn’t been refreshed in years hardware-wise, more expensive than AppleTV, still has issues with framerate switching not working as well as the looming fact that it feels like Nvidia could kill it and its support off any year now).

Biggest complaint with infuse would have to be lack of extras support after people have begged for it for a decade. Other than that and having not quite as many sort options as something like Kodi/Libelec it’s pretty great. It allows for directplay and pretty efficiently connects to Jellyfin, Plex, etc. You do have to pay for a pro subscription to infuse if your library has 4k/HDR/DV video or uses any audio codecs but AAC and FLAC as they even gate regular Dolby Digital behind payment (the patent on it has expired) and claim it’s because they use the official Dolby SDK and have to pay for that. Not a lot of money admittedly, $12 a year, it’s peanuts compared to what most spend on streaming services, less than the cost of one month ad-free anything.


There is a certain smell of parallel construction. I hope his legal team is very thorough in examining every little detail, tearing apart time-lines of events, chains of custody, witnesses and find any holes at all in the public narrative if this is the case. One hopes that the parallel construction is in the way of they used illegal surveillance and intelligence capabilities to catch him and it could bring their whole case down, not in the way of they made up a claim that someone at McDonalds called the cops but really they were doing basic legal detective stuff tracking greyhound buses.


If you just don’t like ads AppleTV works great.

That said if you’re set on something less locked down you might look into Dune-HD boxes. They have some that have a dual OS. One is Android TV (not sure how mod-able) the other is Linux that can have other kinds of apps. They’re virtualized and accessible without a reboot. They have great codec support. Just realize only some of their models have the Android TV dual system thing.


If you block ALL traffic from it? Sure. It’s possible but more involved and requires the right hardware to block their tracking domains while leaving streaming apps working.

It’s best not to use smart TVs as well smart TVs. The apps they have are almost always slower or inferior in some way to the versions you get on streaming devices, updated less often, etc. I recommend pairing a TV with a quality streaming device like an Nvidia shield (or shield pro) or an AppleTV*. Alternatively if you want something a little cheaper in Androidtv space there is the Walmart brand Onn 4k pro.

*warning with Apple is while they’re pretty good on privacy (meh, there are no excellent choices that support streaming apps in 1080p quality) and don’t have ads their app-store is a bit more locked down. They have all the major streaming services but if you do high seas type stuff it will be more involved and difficult. Though if you have a local media collection (source your own discs or high seas) and run Plex or Jellyfin they have apps for both of those that work great as well as Infuse which usually requires a subscription unless you don’t need 4k or any proprietary audio codecs like dolby for any of your media. I personally can say I enjoy my AppleTV 4K and I think it’s a great device but I run my own media-server and have some common streaming services I pay for.


You can but they’ll find out. It’s reported or flagged or something, they can tell what provider holds a number and they block VOIP ones. Also if a number was ever previously a VOIP number do not try and transfer it back to proper cellular as it will still remain blocked for many but not all of these for years potentially.


Cons:

You absolutely cannot get 2FA authenticator codes from 90% of services. Many services that require a phone number even without 2FA just for “verify you’re a human” or because they want your data or to verify region use shortcode services that also will not work with ANY VOIP provider.

You will not receive their codes. These companies vary from banking institutions to gaming companies to online shopping marketplaces and stores to a Google account (used to be you could get an automated phone call to verify an account, not anymore, must be able to receive SMS from shortcodes that are disabled for VOIP numbers to register and to recover an account) just about anyone you could end up doing business with.

A shockingly large amount of companies demand phone numbers and send verification texts before allowing you to do business with them, to create an account, to recover an account, to delete an account, to place an order, etc.

They really shouldn’t, it’s a bad security practice but companies love it because with a phone number they can lower support costs by just allowing people to do a self-service where they get an automated text and can unlock their locked account. They also love harvesting that data and preventing anonymization with VOIP numbers and the reduction of fraud and increase of reliable KYC that comes with requiring them.

