Todd Bonzalez

I’m just some guy, you know.

  • 0 Posts
  • 37 Comments
Joined 1Y ago
cake
Cake day: May 07, 2024

help-circle
rss

How is this an example of failed privacy?

YouTube is a video sharing site. People pushed a button to share their videos. They wanted people to see these.

These videos aren’t much different than what you find on Facebook or Instagram today, it’s just that over the past decade people have gotten better at naming and categorizing what they post.

The real quirk here is that the app made it way too easy to upload the default filenames, so we can now search for them specifically like a little time capsule.


Why are you telling us and not showing us?


Why would this be convincing? Do cars just start doing burnouts when they’re near explosions?


This is the shittiest, fakest VFX I’ve ever seen.


I use Edge on my work laptop because:

  • Vertical Tabs
  • Logs into my SSO account
  • Leaks info from my computer like a sieve (it’s my employer’s info, and they don’t deserve privacy)

Mullvad’s Linux client is a nightmare. I just use the Wireguard config file so I can choose how the rest of the network stack should behave.


On Android apps connected with a Google account, “Can read, send, and delete emails” scares the shit out of me.


This is a wild admission. Not only does it show that Telegram completely betrayed all of their users, but it also reveals that they know about all the terrorism and child porn channels on their service, and deliberately didn’t delete them.


SIMlink 4G

Are these sensors connected to a cell network? What the hell? More than half my life ago, when I was in high school, we had wifi…


lmao, just now reading this incredible response to me calling you paranoid.


Hopefully it will be asked by the very smart people who actually develop TOR, and not just paranoid Internet randos like OP.


I went one step further than OP and actually read the article.

Web-based generative AI tools/chatbots

he created fake AI CSAM—but using imagery of real kids.

All the privacy apps in the world won’t save you if you’re uploading pics to a subscription cloud service.


Ask him for his passwords, and when he says no, ask him to explain why. He’ll surely have things he doesn’t want you to access. Then explain that other people he doesn’t even know have that access right now, because he keeps thoughtlessly giving away digital access using apps and linked accounts.

If he gives you his passwords, log into his stuff and print his browser history or something. Stick it to his fridge.


Remember when they passed laws protecting our library and video store rental histories instead of letting data brokers hoover up every song you listen to and every news article you read?


Russia and Venezuela are huge hotbeds of piracy from populations without access or capital to access most forms of entertainment.

Breaking P2P in this manner would basically be getting rid of the circus part of bread and circuses. Not a good move for an authoritarian.


Because Mozilla promised us privacy, and “privacy-friendly” ad tracking is still worse privacy than not baking ad tracking into the browser in the first place.

And they tried to sneak it in under the radar because they knew they were being sketchy.


They’re going to implement something like eBPF for the Windows kernel. This will allow kernel-level modules to run with zero risk of crashing the kernel. If the module fails, it fails without taking down the kernel with it.

Linux already has this. It works great. If Windows gets this, all antivirus and anti-cheat software is going to have to transition.

Once that happens, it will be way easier to add anti-cheat software to Linux that operates the same as on Windows. It may be possible to load and unload it only when playing and actually having competition-grade gaming on Linux.

Of course, this is a security disaster that I wouldn’t allow on any of my daily drivers, but I would enjoy playing Destiny on my Steamdeck if there’s a legit way for me to do it.


I’m pretty sure you can get a hijab for under €3k…

At least I hope so, they don’t seem very expensive.


Are you implying that all Lemmy post titles are demonstrably true?

How’s your object permanence?


If encryption doesn’t matter to them, then at least one of these statements must be true of every phone they unlock:

  1. The device wasn’t actually encrypted.
  2. The device was already in a decrypted state and we bypassed the screen lock and not drive encryption.
  3. We acquired the decryption keys somehow.
  4. We have technology that can break modern encryption without learning keys from another source or brute forcing.
  5. We have enough processing power to brute force a modern encryption algorithm.

#1 and #2 are possible because government contractors lie all the time about what they actually do. Pretending to decrypt stuff isn’t outside the realm of possibility.

#3 is the biggest concern, especially if they are able to infer what the key is by uncapping silicon or something, because that would mean that any phone that could be unlocked by this company is as good as unencrypted since the device contains the keys in a retrievable format for some reason.

#5 and #6 are pretty much impossible, and such abilities would be far more profitable if used for just about anything but unlocking phones.


Okay so a company whose entire business model relys on their ability to bypass smartphone security is going to start an arms race with the security community that will lead to their own product losing viability?

There’s absolutely no incentive to do this. They have absolutely no reason to want smartphone security to improve, or to show off how they do what they do.


Because they would have to possess technology that doesn’t exist in order to circumvent actual encryption without a key.

