

It’s been observed that the porn industry is often one of the first adapters of new media tech before they become commonplace, but I’m not sure some things need to be shown in that high a resolution.


It’s been observed that the porn industry is often one of the first adapters of new media tech before they become commonplace, but I’m not sure some things need to be shown in that high a resolution.


Hard to say, things like Nextcloud, Immich, Emby, and Mealie probably get the most exercise, but being a tech person some of the more interesting are things like Security Onion and some of the infrastructure tools.


Yeah, though with things like the fediverse, generations that where born into the tech world (internet only really started to be a thing around high school for me, but my kids have never used dial up) and small cheap systems like raspberry pi I expect it’ll get much easier and hopefully more common.


Self host ALL the things. I know where all my pics and docs reside right here in my house.


I deleted one I didn’t even remember having. Something I created back when I first got a smart phone and as much as I recall think I used it for the primary phone login account and had my separate emails just in the client.
Only got reminded of it when they sent an email to my main address saying it had been inactive for years and was going to be deleted anyhow, so went through this process where they unlocked it after a month of waiting to see what was in there before shutting it down. Was pretty much blank from the start so it doesn’t really matter if they actually deleted it or not.
How my main email got set as a recovery is another question, probably just many years back brain not being so good at keeping online identities siloed.


Right, I just use the term sometimes to say hiding things, even if it’s hidden via encrypting it.
Will have to delve into the papers for simplex later here, but in the end there needs to be some type of known identity to pin a communication to, otherwise you’ve already breached the confidentiality point of the security triad by not authenticating the recipient.


I would say no criminal uses public services to do their business, but then there was the whole Signal thing at the DOD…


It depends on how many layers of obfuscation you are looking to deal with. There always needs to be some publicly shared token to initiate a connection, even if that’s only the public key of a asymmetric key pair to a 3rd party auth system.
There are ways to do it, but part of the difficulty is there are so many ways to do it that coming to an agreed method is like herding cats.


Which means encrypted messaging without a backdoor would be illegal if this passes! That’s a slippery slope!
Metadata is not content, so no E2E would not be illegal. Metadata is things like who sent messages to who at what time, duration, volume of data, other externally parsable metrics like that.


It’s interesting that this is kicking up some controversy. Personally I’ve held similar thoughts since the time of AOL, that once it leaves your system it’s no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn’t and lied about it. I’ve actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn’t remember them ever being on.
One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.
This isn’t new, cell tower triangulation is a fact of the network operation and is part of how your signal gets handed off between towers as you travel. Airplane wouldn’t do anything unless it where to actually disable the sim entirely, and functionally even that doesn’t cut it in the USA given that a device without one can still connect to emergency services via any tower in reach.
This is just the carrier giving a customer the data that would already exist, for a price, which I thought T-Mo actually used to give for free…


Was more an observation where I figure it came from, but it seems the LW auto bots take quite the exception to links and suddenly banned me from a dozen or so boards. 🤨
Is there a list of bad domains that it gets fussy over?


Removed by mod


https://lemmy.world/u/cahituyar
Why the second account? Or is this just another in the string of dire wolf posters?


What’s with the wave of new accounts spamming articles about this in the last few days? They’re slightly modified modern wolves, not recreations of extinct species, and largely discarded as hype by the scientific community. You’re not going to AstroTurf support here…


My guess would be an online connectivity check. Most systems try and reach some domain to say if they have network or not. Would be a logical place for them to try.
Interesting, I get a couple feeds that reference them but thought those where all gathered info rather than self published.
TOR is just slightly harder to keep up on as far as being listed on the same tables as commercial VPN hosts because it’s so dynamic. Anyone can spin up a node and be a relay or, for the brave/foolish, an exit node in a few minutes.
Privacy largely comes from a plausible deniability in that the person asking for a site could be the originator or they could just be relaying a request for the originator. Freenet, or now called hypha net is similar that way.
My perspective on internet privacy has long been that while I don’t expect to be a ghost, I can make the picture as muddy as I can to make whatever profile they gather be as useless as possible.
From the infosec practitioner perspective the number of bad actors coming from public VPN pops is exceptionally high compared to any other random IP, so they get put on a naughty list. We often cut out entire countries just because they have such a high ratio of bad 2 good traffic, particularly if it’s a country that we have no real expectation of user traffic originating from.
It’s not so much a VPN bad, but just that you’re hanging out with others that act bad. Kind of the Nazi bar thing but for hackers. If you set up a private VPN somehow on a random cloud host you likely wouldn’t see the same issues, how to keep the ownership anonymous though is another problem.
Maybe people will be satisfied when they can put their TV under a microscope to determine the actor’s sperm count…