foss Free and Open Source Software FOSS quality vs. non-free s/w quality
Jump
foss Free and Open Source Software FOSS quality vs. non-free s/w quality
Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    The 1st ½ of your comment sounds accurate. But...

    And also in Foss there are highly opinionated software where the devs completely ignore users, ban them from GitHub when they post issues,

    Right, but to be clear non-free s/w is worse - you can’t even reach the devs, generally, and there is no public bug tracker. FOSS is an improvement in this regard because at least there is a reasonable nuclear option (forking). The nuclear option for non-free software is writing it yourself from scratch.

    5
  • foss Free and Open Source Software FOSS quality vs. non-free s/w quality
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    That all sounds accurate enough to me.. but thought I should comment on this:

    However - in larger enterprises there’s so much more, you get the whole SDL maturity thing going - money is invested into raising the quality of the whole development lifecycle and you get things like code reviews, architects, product planning, external security testing etc. Things that cost time, money and resources.

    It should be mentioned that many see testing as a cost, but in fact testing is a cost savings. In most situations, you only spend some money on testing in order to dodge a bigger cost: customers getting burnt in a costly way that backfires on the supplier. Apart from safety-critical products, this is the only business justification to test. Yet when budgets get tightened, one of the first cuts many companies make is testing -- which is foolish assuming they are doing testing right (in a way that saves money by catching bugs early).

    Since the common/general case with FOSS projects is there is no income that’s attached to a quality expectation (thus testing generates no cost savings) - the users are part of the QA process as free labor, in effect :)

    5
  • foss
    FOSS quality vs. non-free s/w quality

    There is a common theme pushed by fanatics of capitalism that never dies: that a profit-driven commercial project ensures higher quality products than products under non-profit projects. Some hard-right people I know never miss the chance to use the phrase *“good enough for government work”* to convey this idea. I’m not looking to preach to the choir here, but rather to establish a thread of scenarios that correspond to quality for the purpose of countering inaccurate narratives. This is the thread to share your stories. In my day job I’m paid to write code. Then I go home write code I was not paid for. My best work is done without pay. ***Commercial software development*** When I have to satisfy an employer, they don’t want quality code. They want ***fast*** code. They want band-aid fixes. The corporate structure is too myopic to optimize for quality. ::: spoiler Anti-gold-plating: I was once back-roomed by a manager and lectured for “gold plating”. That means I was producing code that was higher quality than what management perceives as economically optimal. ::: ::: spoiler Bug fixes hindered: I was caught fixing some bugs conveniently as I spotted them when I happened to have a piece of code checked out in Clearcase. I was told I was “cheating the company out of profits” because they prefer if the bugs each go through a documentation procedure so the customer can ultimately be made to pay separately for the bug fix. Nevermind the fact that my time was already charged anyway (but they can get more money if there’s a bigger paper trail involving more staff). This contrasts with the “you get what you pay for” narrative since money is diverted to busy work (IOW: working hard, not smart). ::: ::: spoiler Bugs added for “consistent quality”: One employer was so insistent on “consistent quality” that when one module was higher quality than another, they insisted on lowering the quality of the better module because improving the style or design pattern of the lower quality piece would be “gold plating”. This meant injecting bugs to achieve consistency. The bugs were non-serious varieties; more along the lines of needless complexity, reduced performance, coding standard non-compliances, etc, but nonetheless something that could potentially be charged to the customer to fix. ::: ::: spoiler Syntactic dumbing-down: When making full use of the language constructs (as intended by the language designers), I am often forced by an employer to use a more basic subset of constructs. Employers are concerned that junior engineers or early senior engineers who might have to maintain my code will encounter language constructs that are less common and it will slow them down to have to look up the syntax they encounter. Managers assume that future devs will not fully know the language they are working in. IMO employers under-estimate the value of developers learning on the job. So I am often forced avoid using the more advanced constructs to accommodate some subset of perceived lowest common denominator. E.g. if I were to use an array in bash, an employer might object because some bash maintainers may not be familiar with an array. ::: ***Non-commercial software development*** Free software developers have zero schedule pressure. They are not forced to haphazardly rush some sloppy work into an integration in order to meet a deadline that was promised to a customer by a manager who was pressured to give an overly optimistic timeline due to a competitive bidding process. #FOSS devs are free to gold-plate all they want. And because it’s a labor of love and not labor for a paycheck, FOSS devs naturally take more pride in their work. I’m often not proud of the commercial software I was forced to write by a corporation fixated on the bottom line. When I’m consistently pressured to write poor quality code for a profit-driven project, I hit a breaking point and leave the company. I’ve left 3 employers for this reason. ***Commercial software from a user PoV*** Whenever I encounter a bug in commercial software there is almost never a publicly accessible bug tracker and it’s rare that the vendor has the slightest interest in passing along my bug report to the devs. The devs are unreachable by design (cost!). I’m just one user so my UX is unimportant. Obviously when I cannot even communicate a bug to a commercial vendor, I am wholly at the mercy of their testers eventually rediscovering the same bug I found, which is unlikely in complex circumstances. ***Non-commercial software from a user PoV*** Almost every FOSS app has a bug tracker, forum, or IRC channel where bugs can be reported and treated. I once wrote a feature request whereby the unpaid FOSS developer implemented my feature request and sent me a patch the same day I reported it. It was the best service I ever encountered and certainly impossible in the COTS software world for anyone who is not a multi-millionaire.

    86
    22
    main Blind Main How to make a PDF accessible -- or what to use instead of PDF (msWord? Nooooo!)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    Linux won’t be viable for blind people unless major distros have full time accessibility folks, and refuse to accept inaccessible packages and patches.

    Sure, but you need to read what I quoted. I purely addressed the flawed claim that better code comes from those paid to write it. The opposite is true. It’s unclear to what extent that bias has influenced @noahcarver@rblind.com’s thesis. Though I have no notable issues with anything else @noahcarver@rblind.com wrote (much of which is beyond my expertise w.r.t accessibility).

