Social media erupted with bewildered reactions from attendees. Some praised the band for forcing a conversation about surveillance that most people avoid, while others expressed discomfort with the unexpected data capture.
Unlike typical concert technology that enhances your experience, this facial recognition system explicitly confronted attendees with the reality of data capture. The band made visible what usually happens invisibly—your face being recorded, analyzed, and potentially stored by systems you never explicitly agreed to interact with.
The audience split predictably along ideological lines. Privacy advocates called it a boundary violation disguised as art. Others viewed it as necessary shock therapy for our sleepwalking acceptance of facial recognition in everyday spaces. Both reactions prove the intervention achieved its disruptive goal.
Your relationship with facial recognition technology just got more complicated. Every venue, every event, every public space potentially captures your likeness. Massive Attack simply made the invisible visible—and deeply uncomfortable. The question now isn’t whether this was art or privacy violation, but whether you’re ready to confront how normalized surveillance has become in your daily life.
quad9 has their own app ☞ https://f-droid.org/packages/com.quad9.aegis/
this has nothing to do with ai though
watch this if you can’t read ☞ techlore - The UK Just Broke the Anonymous Internet https://www.youtube.com/watch?v=QiR7aQs3JTU
that would mean the death of street photography. Do you have any sources for those cases?
photographing in public space is still a right. There are exceptions, but they are understandable.
Ainsi, la simple captation d’une image dans un lieu public ne suffit pas à autoriser sa diffusion, surtout si cette diffusion peut porter atteinte à la dignité ou à l’intégrité de la personne photographiée. Le droit à l’image en France se distingue par son approche stricte.
Contrairement à d’autres pays, où la captation d’images dans des lieux publics peut être plus tolérée, le législateur français a choisi de protéger de manière rigoureuse la vie privée des individus.
Par conséquent, toute photographie d’une personne identifiable sans son consentement préalable peut engager la responsabilité civile du photographe, qui peut être contraint à des réparations pour le préjudice subi par la victime
it very much depends on the context.
1. Les limites du droit à l'image
Bien que le droit à l'image soit un principe fondamental, il existe certaines exceptions qui permettent une captation et une diffusion d'images sans le consentement préalable de la personne photographiée. Ces exceptions sont généralement liées à des intérêts publics ou à des contextes spécifiques :
- Les lieux publics et le droit à l'information : Dans les espaces publics, la captation d'images est souvent permise, notamment dans le cadre d'événements d'intérêt général (manifestations, cérémonies, etc.). Cependant, même dans ces cas, la diffusion de ces images peut être soumise à des conditions strictes. Par exemple, la diffusion d'une image prise lors d'un événement public ne doit pas dénaturer le propos ou porter atteinte à la réputation des personnes présentes.
- Les personnes publiques : Les personnalités publiques, telles que les politiciens, les artistes ou les sportifs, bénéficient d'une protection moins stricte de leur droit à l'image. En effet, leur statut entraîne une certaine forme de renonciation à ce droit lorsqu'ils apparaissent dans des contextes liés à leur activité professionnelle. Toutefois, cela ne signifie pas qu'ils sont dépourvus de droits ; toute exploitation commerciale de leur image nécessite souvent une autorisation.
- L'usage artistique : Dans le cadre de la création artistique, certaines œuvres peuvent utiliser des images de personnes identifiables sans leur consentement, à condition que l'œuvre ait un caractère artistique et ne porte pas atteinte à la dignité de la personne représentée. Cette notion est cependant sujette à interprétation et peut donner lieu à des litiges.
like i wrote under your last post, install netGuard as a VPN and activate “manage system apps” which will permit you to block google calling home
also, with ADB you can uninstall almost anything (be careful!)
you can also choose a dns which would block those (mullvad, for example
☞ https://en.wikipedia.org/wiki/Selective_perception
Selective perception is the tendency to not notice and more quickly forget stimuli that cause emotional discomfort and contradict prior beliefs. For example, a teacher may have a favorite student because they are biased by in-group favoritism. The teacher ignores the student’s poor attainment. Conversely, they might not notice the progress of their least favorite student. It can also occur when consuming mass media, allowing people to see facts and opinions they like while ignoring those that do not fit with particular opinions, values, beliefs, or frame of reference. Psychologists believe this process occurs automatically.
