• 0 Posts
  • 41 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle





  • It tracks anonymous statistics, without my express consent, for the benefit of a third party. I do not care if it exists to replace cookies, because I’m not even convinced that cookies need to exist at all anymore. What utility do they provide to the actual person using the browser that can’t be accomplished through some other more modern API? If the only functionality left to replace is tracking people then maybe just deprecate them and move on.


  • underisk@lemmy.mltoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    2 months ago

    Telegram had credibility. It was being used by journalists to protect sources.

    You can extend trust to individuals but do not apply that to companies or organizations if you care at all about what they’re doing with what you give them. Not everyone has some mythical tech privacy wizard on call to give them perfect advice every time they open an account on an app or website.

    Even client side encryption is not infallible. The algorithm you use will eventually be crackable and probably sooner than you think. Nothing lasts forever.

    The most foolproof way to ensure something remains private is to not put it on the internet at all.


  • underisk@lemmy.mltoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    2 months ago

    If you can read and understand the code, sure. Otherwise you’re still just extending trust to someone perhaps less reputable than even the corporations who are dying to sell you out. For example, the back door some mysterious contributor slipped into xz recently.

    My recommendation is to live life as if privacy on the internet did not exist, because it doesn’t.







  • underisk@lemmy.mltoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    7 months ago

    There are tons of machine learning algorithm libraries easily usable by any relatively amateur programmer. Aside from that all they would need is access to a sufficient quantity of geographically tagged photographs to train one with. You could probably scrape a decent corpus from google street view.

    The obtainability of any given AI application is directly proportional to the availability of data sets that model the problem. The algorithms are all packed up into user friendly programs and apis that are mostly freely available.





  • underisk@lemmy.mltoLinux@lemmy.mlXZ backdoor in a nutshell
    link
    fedilink
    arrow-up
    28
    arrow-down
    1
    ·
    8 months ago

    I think ideas about prevention should be more concerned with the social engineering aspect of this attack. The code itself is certainly cleverly hidden, but any bad actor who gains the kind of access as Jia did could likely pull off something similar without duplicating their specific method or technique.