    And to be clear, “better code” strictly refers to quality, not accessibility. Accessibility is a design factor.

    But that code you write at home is probably not accessible.

    That’s right. But then neither is the commercial code I worked on. That would be outside of my domain. I do backends for the most part. The rare UI work I did was for a tiny user base of internal developers within the org and accessibility was not part of the requirements. I worked on a UI for external users briefly but again no requirements for accessibility (which would be very unlikely for that particular product).

    In any case, this sidetrack is irrelevant to what you replied to. It’s important to correct bogus claims that being paid to write code is conducive to quality. Some right-wingers I know never miss the opportunity to use the phrase “good enough for government work” because they want to push the mentality that capitalism promotes superior quality. It’s a widespread misconception that needs correction whenever it manifests.

    Paying someone to write accessible code should theoretically work on both free software and non-free software. AFAICT the reason non-free software would accommodate blind users is that the market share is large enough to justify the profit-driven bottom line and those users are forced to pay for it (as all users are). In the FOSS domain, payments (“bounties”) are optional. Has this been tried? If not, then you’re relying on blind FOSS developers to suit their own needs in a way that benefits all blind users.

    1
  • main Blind Main How to make a PDF accessible -- or what to use instead of PDF (msWord? Nooooo!)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 66%

    and that someone who is paid to write accessible software is generally going to produce and maintain better code.

    In my day job I’m paid to write code. Then I go home write code I was not paid for. My best work is done without pay.

    Commercial software development

    When I have to satisfy an employer, they don’t want quality code. They want fast code. They want band-aid fixes. The corporate structure is very short-sighted. I was once back-roomed by a manager and lectured for “gold plating”. That means I was producing code that was higher quality than what management perceives as the economic sweet spot. I was also caught once fixing bugs as I spotted them when I happened to have a piece of code checked out in Clearcase. I was told I was “cheating the company out of profits” because they prefer if the bug goes through a documentation procedure so the customer can ultimately be made to pay separately for the bug fix. Nevermind the fact that my time was already compensated by the customer anyway - but they can get more money if there’s a bigger paper trail involving more staff. So when you say you get what you pay for, that’s what you pay for -- busy work (aka working hard not smart). They also want “consistent quality”. So if one module is higher quality than another, there is pressure to lower the quality of the better module because improving the style or design pattern of the lower quality piece is “gold plating”. When I make full use of the language constructs (as intended by the language designers), I am often forced by an employer to use more basic constructs. Employers are worried that junior engineers or early senior engineers who might have to maintain my code will encounter language constructs that are less common and it will slow them down to have to look up the syntax they encounter. Employers under-estimate the value of developers learning on the job. So I am often forced avoid using the more advanced constructs to accommodate some subset of perceived lowest common denominator. E.g. if I were to use an array in bash, an employer might object because some bash maintainers may not be familiar with an array.

    Non-commercial software development

    Free software developers have zero schedule pressure. They are not forced to haphazardly rush some sloppy work into an integration in order to meet some deadline that was promised to a customer by a manager who was pressured to give an overly optimistic timeline. #FOSS devs are free to gold plate all they want. And because it’s a labor of love and not labor for a paycheck, FOSS devs naturally take more pride in their work. I’m often not proud of the commercial software I was forced to write by a corporation fixated on the bottom line. When I’m consistently pressured to write poor quality code for a profit-driven project, I hit a breaking point and leave the company. I’ve left 3 employers for this reason.

    Commercial software from a user PoV

    Whenever I encounter a bug in commercial software, there is almost never a publicly accessible bug tracker and it’s rare that the vendor has the slightest interest in passing along my bug report to the devs. The devs are unreachable by design (cost). I’m just one user so my UX is unimportant. Obviously when I cannot even communicate a bug to a commercial vendor, I am wholly at the mercy of their testers eventually rediscovering the bug I found, which is unlikely when there are complex circumstances.

    Non-commercial software from a user PoV

    Almost every FOSS app has a bug tracker, forum, or IRC channel where bugs can be reported and treated. I once wrote a feature request whereby the unpaid FOSS developer implemented my feature request and sent me a patch the same day I reported it. It was the best service I ever encountered and certainly impossible in the COTS software world for anyone who is not a multi-millionaire.

    1
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearBU
    [enhancement] add down-vote justification to Lemmy/Kbin

    Some Lemmy instances (e.g. Beehaw) do not support down votes. When an instance does support down-votes, authors often get zero feedback with the down votes which ultimately supports obtuse expression, shenanigans and haters. The status quo suffers from these problems: * down voters do not need to read the comment they are down voting * down votes empower non-moderators to suppress comments and posts * some communities struggle to get content because of some malicious down voters who down vote every post to discourage activity and effectively sabotage the community; voting privacy shields malicious down-voters from discovery and supports their attack * silent down votes are non-constructive * some people make heavy use of down votes to suppress civil comments purely because of disagreement; other (more civil) users only use down votes to suppress uncivil dialog. This inequality ultimately manifests to reduce civility. * transparency: kids and adults are accessing the same forums and adults are blind as to whether down votes are coming from kids (the rationale can reveal this) The fix: An instance admin should be able to flip a switch that requires every down vote to collect a 1-line rationale from the voter. These one-liners should be visible to everyone on a separate page. Upvotes do not need rationale. So instance owners should have 3 configuration options: * down votes disabled (beehaw) * down votes require rationale (proposed) * down votes out of control (the most common status quo) Perhaps overkill, but it might be useful if a moderator can cancel or suppress uncivil down votes. --- BTW, the reason this enhancement request is not in the official bug trackers: * Lemmy’s bug tracker is in MS Github (#deleteGithub) * Kbin’s bug tracker is on codeberg, who silently deleted my account without warning or reason, and #Codeberg reg forces a graphical CAPTCHA (which fails on my non-graphical browser). #lemmyBug #KbinBug /cc [@nutomic@lemmy.ml](https://lemmy.ml/u/nutomic) [@ernest@kbin.social](https://kbin.social/u/ernest)

