• 0 Posts
  • 43 Comments
Joined 1 year ago
cake
Cake day: June 10th, 2023

help-circle





  • It tracks anonymous statistics, without my express consent, for the benefit of a third party. I do not care if it exists to replace cookies, because I’m not even convinced that cookies need to exist at all anymore. What utility do they provide to the actual person using the browser that can’t be accomplished through some other more modern API? If the only functionality left to replace is tracking people then maybe just deprecate them and move on.


  • Telegram had credibility. It was being used by journalists to protect sources.

    You can extend trust to individuals but do not apply that to companies or organizations if you care at all about what they’re doing with what you give them. Not everyone has some mythical tech privacy wizard on call to give them perfect advice every time they open an account on an app or website.

    Even client side encryption is not infallible. The algorithm you use will eventually be crackable and probably sooner than you think. Nothing lasts forever.

    The most foolproof way to ensure something remains private is to not put it on the internet at all.







  • I’m not claiming iPhones are superior. I don’t care about dumb OS wars, just don’t put things on your phone expecting that they can’t be retrieved. That’s the only point I’m trying to make here.

    And the keys absolutely would give them access since those keys are used to sign Apple software which runs with enough privileges to access the encryption keys stored in the “Secure Enclave”. Anything you entrust to a company’s software is only as secure as the company wants to make it, and the only company to publicly resist granting that acces is Apple (so far)



  • They’re exploiting vulnerabilities and back doors not brute forcing your passcode. The only way you’re keeping them out is with hardware encryption which the iPhone has and probably why it’s the only one not vulnerable. Hardware encryption also won’t matter if your vendor shares their keys with law enforcement. As far as I’m aware, Apple is the only one that’s gone to court and successfully defended their right to refuse access to encryption keys.

    Don’t put anything incriminating on your phones.






  • underisk@lemmy.mltoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    6 months ago

    There are tons of machine learning algorithm libraries easily usable by any relatively amateur programmer. Aside from that all they would need is access to a sufficient quantity of geographically tagged photographs to train one with. You could probably scrape a decent corpus from google street view.

    The obtainability of any given AI application is directly proportional to the availability of data sets that model the problem. The algorithms are all packed up into user friendly programs and apis that are mostly freely available.