And they all take it as a given that EVERYONE or at least 99% have a cell plan with a non-VOIP number that works with these and the 1% who don’t they don’t care about in the developed world and are an acceptable loss.


Try toggling ErP setting or similarly named EU energy setting in your UEFI. This should resolve the lights being on.


Take a look here for some alternatives:

https://dessalines.github.io/essays/why_not_signal.html#good-alternatives

  • Matrix
  • XMPP
  • Briar
  • SimpleX

Also just because there are no alternatives doesn’t mean your default position should be we just have to trust whatever exists now because it’s good enough. Or that we can’t criticize it ruthlessly, distrust it. Call it out and as a result of that build perhaps the desire for something better, a fix as it were.

The evidence and history clearly points towards Signal being very suspicious and likely in bed with the feds. This is not conspiracy thinking. Conspiracy thinking is thinking that the country/empire that gave away old German engima machines whose code they’d cracked to developing countries without telling them they’d cracked it in the late 40s/early 50s, that went on to establish a crypto company just to subvert its encryption. That’s done everything Snowden revealed has in fact changed suddenly for the first time in half a century for no particular reason and not to its own benefit. That’s fanciful thinking. That’s a leap of logic away from the proven trends, the pattern of behavior, and indeed the incentivizes to continue using their dominant position to maintain dominance and power. They didn’t back down on the clipper chip because they just gave up and decided to let people have privacy and rights. They gave up on it because they found better ways of achieving the same results with plausible deniability.

Also why is everything “tankies” with you people. Privacy advocates point out the obvious and suddenly it’s a communist conspiracy. LOL


The problem with this is you just know after they pass it they’ll amend it to expand the definition from social media platforms to any platform of a certain size on the internet. Suddenly the whole internet is subject to censorship, review, lawsuits, banning encryption, age-gating and ID demands.

This is just a foot in the door move around kids to get the framework in then later change it to do all the stuff they really want to do like censor and chill speech, clamp down on encryption, mandate log-keeping for VPNs, implement age-gating that requires submitting IDs for anything even vaguely adult, etc, etc. In other words the beginning of an all-out attack on the open internet.


Lot of cope and denial in these threads. Yes the same-day is probably a rosy estimate based off people using 6 digit codes or something easy to crack, doesn’t mean it’s false or that they can’t hypothetically target longer alpha-numeric passwords. For all we know they might not even be brute-forcing and could be conducting some sort of exploit that over time reveals the encryption keys themselves in some way.

I’m still very curious about the nature of the mechanisms of action. I assume they manage to bypass the basic lock-out against entering too many passcodes too quickly somehow which is what enables this. If throttling could be properly enforced (to say nothing of something like 10 attempts and it refuses all future attempts and erases the key type of thing) this type of attack wouldn’t be practical for anyone using anything above a 6 digit numerical passcode in any reasonable timeframe. I wonder if they exploit wireless radios including cellular, wifi, bluetooth and force some code on the phones via these usually-on chips that enables this via exploiting problems in their architecture. Perhaps something that locks up, prevents functioning or resets certain checks via flooding parts of the hardware/software from these points of access. Or if it really is purely phy/log access to the lightning/usb-c port.


I mean combined with any kind of function, even a trivial kind. A salt derived from some machine state data (a random install id generated on install, a hash of computer name, etc) plus a rot13 or something would still be better than leaving it plaintext.


Yes but the real risk there is likely from individuals trying to dox you who can notice the obvious pattern and put 2 and 2 together to link things and build a profile.


There is just no excuse for not even salting or SOMETHING to keep the secrets out of plaintext. The reason you don’t store in plaintext is because it can lead to even incidental collection. Say you have some software, perhaps spyware, perhaps it’s made by a major corporation so doesn’t get called that and it crawls around and happens to upload a copy of a full or portion of the file containing this info, now it’s been uploaded and compromised potentially not even by a malicious actor successfully gaining access to a machine but by poor practices.