    0
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearBU
    [enhancement] private (invite only) communities/magazines in Lemmy/Kbin

    It would be useful to have more refined control over participation in a group. Someone should be able to create a group that gives permissions to specific individuals. A variety of permissions would be useful: * permission to see that a community/mag ***exists*** (some groups may or may not want to be listed in searchable a public directory) * permission to ***read*** the posts in a community/mag * permission to ***vote*** in the community/mag * permission to ***start a new thread*** in the community/mag * permission to ***comment*** on an existing thread in the community/mag A forum creator should be able to set the above perms on: * individual accounts * all users on an instance (e.g. users on an instance `@weH8privacy.com` might be unfit for voting and writing comments in the community “fightForPrivacy”) * all users not on an instance (e.g. local users only [for example](https://github.com/LemmyNet/lemmy/issues/1576#issuecomment-1611105437)) * instance IP-based (e.g. users from Cloudflared instances might be unfit to participate in a group called “decentralizationAdvocacy”) Settings for individuals should override instance-specific settings. So e.g. a “fightForPrivacy” forum might allow all forms of participation from an instance `stop1984.org`, but if `antiprivacyMallory@stop1984.org` is uncivil, a mod should be able to block all inputs from that user yet perhaps still allow `antiprivacyMallory` to just ***read*** the posts on the off chance of influencing the user to be more civil through exposure to civil chatter. ::: spoiler More background on the rationale - why the fedi needs this (click to expand) The fedi has undergone a huge flood of new users, largely moderates from Twitter. The moderates dilute movements. Consider the evolution of raves and Burning Man. The beginning was a rich subculture that briefly evolved in isolation apart from the ordinary world. These subcultures became more enriched within their own world whereby the core ideas spawned more culture. Then word got out and spread like brush fire. Masses of uninitiated crowds flooded into raves and Burning Man faster than they could be integrated. Commercialization took hold faster than people could be integrated. The scene became diluted with clubbers and conservatives who essentially turned raves into clubs. The way to promote raves that resembled the original experience was to selectively flyer party goers who overtly embraced the experience, who were not merely there to *be seen*. IOW, the fix was invite-only events. The flood of moderates into the fedi has crippled the decentralization movement and corrupted the vision. The fedi is now swamped with people from huge instances that are centralized on Cloudflare (lemmy.world, sh.itjust.works, lemmy.ca, lemm.ee, programming.dev, zerobytes.monster) and lemmy.ml. People without a firm grasp on the meaning, purpose, and benefits of decentralization and privacy still find their way into “privacy” communities and make foolish remarks (e.g. not sharing personal correspondence with Google and Microsoft “[is tinfoil-hattery](https://links.hackliberty.org/comment/1297282)”). Sure, it’s favorable that the “I have nothing to hide” crowd intermingle with more sophisticated privacy-aware folks. It’s important that there be a venue where ignorance can be reversed. But-- **Moderates are a drag on activism.** A “PrivacyAction” forum does not benefit from a mob of idiots who see those practicing established infosec principles as “tinfoil hat” nutters to heckle. Security-wise people with infosec degrees naturally and unavoidably appear “paranoid” to normies. These normies and hecklers can only get in the way in a workshop-centric forum with the mission of strategizing activist movements and protests. Fair enough if a “climate” forum has climate deniers butting heads with those who accept the climate-relevant science. That dialog is needed. But we don’t want climate deniers in a “climate *ACTION*” forum. They are only there to dilute and sabotage.. to side-track the discussion. A workshop is not interested in rhetoric from those who oppose their mission. So the status quo of #Lemmy and #Kbin disservices activism. ::: --- **Workaround 1 (Lemmy only):** Make an announcement community and make all participants a moderator. Bit crazy unless you really trust everyone involved. **Workaround 2 (Lemmy):** One community per instance using [instance-specific registration control](https://github.com/LemmyNet/lemmy/issues/209). Still too blunt, cumbersome, excludes mods who don’t have their own instance. **Question** Sometimes I click to subscribe to a community which then goes into a “subscription pending” state. What does that mean? As a moderator of some groups I never receive a signal that someone is requesting to subscribe. --- BTW, the reason this enhancement request is not in the official bug trackers: * Lemmy’s bug tracker is in MS Github (#deleteGithub) * Kbin’s bug tracker is on codeberg, who silently deleted my account without warning or reason, and #Codeberg reg forces a graphical CAPTCHA (which fails on my non-graphical browser). #lemmyBug #KbinBug /cc [@nutomic@lemmy.ml](https://lemmy.ml/u/nutomic) [@ernest@kbin.social](https://kbin.social/u/ernest)

    2
    0
    main
    Blind Main soloActivist 9 months ago 92%
    How to make a PDF accessible -- or what to use instead of PDF (msWord? Nooooo!) https://www.w3.org/WAI/WCAG22/Techniques/#pdf

    Some of you might be interested in [this Mastodon thread](https://mastodon.social/@pkiff/111307458285193467). It’s a bit of bashing PDFs for having poor accessibility, and some [guidance](https://www.w3.org/WAI/WCAG22/Techniques/#pdf) on improving PDFs for accessibility. Some people are saying they prefer MS Word over PDF for accessibility reasons. Of course the elephant in the room is that “accessibility” is an over-loaded word. It usually refers to usability by impaired people, but in the case of being generally usable to all people on a broad range of platforms, MS Word is obviously inaccessible due to being encumbered by proprietary tech by a protectionist corporation.

    12
    15
    privacy Privacy Is Cloudflare snooping?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    I agree.

    One of the reasons no one gives a shit is there is never news about CF making use of that MitM position. But I know they hire data scientists and what corp can resist the urge to monetize data they have access to? So I think it’s just a matter of time before they get caught abusing the vast amount of valuable data they have visibility on.

