LWD

joined 2 years ago
[–] LWD@lemm.ee 25 points 8 hours ago (3 children)

I understand retiring Pocket after a long, long run.

But what's up with ending FakeSpot? They just bought that. They spent an undisclosed amount of money and are now abandoning it.

Is the FakeSpot shuttering a sign of money totally wasted, or should I be concerned that the FakeSpot TOS allowed them to sell user data (specifically in the event of an acquisition) right before the Mozilla acquisition?

[–] LWD@lemm.ee 4 points 11 hours ago (5 children)

Their mod history is fucky, shows mod history 3 years ago before showing what happened 3 or 4 days ago. Feel free to verify.

Huh.

Looks like the mod history has a gap, but it's from 8 days to 3 months

[–] LWD@lemm.ee 1 points 1 day ago

Gemini is nice. It's got some serious QOL improvements over Gopher too, for those of us that like a little formatting or structure.

[–] LWD@lemm.ee 4 points 1 day ago

I think the current Register title is a little more informative (and cheeky, which is common from their reporting):

Show us your face: New Orleans PD reportedly got secret facial recognition alerts

[–] LWD@lemm.ee 1 points 6 days ago

If you subtract a negative, you do end up with more value...

[–] LWD@lemm.ee 10 points 6 days ago (2 children)

[Instance]?

Since it looks related to the jurisdiction of a server and not a community

[–] LWD@lemm.ee 2 points 1 week ago

Mattermost recommends Microsoft Windows' BitLocker for encryption. It does not have E2EE

[–] LWD@lemm.ee 3 points 1 week ago

any server that (openly or secretly) keeps chat history can ignore requests to delete it

Twice as true for any client!

The best thing a server can do is simply be a temporary relay before messages get to those clients. And the messages themselves should be undecipherable. (I'm probably preaching to the choir here, but for those who don't know, that's how apps like Signal work.)

[–] LWD@lemm.ee 2 points 1 week ago (1 children)

I think you meant to reply to hobgoblin, not me

[–] LWD@lemm.ee 5 points 1 week ago

I thought this project was dead and gone years ago. The worst ideas never really die.

[–] LWD@lemm.ee 10 points 1 week ago* (last edited 1 week ago)

It sounds like a helpful tool, but you might have to use some manual review because I don't think an automated system can easily avoid all the false positives and false negatives.

I was experimenting with similar stuff that counts mass downvotes, and I think it yields some interesting results.

[–] LWD@lemm.ee 3 points 2 weeks ago

I don't see any inherent problem with the two things you say are problems: neither DoH, nor the idea that a browser can override default settings.

I'm not a fan of defaulting to Cloudflare, but this seems more like a case of picking your poison. Somebody's going to get a crack at the domains you're visiting, are they not? It seems better to encrypt these queries than to allow a middleman to intercept them.

Regarding override default system settings, is this really a problem? I prefer browsers that give people extra options, and I would find it worse if they suddenly took this option away.

 

The goal — a centralized system with unprecedented access to data about Social Security, taxes, medical diagnoses and other private information — would create a multitude of vulnerabilities, experts say.

 

If you do not have access to the entirety of the article, it was reposted here: https://rss.ponder.cat/post/169335

21
American Panopticon (www.theatlantic.com)
 

The Trump administration is pooling data on Americans. Experts fear what comes next.

Gift article, paywall restrictions should be lifted

 

This article is in German. Link found in a popular, censored r/privacy Reddit post, a common occurrence.

Machine-translated article below:

Switzerland has an international reputation for being a safe haven for data – outside the EU, with political stability and a modernized data protection law. But this reputation is deceptive when you take a closer look at that Intelligence Act (NDG) throws. It has allowed this since 2017 Federal Intelligence Service (NDB) far-reaching interventions: cable reconnaissance, state Trojans, data retention and the exchange with foreign secret services are possible – sometimes even without concrete suspicion. Particularly explosive: In the run-up to the 2016 vote, the Federal Council assured that no nationwide surveillance was planned and that only data traffic abroad would be affected. In fact, it later became known that national traffic is also recorded. Terms such as »filtering « or »monitoring « have never been clearly defined politically – a breeding ground for lack of transparency and loss of trust.

Approval and control mechanisms exist, but their effectiveness is limited. Legally legitimized access to large amounts of data raises serious questions: How much surveillance can a democracy take? Where does security end, where does control begin? And what does this mean for companies that advertise their services based in Switzerland as particularly safe?

Also popular Swiss providers like Threema or ProtonVPN are fundamentally subject to Swiss law – and thus also to the NDG. This means that in certain cases, state access can also be legally possible here. Both companies advertise with technical end-to-end encryption or No-log policy, but technical security alone does not protect against legal access powers. Trust is good – but a critical look at the legal framework remains essential.

Yes, Swiss laws also allow official access to existing data. Switzerland is not a data protection paradise – even if it is often represented or advertised in the same way. At first glance, the location seems trustworthy, but the NDG allows extensive, sometimes suspicious monitoring. The reality of government access options contrasts sharply with the image that many providers and users paint. Those who hope for real digital sovereignty should not be blinded by the myth of the safe Swiss data port.

At the same time, in many other countries it doesn't look any better –, often even significantly worse. In the United States, for example, laws like the Patriot Act, the Cloud Act or FISA §702 (here is an overview) extensive access to data, including from providers operating outside the USA. In the United Kingdom and France there are also legal bases for tamper-free mass surveillance.

Germany does a little better in comparison –, above all thanks to the basic legal anchoring in the Basic Law, the independent case law of the Federal Constitutional Court and a lively public debate about data protection. But here, too, not everything is in the green: the use of state Trojans (Source TKÜ), the often opaque cooperation between secret services and the recurring political pressure on the long-failed Data retention show that fundamental rights are also under constant pressure in Germany. Nowhere is there absolute certainty – but how transparently and critically a society deals with surveillance makes the decisive difference.

view more: next ›