If I adequately encrypt my own data, and keep the keys a secret, I could hand my hard drive off to Microsoft and they could spend billions running all their AI clusters trying to crack it, and it would be a futile endeavor.

If the government had the technology to bypass encryption or quickly and inexpensively crack it, they’d use it for a whole lot more than unlocking smartphones. They could basically control the flow of Bitcoin on a whim with such tech.



Anybody using Signal for secure messaging is misguided. Any one of your recipients could be using the desktop app and there’s no way to know unless they tell you.

That’s why I only communicate face-to-face inside of a soundproofed faraday cage.

If the app manages the keys, then you can’t trust the app.

If the recipient manages their own keys, then you can’t trust the recipient.

Encryption is fundamentally insecure. Once I encrypt something, nobody should be able to decrypt it ever again.


It’s true, anyone using SSH for secure messaging is absolutely misguided.


especially in the hands of a third party company managing your data claiming you are safe and your privacy is protected.

Yeah, especially in this specific situation that isn’t relevant to this situation.


With SSH at least you can password protect the key itself so that you always get a prompt.


That should be available on mastodon such that you can donate to your fav people/orgs

This Already exists. You can stick the URL to your Patreon / Ko-Fi / LiberaPay / Venmo / Cashapp / PayPal / Zelle / OnlyFans / WeChat / etc. into your Bio. There’s even a convenient grid of listing lots of URLs or other info.

Don’t make the mistake of wanting an “everything app”. Integrating DeFi into Mastodon itself would be a catastrophe. Let people use the financial tools they already have, instead of trying to create some new banking system built on social media.


This post links to Soapbox, which is run by Alex Gleason, the Neo-Nazi who runs Poast, Baest, Spinster, and even helped run Truth Social. We’re already in fashy shadow-fediverse territory here.

Nostr is literally a social network made by and for Bitcoiners. Its defining feature is being “censorship proof”. Scams, Nazis, and CSAM are pretty much everywhere.

Nostr is basically decentralized 4chan with worse users.


Look, pitching Web3 on Lemmy is already a stupid idea, linking to a site run by Alex Gleason, the Neo-Nazi that wants to turn the Fediverse into a fascist playground, is even stupider.

Fuck every part of this post. Fuck Nostr, Fuck Crypto, Fuck Soapbox, Fuck Alex Gleason, Fuck Truth Social, Fuck Neo Nazis, and Fuck every other social cancer involved.


I think the issue is that someone could physically look at your screen and walk away with the account number, not that they might have remote access.


I would recommend ADTAQ. They’re a small anti-corpo provider from Gibraltar who built their whole business remotely in an ultra-cheap datacenter in Quincy, Washington. Very reliable, very affordable, but with their only datacenter in WA, you probably don’t want this if you live too far away.

A little bit more expensive, but with a richer product line and by-the-hour pricing is RamNode, with very cheap offerings hosted around the world.


Okay, so €1000 over 120 months, that’s another €8.34/month, plus the €15/month in electricity costs. A total of €23.34/month.

So yeah, you’re not going to get those specs at that price on a VPS today, but there are a lot of caveats here.

  1. 10 years is a very generous prediction for how long this cluster will last. In my experience, hardware that runs 24/7 lasts about 5 years before something happens requiring replacement.
  2. Even if your hardware does last 10 years, Moore’s Law suggests that it will be completely obsolete well before then. Chances are good that your Cluster’s specs will be rentable in the cloud for less than you are paying for electricity at some point before 10 years passes.
  3. Resource usage determines how useful the cluster actually is. Are you using all 24GB of RAM? Are you using all that disk space? If not, you’re paying for something you’re not using.
  4. Maintenance. Especially with an HDD, you need to expect parts to break. How much do you budget for that?
  5. Connectivity. Is your home Internet connection suitable for your needs? Is it worth the performance degradation your projects might have on your home network? If you subscribe to a second Internet connection for your hosted servers, how much does that add to your monthly bill?
  6. Security. Are you hosting anything publicly accessible from your home network? Can you trust that what you are hosting won’t provide bad actors access to your network? How much extra will it cost to segment your network to be more secure?

At least with a VPS you can rent only what you need when you need it, have a dedicated multi-gigabit network connection, and watch server specs increase and costs decrease as scalable hardware capacity improves over time, all while keeping your home network safely out of the picture.


Well, how long do you expect the cluster to last, and how much did it cost? We need to factor that in to understand the true monthly cost of the cluster.


Oh no, not consequences for his actions! How unfair!


Yeah, I’ll just only visit sites that never embed Twitter, and stay away from spaces that ever mention Twitter. So easy, I can’t believe you’re the first person to think of this.


Holy shit, never use Brave. Complete piece of shit browser with scammy crypto features baked in. I have no idea why people are still recommending this browser given everything we know about it. You’d be better off installing Edge (not an actual recommendation).