    2
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearES
    Escape Big Tech soloActivist 9 months ago 100%
    Cutting off friends under surveillance capitalism (Google, MS)

    cross-posted from: https://links.hackliberty.org/post/582272 > I have lots of old friends who I only maintained sparse contact with. When I let my personal email address die (the address they would all have records of), I did not bother to update them with a new address. > > They are all on the platform of some surveillance capitalist (e.g. Google or Microsoft). Google & Microsoft both refuse connections from self-hosted residential servers. And even if they didn’t, I am not willing to feed those surveillance advertisers who obviously don’t limit their surveillance to their users but also inherently everyone who makes contract with their users. I cannot support that or partake in pawning myself to subsidize someone else’s service. > > I just wonder if anyone else has taken this step.

    1
    0
    privacy Privacy Is Cloudflare snooping?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    Sorry I do not know if BBC interviews are transcribed.

    But FWIW it will air again on BBC World Service at 02:32 GMT tomorrow and the next day (which could be useful for those on limited internet connections)

    4
  • privacy
    Privacy soloActivist 9 months ago 81%
    Is Cloudflare snooping? www.bbc.co.uk

    cross-posted from: https://links.hackliberty.org/post/609883 > This BBC interview has a #Cloudflare rep David Bellson who describes CF’s observations on internet traffic. CF tracks for example the popularity of Facebook vs. Tiktok. Neither of those services are Cloudflared, so how is CF tracking this? Apparently they are snooping on traffic that traverses their servers to record what people are talking about. Or is there a more legit way Cloudflare could be monitoring this activity?

    10
    6
    privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    Nobody is disagreeing with you or saying your wrong

    At least 10 people here believe Google/MS avoidance is “tinfoil hat” paranoia. It’s a stark disagreement on infosec principles. All responders in this thread (apart from 3 exceptions) come from privacy-hostile #Cloudflare instances including yourself. This crowd has little hope of taking privacy seriously.

    However, it’s not really realistic to expect everyone to abandon the easy and useful tools that they’re comfortable with just to match your views, regardless of the ethics or logic involved.

    You’re probably not going to sell anyone on an idea that requires discarding ethics and logic. That’s actually the crux of the problem. The problem exists because people disregard ethics and logic in pursuit of pragmatism.

    You seem to be overlooking the fact that Google and MS are inherently exclusive choices. That is, if I try to connect to gmail-smtp-in.l.google.com, the connection is refused, full stop. Google is blocking me before I send the first packet. So you’re implying that I must go through Google’s hoops in order to not be “extreme”. IMO, that’s an extreme position to take. To expect people to go beyond the norms of established open standards to cater for the extra requirements and special needs of a monopolistic corporation. I must either rent an IP address that’s to Google’s liking at my own expense, or I must establish a contract with another third-party who I must then trust with a centralized view on all my outbound traffic. I’m not supporting that abuse and loss of freedom.

    1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    Ways that are beyond either the capabilities or desires of the average user.

    You vastly underestimate the average user w.r.t to “capabilities”. You can scrap capability from your statement because the avg user can just as well use protonmail/tuta, or disroot.org, for example.

    That leaves “desires”. Two people agree on how to correspond. The desire of someone to use one of the most unethical controversial corporations possible and in an insecure manner that exposes the data to a profitable extent in a privacy-lacking part of the world, and the other party has a higher privacy bar (and/or high moral bar), the party who must adapt is the one with the lower standards. It’s unreasonable to expect someone to lower their privacy standards or to lower their moral standards. If someone’s desire to support Google or MS trumps their desire to stay in touch, then the conversation isn’t worth it to them.

    There is a rule of least privilege principle that seems to have escaped you. In the information security discipline, we do not need to justify security measures by default. It’s lack of security that calls for justification. If there were truly a capability problem, that would be reasonable rationale for reduced security. But it’s a phantom excuse. And “desire” is not an acceptable rationale for reduced security.

    Your doubling down on the tinfoil claim was a failure simply because the security matter is least important of everything I’ve already said on this. But even if security were purely my sole rationale (as it is for some people), you are still calling the practice of basic well-established infosec principles tinfoil hattery. Pushing this culture of branding sound security practices as paranoia is a socially harmful move that you are partaking in.

    1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    That’s not the trade-off. Google has no opportunity to show me ads anyway. If alice@privacyrequired.com emails bob@gmail.com about a Taylor Swift concert, Google profits from information about both people. Even if Alice does not use Google services, Google’s file on bob shows he knows Alice and Alice is a TS fan. Then when bob searches for gifts, Google shows him TS t-shirts and profits from that. Conversations are two-ways, so when Bob responds to Alice Google learns directly about Bob, such as whether he’s a Swift fan. Alice’s msg therefore generated profitable data about Bob for Google, which potentially works against Alice’s boycott against Google.

    That’s just the tip of the iceberg—

    ::: spoiler human rights

    Human rights are important. Embodied therein (among other principles) the Charter of Fundamental Rights of the EU, Article 8 states:

    1. Everyone has the right to the protection of personal data concerning him or her.
    2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.
    3. Compliance with these rules shall be subject to control by an independent authority.

    As you can see from reading this thread, most people irrationally believe these human rights constitute paranoia and tinfoil hattery. My opposition to mass surveillance is not borne out of fear that my data will be used against me personally, but rather an objection to arbitrary systemic collection that comes at the detriment of some people (e.g. abortion seekers) and ultimately disempowers people. :::

    ::: spoiler privacy is about control

    To have privacy is to have control over information about you. Security from harmful disclosure is only a small component of the utility of privacy. There is a tendency for normies to fixate on that and think that is the sum total purpose of privacy. Having control is also about choosing who gets to profit from your data. It’s about having a right to boycott harmful entities. :::

    ::: spoiler digital exclusion and diminished open standards

    Google and Microsoft sabotaged the email infrastructure by imposing rules outside of RFC 5321. Up until the 2000s you could send an email to anyone so long as you comply with the open standards expressed in RFCs. The monopolistic tech giants saw an opportunity to take more market share and reduce their costs by introducing restrictions on email that exclude people who are self-serving. They leveraged spam fatigue to coerce people to conform to non-RFC proprietary reqs in addition to already already having a dominant market share (corp greed has no limits).

