• 0 Posts
  • 19 Comments
Joined 1Y ago
cake
Cake day: Jun 12, 2023

help-circle
rss

never turn on ISP-supplied WiFi

maybe I’m missing something here, how do you get access to the internet for all devices (mobiles, laptops, …) without wifi then?


Backend of this is OpenAI / LLM; so my guess is if OP knows what they want, they can prompt such models or chatbots in such a manner to achieve the desired styles.


this may make it easier tho. as in, why set up another instance when you can just buy it from a well-known player?


Do we know whether federated content (say from Lemmy or Mastodon) with these sites may be under the deal as well?


while the following is not really my threat model, wouldn’t a person who’s being targeted, say a journalist/activist, have a higher chance of their device being compromised (possibly even physically)? If so, would Session still be a valid option for them?



I’m curious about how to verify that these bots respect the rules. I don’t doubt that they do, since it might be a PR nightmare for these big tech companies if they don’t, but I don’t know how to verify them. Asking because I’m also doing this for my website.

By the way, LLMs are usually also trained by common crawl, (not sure to what extent), but I’m not sure whether you want to block common crawl.

Another thing to consider is whether your website is indexed and crawled by web archive, and whether web archive has some policy on AI bot crawlers and scrapers.


In the web version, there should be a button (eg see https://lemmy.world/post/1067695). On mobile apps, my guess is it depends. I usually do it manually, the old copy-and-paste, and also provide the link to the original post.


no clue, I’d love to know too.

Maybe crosspost or create a post on Mastodon and tag them (signal, protonvpn, protonmail, tutanota, …)


Wow they chose to semi-hijack a common acronym for explainable AI (XAI), for a new company that’s likely unethical. Why do companies do this, hijacking existing words with benevolent meanings then eventually dirty them?


Airlines increasingly use facial recognition systems for when travelers board aircraft. Generally, a passenger looks into a camera, the system compares their face to images on file, and confirms if the passenger is who they claim to be.

I’m very confused by this. What is the justification for taking another picture? Usually government ID/passport already has a picture on it.

Unless they are pushing for full automatic ID confirmation (which is a very bad idea), the people at the boarding gate could just confirm with their eyes, no?

In addition, I could see this especially concerning for international students, foreigners and visa workers. The mentality is not to disturb the system and it is highly likely that they will submit without a fight. Those without a law background like in the article are less willing to stand there and argue.

I fear this will further create conformity for those around before take off. No one wants to be the little bugger that makes a scene or holds off the line. Plus, this will further foster such submissive mentality for international travelers (eg their friends, their family) to expect and submit to these intrusive practices without question or the possibility to repeal. Slowly this adds onto the 75% target, and then it will keep growing, to 97%, then to 100% …


Not OP. But I’m personally curious about the question regarding how decisions are made, but with more focus from the perspective of user experience. As in, how do they decide which features to focus on?

While I’m a fan of Proton, sometimes they seem to be doing too many things simultaneously, which is good but I worry them spreading themselves thin.

How do they do user experience research, especially with many people in the privacy community usually turning telemetry off? What do they rely on to make decisions about features and user experience? Do surveys work for them? Who make the decisions afterwards?


while I like and personal use frontends, it happens quite often that instances disappear after a while, especially those from non-popular domains. One benign scenario in 5 years is that they just don’t work, eg domains expire or abandoned.

But another possible scenario in 5 years of these invalid links is that they can be hijacked by malicious actors, to use as honeypots and what-not. For example, random person searching for a review in 5 years time may stump upon them.

Are there ways to safeguard against this? Or is this not a concern at all?

Plus, front-ends or alternatives, these instances (eg lemmy itself) many times have weird names. It is often off-putting to see new weird ones and to ponder whether they are trustworthy, especially if there keeps to be new ones every few months.

I think we’re told to be wary of weird-looking links as a general internet starter pack, in our jobs, … And the frontends/alternatives links can often be at odds with this mentality. Whenever I share an invidious link, eg yewtube, to my friends, they are usually worried and uneasy, even after I try to explain.


Reuters reported in 2022, however, that some cities are beginning to rethink bans on face recognition as a crime-fighting tool amid “a surge in crime and increased lobbying from developers.”

Sounds to me like there’s a deeper issue here in these cities (probably society in general) that needs to be tackled at its root why people are turning to crime. Is it because they couldn’t find reliable jobs to support themselves and their families? Is it related to drug abuse issues that might be rooted in or coupled with mental health issues?

If these hold some truth, then cities need to take a look at them much closely, invest in the people and organizations that can help solve them, rather than overly investing in technologies and enforcement that not only do not solve them, but may even further exacerbate these systemic issues.


It’s so weird because I thought I Lemmy sorting algo has something to do with some power law? of upvotes and age, but I remember this one didn’t have that many (which I initially had thought it was new without looking at the date). So it should not shown up at all. Anyway, yes the sortong algo needs some re-thinking, and potentially allowing users/instances to control the parameters.


I guess you’re already said it, there are ones that have a network effect, and depending on your priorities/relationships, you can cut them off or compromise. I cut off Facebool/Meta products in general some time ago, because it was clear that would be better for my mental health. Still kept in touch with people through texts and Signal. And I’m OK with having a smaller less noisy network. For most of my personal relationships and matters, I’d have to compromise less.

On the other hand, for more professional matters, like work, or trying to find communities that I care about or seek help from, I’d have to compromise more and accept that I have to use Zoom, Slack, Google products, … I have found ways to be OK with it. I hope you can find a way.

At the same time I may raise issues about those products’ nature if/when appropriate, with my colleagues, while acknowledging that the alternatives aren’t always seamless and easy. Let’s face it, many alternatives keep changing, and may require a high level of entry. Anw, when I can and if it’s easy enough, i may show them how I use alternatives and let them decide on their own.

Key points: compromise, be understanding & empathetic but still vigilant and an advocate when possible

EDIT: holy crap, I just realized this post is 3Y old. I’m an idiot 🤦


privacyguides recommends Raivo OTP, see https://www.privacyguides.org/en/multi-factor-authentication/

Raivo OTP is a native, lightweight and secure time-based (TOTP) & counter-based (HOTP) password client for iOS. Raivo OTP offers optional iCloud backup & sync. Raivo OTP is also available for macOS in the form of a status bar application, however the Mac app does not work independently of the iOS app.

Its Github repo is at https://github.com/raivo-otp


Can you elaborate on how the Nostr protocol seems better than ActivityPub? Do you mean it in terms of privacy?

I don’t know much about the underlying backend of Nostr, just that when I tried the platform, like you said, full of BTC stuff without any meaningful content of interaction.