This is a secondary account. My main account is listed below. The main will have a list of all the accounts that I use.

henfredemars@lemmy.world

Personal website:

https://henfred.me/

  • 0 Posts
  • 38 Comments
Joined 1Y ago
cake
Cake day: Jul 04, 2023

help-circle
rss


The year is 2024. I purchase a nice TV to shun nearly all of its features and never connect it to the internet because it’s designed to be actively malicious.


So the implication is that keeping the masses in check is the primary goal and protecting the children was the incidental part?


Friends don’t let friends use PayPal. If something goes wrong and eventually something will, you will find zero customer support. Add exploitation to the list of reasons.


Can’t do the time, don’t do the crime.

Or be independently wealthy.


I wouldn’t say they’re not losing users. Rather, the tide is going out. The whole market is shrinking in favor of mobile devices for the non-technically inclined. An increasingly higher proportion of their users are enthusiasts and business over the casual user.


Important quote for readers:

Once the Guardia Civil obtained the iCloud email address, the documents show that it requested information from Apple, which in turn provided a full name, two home addresses and a linked Gmail account.

I have mixed feelings about this. This doesn’t sound to me like the actual iCloud data but rather it’s metadata for an account the police know already exists. It’s certainly not great, but it could be worse.



I just assumed this is because they fired all their experienced people and they don’t know how to host their website, so you’ve got junk coming from all sorts of domains in their attempt to patch something together that works.


Mostly true. I will not deny there are benefits to bringing your phone. They are also substantial risks. Protesting can be risky business.


It is actively rolled out right now all the way back to iPhone 11 (2019) while the device is powered off. Version 16 is current, and the power “off” tracking was backported to older devices.

Android support is spottier. We’ve had powered off features one OnePlus for some time, such as the ability to trigger alarms while turned off, but more advanced features like location tracking are much more recent to Android because it usually requires specific hardware support to operate while using almost no battery. Apple has the privilege of vertical integration, so they were able to update older firmware.

I think this trend is very concerning, because with no user-servicable battery, we’re essentially forced into having our phones on to some degree at all times.



Phones are tracking devices. Do not bring your phone, not even turned off because many phones emit Bluetooth beacons and other data that can be recorded and traced.

If you bring a phone, make sure that phone has no idea who you are.


I’m not excusing it, but it makes sense technically because we can’t directly execute the D3D shaders, and converting it just-in-time could cause initial stuttering. It’s a kind of vendor lock-in in my view, and some translation step is needed. Steam even goes a step further and tries to ship you pre-compiled shaders, but it’s not perfect and especially games that update often can end up generating the shaders locally on a regular basis.

I’ve definitely noticed this, but it hasn’t stopped me from enjoying my games so far.



I wish I could do this. There are none left in my area and I’m not drilling and refining my own gas.


Hmm, I’ve had that fail on some cheap Chinese phones. They have other software that kills things in the background irrespective of the setting. I developed a VPN client and was never truly able to solve this problem on some low memory devices.


One more step away from log in to view this post. Back away from the trash fire. I see that I’m unable to login through two different VPNs.


Not sure why you’re getting downvotes. I’ve seen VPN apps get background killed on some devices.


An IP address by itself isn’t going to let you dox users unless you have access to the databases that map these to the subscriber accounts. Typically, you would need to be an ISP or law enforcement to do this, but you can also purchase this information from a data broker if you know what you’re doing.

With that said, there is absolutely nothing stopping the instance operator from getting your IP address. You’re connecting to his or her computer which they own, so they can easily see where you’re connecting from.


I’m in the early stages of becoming a billionaire. Now I just need approximately a smidge less than a billion dollars.


No. There is no room for anti-malware services in the Android design.

Such software needs permissions that reach outside of the Android security model to do things like access other application data without its consent.

Imagine for a moment that you could install anti malware with some kind of super user permission that lets the software access everything it needs to do its job. If so, malware would immediately attempt to use that feature as well, either to steal more of your data or inject itself into other applications.

Play Services is special because it operates with much higher privileges than third party software can obtain.

Now, in theory you can still scan applications before they are installed, but I would argue that there’s very limited value in doing so. If you’re installing software from sources you don’t trust, you have bigger problems. You can’t rely on a signature matching engine to detect malware in the general case.


Mixed feelings about this article. In short, it presents a new way of fingerprinting devices.

While it’s an interesting fingerprinting strategy, this is just one of many ways that a device can be fingerprinted. Do your best to avoid installing applications you don’t trust to protect your privacy.

Also, the recommendations of the article don’t make much sense. Anti malware on Android? Ridiculous and ineffective.


Good on you. I use the poor man’s VLAN–guest Wi-Fi network to isolate my IoT devices.


I went to ask nicely for help from their support department and got a development build for one of their routers. Not only was it an ancient version of OpenWRT with the myriad of unpatched vulnerabilities, but it had absolutely dumb/weird configurations like the Wi-Fi password being a user account password exposed to a patched up SSH daemon with shell /bin/false. Just a whole lot of why and an obvious lack of care put into the software.

Their devices function… Most of the time. That’s about all that’s redeeming.


Please excuse me for not providing a real answer in a top level reply, however, I think your request is fundamentally flawed.

Any proxy or proxy service can examine your egress data. Necessarily, they will be able to see your connections even if perhaps they can’t decrypt all their content. Many would consider this a privacy violation already, making your request technically unsatisfiable.

However, I’m curious to see if in some sense of the word privacy others feel there are proxy services available that can provide it.


Ask me no questions and I’ll tell you no lies. It asks much less of my instance admins if it’s understood that my information was never private to begin with.


I prefer the complete lack of privacy settings because it is open and honest about the reality of what Lemmy is able to provide.

Even if you’re running your own instance, you are necessarily submitting your data to another party. I don’t have to trust the platform as much when my data isn’t private. It’s much easier to engineer a system around that assumption.

If we suppose that anything I submit to Lemmy is submitted to the public, I can’t be misled. My data cannot be leaked because I’m presenting it to the world already. Lemmy is a young social project with many problems to solve, still trying to gain traction and hold on to users and with an uncertain future. In brief: bigger fish to fry.

Maybe privacy controls could be on the list, but I don’t think it addresses the main problems or applications of the platform and creates its own set of issues. Keep it simple and stupid.


A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.


Your replay might have been saved inside the container itself. I’m not 100% sure, as I don’t play this game.

You can browse the contents of your containers at least on my installation.

.local/share/flatpak and /var/lib/flatpak are two good starting points. Also try “flatpak enter” to browse around inside the container.


Did you install it as a flatpak or using your package manager?


Good luck to you. I’ve seen this happen a few times and I’ve never heard of anyone who successfully recovered an account with this type of lockout situation.


I hate this stuff. People can’t manage passwords and get hacked all the time, so they implement all of these extra checks that get in the way when I’m on travel. It’s an enormous pain.


Yes. I read your post earlier and ignored it because I thought you were a robot reposting content.


Until HR needs to dig up a reason to justify firing you.

But my state is at will employment only, so they don’t need a reason.


My work runs MITM with corporate certificates, so they can see everything no matter whether it’s encrypted or not. If you don’t accept the certificates to let them monitor, you can’t browse.

Therefore, I just don’t use it.


I like the browser. It never seems to break anything. My father uses it also. However, I must use Firefox with its built in Enhanced Tracking Protection in strict mode specifically to prevent Chrome domination.