    I reject Google and Microsoft dictating terms that breaks the purpose of open standards (interoperability). Every time you send an email to or from Google or MS servers, you give your support for corporate dictatorship. :::

    So when you say this is about “the ability to show you ads that are more relevant to your interests”, you and at least 5 others have wholly misunderstood the problem.

    1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 33%

    You don’t get how boycotts work. Using their products without compensating them doesn’t contradict opposition to feeding them. You don’t know what hypocrisy means. You could more easily argue that it’d be a hypocrisy to leave the PCs in a dumpster and allow e-waste to go to a landfill and pollute ground water against my beliefs. Even in regions where they dispose of PCs properly, I oppose destruction and recycling whenever reuse is an option.

    -1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 50%

    This. Life is too short to deny myself human contact.

    This is scrapping a long list of old contacts who might at most every 5—20 years briefly exchange life updates from another part of the world. It’s not denying human contact. When I meet someone new, they either need to reach me a way that’s agreeable to both of us or they need to proxy msgs through a mutual friend.

    You’ve both demonstrated to easily back the gatekeepers as you’ve both needlessly chosen to create fedi accounts that are centralized on Cloudflare (lemmy world and shit just works both). You can’t speak with any credibility on the privacy front under those circumstances because you compromise digital freedom even when it yields no meaningful gain.

    0
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    Sometimes you have to stay connected to have any chance of saving the others.

    This is not that. In this particular situation remaining connected to the surveillance advertisers only reinforces through codependency the idea that people can centralize themselves on those platforms to count on being reachable by everyone. That’s not the right msg.

    Being the one hold out is a strong position. There was an academic group of people on FB that I had to corresponded with. When I refused to appear on that platform, everyone was forced to step outside of FB to reach me thus making them consciously aware of the problem. I wouldn’t have it any other way. Taking the pushover stance only proves to them that it works to choose the side of the monopolistic oppressor.

    Indeed it makes sense for a privacy advocacy org to have a Facebook acct to reach those people. But most of them get it wrong and needlessly advertise FB on their public website. Which means they’re not just using it for outreach.

    1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 50%

    I’m merely trying to point out that there is a healthy middle ground between the extremes of internet usage where people can interact with each other in a meaningful way while also being aware of the inherent risks and realities of using the internet today.

    You’re mistaken where compromise is needed and where it is not. There are ways to communicate without putting Google or MS in the loop and you’re at the unethical extreme if you have opted to support GAFAM by feeding those platforms.

    0
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 33%

    Doesn’t matter how you got them.

    No, it matters absolutely. You can get the goods by financially contributing to their bottom line, or you can get them without contributing financially. Surely you must understand that companies exist to profit.

    -1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 50%

    How do you think your device was made?

    I have not bought a PC for the past 15 years. Every upgrade has been from pulling fully functional PCs out of dumpsters, LCDs included. Permacomputing is a good movement to follow.

    0
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 33%

    You are definitely wearing some tin foil, OP.

    You have definitely failed to understand how capitalism works and how money flows in relation to data, and the ethical history of corporations involved.

    -1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 50%

    Or you could say that by neglecting to boycott and participate in activism you are neglecting to participate in society.

    “Activism is my rent for living on this planet” --Alice Walker

    Activism is our duty.

    0
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 66%

    It’s not enough. You have to follow the money (if you are an ethical consumer).

    A boycott no longer simply means to not buy products or service from. When you supply profitable data to a harmful entity, it’s as good as giving them cash.

    1
  • privacy Privacy Cutting off friends under surveillance capitalism (Google, MS)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 40%

    Then you’ve misunderstood. It’s not a security move. It’s a boycott. I will not financially support fossil fuel partners with profitable data.

    Google is partnered with Total Energy and uses AI to help them find where to drill. Likewise, Microsoft is partnered with Chevron and Exxon, again using AI to help them drill for oil. Microsoft also has many other matters of ethical wrongdoing. Not a good company to support. Not to mention the lack of ethics of targeted advertising in general.

    So it’s privacy for the sake of ethics, not privacy for the sake of security. These are the top reasons not to feed Google or MS, though it’d be poor judgement to also suggest there is no security problem with personal disclosure to such a centralized corporate PRISM venues outside of a GDPR region in a country with no notable privacy safeguards.

    It’s also notable that Chevron is an #ALEC member, thus supports US republicans. #ExxonMobil is also an abhorrent company to support (#ExxonKnew).

    -1
  • privacy
    Privacy soloActivist 9 months ago 27%
    Cutting off friends under surveillance capitalism (Google, MS)

    I have lots of old friends who I only maintained sparse contact with. When I let my personal email address die (the address they would all have records of), I did not bother to update them with a new address. They are all on the platform of some surveillance capitalist (e.g. Google or Microsoft). Google & Microsoft both refuse connections from self-hosted residential servers. And even if they didn’t, I am not willing to feed those surveillance advertisers who obviously don’t limit their surveillance to their users but also inherently everyone who makes contract with their users. I cannot support that or partake in pawning myself to subsidize someone else’s service. I just wonder if anyone else has taken this step.

    -8
    26
    netsec Netsec FCC reminds mobile phone carriers they must do more to prevent SIM swaps
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    The new advisory, issued Monday by the FCC’s Privacy and Data Protection Task Force, says SIM swap fraud is increasing.

    As a Tor user I’m increasingly more excluded. that “new advisory” link blocks Tor users and the IA Wayback Machine has stopped allowing Tor users to request saves. The FCC should be embarrassed that they are a comms authority and yet they have not figured out how to serve content to Tor users.

    On the topic-- I was wondering if the SIM swap increase they are talking about is specifically in the US or worldwide. In countries that mandate SIM registration, criminals are stealing people’s phones simply to get a functional phone to use for crime, not to do any cyber attack on the theft victim. I could see SIM swapping being equally attractive.

    And yes, the irony is that SIM registration is claimed to fight crime but in fact in creates more victims and crimes.