Selective perception has roots in cognitive psychology, where it is studied as a fundamental part of how individuals filter and process information based on biases, expectations, and past experiences. It is closely related to concepts like confirmation bias—favoring information that aligns with one’s beliefs—and cognitive dissonance, the discomfort of holding conflicting thoughts, both of which shape perception. Its applications extend beyond psychology, playing key roles in marketing (shaping consumer focus), politics (influencing voter perception), and mental health (understanding biases in disorders), highlighting its impact on both individual behaviors and societal trends.
depending on how you look, what your hair & skin colour is, you may be checked “randomly” while you’re walking home or when you’re crossing borders on a train. If your ID isn’t valid, they won’t just “not care about it”
that polite policeman passing you by with a “good day” would wake me up on the train to check harass me to see if i’m hiding who knows what in my testicles 🤬
Maybe it’s just personal experience
your experience doesn’t reflect Europe, it is a commentary about what you see in the mirror
When a vanilla GSI starts, up to 10 different Google servers are contacted and private data is transmitted. A vanilla GSI transmits several hundred megabytes of private data to Google every day.
LeOS does not have these connections and data transfers.
after @Nicro@discuss.tchncs.de
LeOS sounds interesting indeed. Why isn’t it mentioned on privacy communities (unlike Graphene and Lineage) ?
did you try running excel on wine?
internets were there before Google. I’m sure there are many people on lemmy who remember google as a new search engine they tried.
internet would be different, like it was different, if these hogs like google and facebook are banned from collecting and selling user data. Fuck surveillance capitalism. (fuck capitalism while you’re at it)
i have simplex, element, briar and even rattlegram.
with messengers “a different experience” is interesting (for me) but if the people i’m communicating with are not sharing those “experiences”, what good do they bring? Am i going to chat with myself?
Getting people to use Signal instead of WhatsApp was a challenge already. Now almost all my contacts are on Signal.
How am i going to get people to use any of these apps considering that Signal has no shortfalls (like belonging to Facebook and spying on you)?
joplin published this video recently. Open-source and offline dictation (voice typing)
https://f-droid.org/packages/net.cozic.joplin if you prefer
you can add global filters
to seep your subscriptions through in Handy
i use reject
. Yours would be the accept
i guess (or you can create a mark as starred
rule for “red bees” and you would only have news about “red bees” in your starred tab
you understandably sound confused
I try to use “private DNS” option in my phone’s settings, but it often does not work, and therefore privacy cannot be protected all the time.
when you have private DNS enabled, you have no connection if it fails. Is it in “auto” or is there a fallback option?
Sometimes I just cannot even ping other servers by IP (like 1.1.1.1) because of it. My question is: WHY this function requires hostname (so you need to query some other plain text DNS before reaching encrypted DNS)?
🤔
Also if I understand well, it uses DNS over TLS, but I’m curious why not DNS over HTTPS (which seems like a reliable solution since I have it configured in my browser and there is never a problem with it…also it uses IP address instead of hostname).
you shouldn’t use both, iirc. Your browser is bypassing your “DNS over TLS” in this case
Why no one is seeing this problem and no one wants to address it?
because there is no problem?
I tried downloading Quad9 app, but it does not work either (I guess some IPS is filtering TLS requests in my network, but again why DOH is not used then?).
quad9 app works as a vpn. What do you mean by “it does not work either”?
fossify calculator ☞ https://f-droid.org/en/packages/org.fossify.math
In the midst of the media uproar over drug trafficking, a law on “drug trafficking” is passing through Parliament. In reality, this text does not only apply to the sale of narcotics and leads to a heavy reinforcement of the surveillance capacities of the intelligence and judicial police. It is one of the most repressive and dangerous texts of recent years. This law could notably give even more powers to repress activism.
This bill was adopted unanimously in the Senate, with the support of the Socialists, the Ecologists and the Communists, and will now be discussed in the National Assembly. La Quadrature du Net is calling for urgent mobilization to raise awareness of the dangers of this text and to push left-wing parties to reject it.
for the rest of the article ☞ https://www.laquadrature.net/en/2025/02/27/all-out-mobilization-against-the-french-war-on-drugs-law/
can you post your sources for this information? i would like to read some more on this ☞
Just for reference, this is what the Google Play services app transmits roughly every 20 minutes to Google if it has network access:
Phone #
SIM #
IMEI (world-wide unique device ID)
S/N of your device
WIFI MAC address
Android ID
Mail Address of your logged in Google account
IP address
it may help me convince some more people to degoogle their machines
veracrypt then
a hidden volume with at least one backUp ☞ https://www.veracrypt.fr/en/Hidden Volume.html
isn’t orbot doing the same thing?
https://orbot.app/en/
https://guardianproject.info/apps/org.torproject.android/