No it can’t stop a sophisticated malware specifically targeting Signal to steal credentials and gain access but it does mean casual malware that hasn’t taken the time out to write a module to do that is out of luck and increases the burden on attackers. No it won’t stop the NSA but it’s still something that it stops someone’s 17 year old niece who knows a little bit about computers but is no malware author from gaining access to your signal messages and account because she could watch a youtube video and follow along with simple tools.

The claims Signal is an op or the runner is under a national security letter order to compromise it look more and more plausible in light of weird bad basic practices like this and their general hostility. I’ll still use it and it’s far from the worst looking thing out there but there’s something unshakably weird about the lead dev, their behavior and practices that can’t be written off as being merely a bit quirky.


I wish they would just push all the big mainstream porn sites to remove the most abusive misogynistic content rather than slapping these checks on everything.

Also this will never be okay until there is a zero knowledge version that means neither the government, nor the sites, nor any other party can establish a given person’s habits which is probably not something they’ll ever do because tracking is probably part of the point.

I’m not a fan of the easy access to porn that kids have or the proliferation of the industry in general but I am worried that as part of this harmless things like erotic roleplaying websites will be swept up as part of it and well I use those. And their point is not porn though some people host and share porn as part of it (which is why it’d get swept up with it eventually probably), it’s about writing, smutty, erotic writing. And I’d rather not have to tie my identity to my desires to roleplay out an elf who ends up making “friends” with the wolf-men tribe to my real life identity (I’m not claiming that’s something I do there but it’s an example of something that would be kind of embarrassing for others to know and it’s far from the weirdest stuff that goes on in places like that).

Government having credits for how often I could say log in and continue a long-term erotic writing campaign with someone is just weird but that’s the end point of this kind of thing. Having credits seems not helpful anyways, the true porn addicts are just going to download stuff then share it in private forums, discords, p2p, etc. If the point is to stop kids from accessing this the credits thing seems odd.


So first it’s client-side scanning for CSAM. Not without some nobility. But the problem is once you wedge open that door it’s technically possible to do it for other things and so you become compelled to.

It’ll move from just CSAM to stopping and tracking “propaganda” as deemed by them which will be narrow-ish at first (anything pro-Russia, RT links, etc) but gradually expand over time to anything outside the mainstream branded as extremist (and guess what, privacy advocates will definitely fall within that label). And once that’s in place the private stake-holders, copyright holders will come knocking, they’ll say rightly so “hey you have the capability right now, we demand you implement client-side scanning to detect copyright violations” and then that will be ordered by a court, further enshrined by a law and oh look now you can no longer send political thought that the ruling regime disagrees with, can no longer surf the high seas, and so on and so forth. Congratulations and please enjoy living in the “garden” of Europe.


The venture capital dollars started running out. Returns started being demanded. Companies that made slightly improved and/or more accessible versions of more open products extinguished those products using venture capital dollars then started rolling out the enshittification, demands for money, intrusive ads, spying, dark patterns, sabotaging, paid tiers.

Back in those days the internet was a curiosity. A hobby. A fun thing to share, something a company might hope to break even on or earn minor profits with, these days big profits are demanded, centralization. Addiction to high resolution and size video and image content which is expensive to host and serve. The network effect drained smaller sites and resources, concentrating people in larger venues that had the investment dollars to support them at the cost of their privacy. Combine with search engine optimization and it became harder to even find smaller places. Add in digitally uneducated kids who thought fb and such were most of the internet and never bother to venture beneath the top 6 google results and older people and this is what you have.

Take something like Omegle. I don’t want to defend what it was for most of its existence as the bad outweighed the good IMO (like 4chan) but something like that if made today would require linking your facebook or google account and serve you video ads every 5 minutes on top of banner ads. But back then it was just something some random guy could make for fun and not think “hmm I need real identities to monetize these people to ad networks to pay for this and turn a big profit selling the data they input”.