    1
  • nostupidquestions No Stupid Questions Why do users of shared e-scooters park in bicycle racks?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    9 months ago 100%

    I live in a city that bans parking them in the middle of sidewalks and close to doors. I’ve not heard of any local law against blocking bicycle racks.

    So are you saying these platforms are just mirroring into their terms the laws of each city they operate in on a per-city basis? That’s a bit more sophisticated than I envisioned. I would have thought each rental company would be simply creating a single set of rules for users that would comply with all cities they operate in.

    Just had an idea for an action: we could make stickers with a scooter with a line through it and stick those on the racks. Obviously they wouldn’t carry any weight but might deter the nuisance to some extent nonetheless. Though there’s nothing wrong with personally owned scooters being locked so tricky to express that on the sticker.

    1
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearNO
    No Stupid Questions soloActivist 9 months ago 100%
    Why do users of shared e-scooters park in bicycle racks?

    There’s a widespread nuisance of shared e-scooters (which do not need to be locked) taking up bicycle stalls that cyclists need to lock their bikes. Are e-scooter platforms instructing users to use bicycle racks? Or are people doing that against policy?

    6
    3
    privacy
    Privacy soloActivist 9 months ago 76%
    crude tracking technique - mailing letters just to see what bounces

    Some banks will annually mail a paper “welcome” letter to all customers purely for the purpose of collecting bounced mail ultimately to verify if anyone has moved without telling them. The letters never state that’s the purpose.. they take that opportunity to talk about their service in arbitrary ways. Some banks even charge customers a fee for their cost in doing that. If you ask the banker about it they readily admit that it’s an address verification technique. That’s it.. just a PSA so folks are aware, as it is a bit sneaky. Some national postal services (e.g. USPS) sell your mail forwarding information which is how you get tracked to your new location by various entities even when you did not inform them of your new address. So obviously a good defensive measure is to never use the mail forwarding service. Select the entities you want to know your new address and inform them directly. But then to get some immunity to the sneaky trick in the 1st paragraph, perhaps give the next resident a stack of addressed envelopes and stamps and ask the next resident to ~~forward~~ (remail) for you.. or just ask them to trash your mail instead of returning it.

    9
    0
    fightforprivacy
    Fight For Privacy soloActivist 9 months ago 94%
    the gov started blocking Tor on some of their public-facing web servers -- how to fight this

    A public service started blocking access from Tor users. Blocks like this almost never have the courtesy to acknowledge ***why*** you are blocked (Tor) much less why they decided to exclude Tor users from public access. The blockades seem to always be implemented by an asshole. So I play dumb: “your site is no longer working… here is my screenshot…('Unable to connect')”. I submit that as a complaint. The response I would hope for: “Oh, we are sorry sir, we will send you a link to our bulletin page that publishes a chronology of all changes we make to the site and have a technician call you to troubleshoot the problem.” My goal is to burden those behind unjustified/undocumented anti-Tor configs so they spend some time investigating as a consequence of their unannounced change and their useless error messages. What really happens: They reply saying: “the server works. No problems were reported. The problem is with your browser. Try another computer/browser”. So indeed, they double-down on being assholes. They give this snap response having no idea what could have gone wrong. There is no escalation procedure in government when you reach an incompetent person. So what’s the counter-move? Proposal: network with other Tor users in the region. When one user reports a tor-hostile, everyone else in the group should verify the block and complain at the same time; everyone taking care not to mention Tor. It should remove the the knee-jerk “there have been no complaints” response. Has anyone tried this?

    17
    1
    privacy Privacy Privacy or sensitive data… a list of tools to protect your дѕѕ
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Regarding the two suggested search services which are both Microsoft syndicates:

    • #DuckDuckGo: hosted by Microsoft and searches are outsourced to Microsoft, so MS gets to see your queries and your IP, among other DDG problems

    • #Qwant: tor-hostile (CAPTCHAs), MS profits from your searches.

    2
  • main Blind Main Do any blind people use Protonmail despite the CAPTCHAs?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Yes, but to be clear my test may or may not be valid in terms of what a blind person would experience. Unlike a blind person I do not use a screen reader. I merely disabled images and saw no visual indicator of an audio option. I would expect blind people to disable images as well because they would only slow them down for no benefit. But someone else said that they bypassed the CAPTCHA completely due to having a screen reader.

    2
  • main Blind Main Do any blind people use Protonmail despite the CAPTCHAs?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Specifically in the case of Protonmail? That was part of my question. I saw no audio CAPTCHA option.

    2
  • main Blind Main Do any blind people use Protonmail despite the CAPTCHAs?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Thanks for the tip!

    Although it’s a tricky decision because if the server can detect that you use a screen reader, then your browser fingerprint uniqueness would increase quite a bit.

    1
  • main Blind Main Do any blind people use Protonmail despite the CAPTCHAs?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Indeed it saves bandwidth -- which is particularly important for those with a limited connection. I like it as well because so many images actually downgrade the UX anyway.

    It’s a better carbon footprint to nix images but then we get punished for it by anti-bot websites. Bots also neglect to fetch images so I get hit with false positives for robots more frequently.

    (Not sure if mentions work on Lemmy.. mentioning @aibler@lemmy.world for good measure)

    6
  • main
    Blind Main soloActivist 10 months ago 100%
    Do any blind people use Protonmail despite the CAPTCHAs?

    I’m not blind but I browse with images disabled. This means I can no longer login to Protonmail because they push CAPTCHAs. I know some CAPTCHAs have an audio option but I just get a blank box from Protonmail’s CAPTCHA. So I was wondering how blind people deal with that, or if they are simply excluded from using #Protonmail.

    25
    14
    privacy Privacy Apple Reveals Governments Use App Notifications to Surveil Users
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Or couldn’t the notifications for an app be made vague enough to have no surveillance value? E.g. “(wire) check for msgs”, as opposed to “(wire) Rufus: need an 8-ball…”

    1
  • privacy Privacy Apple Reveals Governments Use App Notifications to Surveil Users
    Jump
    privacy Privacy This is War: Microsoft’s Outlook Blocks All Email From Rival Tuta Domain
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    It’s a blessing in disguise.

    Yes we should blame Microsoft but pushing MS to surveil more of us in more situations is the wrong move. The right move is for senders to tell MS recipients to get an account that works if they want to receive messages from you, like Tutanota. If you need to reach an org or gov office, then snail mail is the right move. Why? Because even when your email makes it through to an MS recipient it’s subject to surveillance capitalism that you contribute to against your own interests. So fixing it is the wrong answer anyway. I would actually applaud #Tutanota if they would refuse to connect to MS servers. And they should, because ATM senders get no signal that their message did not get properly delivered.

    I quit emailing Microsoft and Google’s surveillance systems a decade ago. MS & Google broke email in the 2000s by obtusely refusing msgs from residential IPs, which bullies everyone into relaying their mail (read: subjecting themselves to extra surveillance). Snail mail is more reliable.

    The irony of a tor-hostile #reclaimthenet .org link also needs a spotlight. We certainly do not want a #Cloudflare site talking about “reclaiming” the net. WTF. It’s Cloudflare who we need to reclaim the net from. I would not have linked them at all. The mirrored text is good enough. Certainly if the link is needed it should be prefixed with web.archive.org/web/$URL

    update

    Microsoft has reversed their spam false positive on Tuta msgs logic, apparently only after public embarrassment manifested. So Tuta users can go back to being part of Microsoft’s surveillance systems. Tuta should really warn users about that when they are about to email an MS recipient.

    2
  • fightforprivacy
    Fight For Privacy soloActivist 10 months ago 86%
    Privacy seekers are hit the hardest by the enshitification of the web -- what to do about it (smarter browsers)

    If you have a defensive browser that runs over Tor and blocks popups, CAPTCHAs, dark-pattern-loaded cookie walls, and various garbage, we still end up at the losing end of the arms race. The heart of the problem is that privacy enthusiasts are exposed to the same search engine rankings that serve the privacy-naïve/unconcerned masses. Would it make sense for the browser to autodetect various kinds of enshitification, add the hostname to a local db for future use, then report the hostname anonymously over Tor to central db that serves as an enshitification tracker? The local and centralized DBs could be used to down-rank those sites in future results. And if a link to enshitified sites appears on a page unrelated to searches it could be cautioned with a “⚠”. Some forms of enshitification would probably need manual detection but I could see people being motivated to contribute. The security and integrity of a centralized db would perhaps be the hardest part of the effort. But if that could be sorted out, we could get search results to prioritize (pro-user) resources. In principle the DB could also track access methods by which a website is garbage-free (e.g. if the garbage does not manifest when viewed in Lynx, then that should be captured in the DB as well).

    11
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearBU
    Bug reports on any software soloActivist 10 months ago 100%
    Invidious bug breaks downloads on some instances for some particular videos

    If you try to download video `lU4vv7qCQvg` on a variety of #Invidious instances, some (most?) redirect you to a realtime player instead of serving up the file. Those instances that cause the wrong action work correctly for other videos. works → https://invidious.fdn.fr/watch?v=lU4vv7qCQvg broken → https://iv.ggtyler.dev/watch?v=lU4vv7qCQvg

    1
    0
    cybersecurity cybersecurity Lemmy security bug: data leak to ISPs when users view a thread (? unconfirmed)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Apparently I’m wrong about this.. the preview is said to be created by the server:

    https://links.hackliberty.org/comment/1068761

    EDIT: well, apparently it’s questionable. No one knows with confidence.

    1
  • lemmy_support Lemmy Support Security BUG: abstracts that summarize external articles are broken if the hosting site blocks the reader (? unconfirmed) -- should be server-side functionality
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    So does that mean jlai.lu is blocked by lecho.be? I figured it was more likely that lecho.be was blocking Tor, thus blocking my connection.

    1
  • cybersecurity
    cybersecurity soloActivist 10 months ago 85%
    Lemmy security bug: data leak to ISPs when users view a thread (? unconfirmed)

    cross-posted from: https://links.hackliberty.org/post/454425 > When I visit this post: > > https://jlai.lu/post/2250911 > > the embedded short abstract intro to the article is “403 Blocked www.lecho.be” When I try visiting the link directly I get “403 bot detection”. This suggests that everyone who opens that thread independently visits that webpage by way of some javascript that’s not under the user’s control. If 1000 people open that thread, then 1000 separate fetches are made. That’s a poor design. The server could do that job just once and the results would be more reliable. As opposed to everyone getting different results. > > This is also a #privacy #security bug. Someone who opens a thread does not necessarily intend to fetch the linked article. Non-tor users are under surveillance in some countries (e.g. the US, where Trump enacted law s.t. ISPs can collect data on users without consent). So they should have control over what sites they visit. Merely opening a thread is an abuse because it makes users actions instantly trackable. IOW, users share information with their ISP without their knowledge or control. > > Note that the example thread shows the full text of the article because the author was diligent about copying it. But that’s not the general case. > > #bug #lemmyBug

    14
    1
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearLE
    Lemmy Support soloActivist 10 months ago 83%
    Security BUG: abstracts that summarize external articles are broken if the hosting site blocks the reader (? unconfirmed) -- should be server-side functionality

    When I visit this post: https://jlai.lu/post/2250911 the embedded short abstract intro to the article is “403 Blocked www.lecho.be” When I try visiting the link directly I get “403 bot detection”. This suggests that everyone who opens that thread independently visits that webpage by way of some javascript that’s not under the user’s control. If 1000 people open that thread, then 1000 separate fetches are made. That’s a poor design. The server could do that job just once and the results would be more reliable. As opposed to everyone getting different results. This is also a #privacy #security bug. Someone who opens a thread does not necessarily intend to fetch the linked article. Non-tor users are under surveillance in some countries (e.g. the US, where Trump enacted law s.t. ISPs can collect data on users without consent). So they should have control over what sites they visit. Merely opening a thread is an abuse because it makes users actions instantly trackable. IOW, users share information with their ISP without their knowledge or control. Note that the example thread shows the full text of the article because the author was diligent about copying it. But that’s not the general case. #bug #lemmyBug

    8
    3
    privacy Privacy (GDPR) situations where a data controller is forced to send a USB stick to a data subject
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Nothing specifies that the controller must use a USB stick (the USB stick is just an example that the EDPB gives in their guidelines). So the media is the controller’s choice AFAIK, who is free to use whatever complies (which could be an SD card).

    Sounds fun but: who still uses USB Sticks?

    My local public libraries do. When I want to bring data to the library to insert directly into a printer, or into their PCs, the USB bus is the sole means (could be a drive of any physical size though).

    1
  • privacy
    Privacy soloActivist 10 months ago 100%
    (GDPR) situations where a data controller is forced to send a USB stick to a data subject

    The #GDPR states that if an access request is submitted electronically, the response must also be electronic. But then there is a separate rule that if the data is too sensitive for the means of transmission that have been established (e.g. unencrypted email), the data controller must still respect the security requirements in their response at the same time and maintain an appropriate security level for the data. Thus this could mean that they have to send a USB stick via postal service to the data subject. But then at the same time, there is another rule that an initial request must be completed free of charge. So taking all that together, there are situations where data subjects will end up with gratis USB sticks. This inspires the question: what kind of data is too sensitive for unencrypted transmission and what kind of data is not? EDIT: If I were a data controller and for whatever reason I could not establish an appropriately secure channel, I might be tempted to offer data subjects these choices: * provide it on optical media (it’s the subject’s problem if they no longer have a drive) * demand a *refundable* deposit for the media and provide a postage-paid return envelope * require the data subject to deliver their own media * offer the option for the data subject to appear on site in person and copy the data, and return the media * publicly post PDF docs that are AES-encrypted and snail-mail the password to them I have no idea if those would be compliant. Likely the 4th bullet is, because it’s expressly stated that data controllers can require data subjects to collect their data in person so the data controller can get a signature proving that the data made it into the correct hands.

    4
    2
    privacy Privacy (GDPR) Data controller refuses to honor requests unless an ID card is supplied - IN COLOR
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Thanks for the info! Paragraph 75 of that document is also quite interesting.. it confirms that data subjects can redact everything on their ID card apart from their name and the issuing date or expiry date.

    2
  • fightforprivacy
    Fight For Privacy soloActivist 10 months ago 80%
    [EU] (GDPR) Data controller refuses to honor requests unless an ID card is supplied - IN COLOR

    cross-posted from: https://links.hackliberty.org/post/435505 > A data controller responded to a #GDPR request under art.15 & 17 (thus, an access request coupled with erasure request). They responded with a refusal, demanding ID card. They probably demanded it be in color, but I responded with a black and white copy of my ID. They refused again, affirming that the ID card must be in color. So then I sent them a color copy, but I used black boxes to redact my facial image and all personal text except my name. They again refused to honor my request, saying “zonder vlekken en met een goede resolutie om te worden geaccepteerd”. That translates into “without spots or stains”, correct? I don’t think that means without redactions. > > Anyway, I would like a GDPR expert to confirm or deny whether the controller’s refusal and demands are lawful. > > The relevant GDPR text is: > > * https://gdpr-text.com/read/recital-64/ > * https://gdpr-text.com/read/article-12/#para_gdpr-a-12_6 > > My request (via post) included my residential address and also mentioned a unique email address that only that controller knows me by (though they would not necessarily know it’s unique). Shouldn’t that be sufficient? *UPDATE* [This abstract](https://legalitgroup.com/en/guidelines-01-2022-on-data-subject-rights-right-of-access/) covers some of my questions. Indeed redactions on the ID card are allowed when making requests.

    6
    1
    privacy
    Privacy soloActivist 10 months ago 90%
    (GDPR) Data controller refuses to honor requests unless an ID card is supplied - IN COLOR

    A data controller responded to a #GDPR request under art.15 & 17 (thus, an access request coupled with erasure request). They responded with a refusal, demanding ID card. They probably demanded it be in color, but I responded with a black and white copy of my ID. They refused again, affirming that the ID card must be in color. So then I sent them a color copy, but I used black boxes to redact my facial image and all personal text except my name. They again refused to honor my request, saying “zonder vlekken en met een goede resolutie om te worden geaccepteerd”. That translates into “without spots or stains”, correct? I don’t think that means without redactions. Anyway, I would like a GDPR expert to confirm or deny whether the controller’s refusal and demands are lawful. The relevant GDPR text is: * https://gdpr-text.com/read/recital-64/ * https://gdpr-text.com/read/article-12/#para_gdpr-a-12_6 My request (via post) included my residential address and also mentioned a unique email address that only that controller knows me by (though they would not necessarily know it’s unique). Shouldn’t that be sufficient? I ultimately need to know whether a DPA should get involved.

    9
    2
    privacy Privacy Privacy is Priceless, but Signal is Expensive
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    PGP email FTW! Costs nothing. Also does not demand a phone number or attempt to drive you into Google Playstore.

    1
  • privacy
    Privacy soloActivist 10 months ago 100%
    VOIP providers without TLS… WTF

    It seems rare that VOIP providers offer a secure tunnel using TLS. I have 2 providers and neither support TLS-- which is reckless because phone conversations are more sensitive than using the web. Conversations are not only quite personal but the realtime nature of a spoken conversation encourages people to divulge things faster than they can think about security. It’s a shitty trend particularly when unwarranted surveillance in the US has targeted VOIP specifically. And why not.. it’s in the clear. Sure, there is the problem that TLS can only secure one segment of the conversation. So if you call your doctor or lawyer using a rare TLS-capable VOIP provider, it’s only secure to the VOIP server and thereafter it’s in the clear. Is that the rationale for VOIP providers not bothering?

    2
    0
    privacy Privacy Secure Messenger Comparisons
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Matrix

    I have not bothered to study Matrix closely because the only times activists have invited me to a conversation it was on the #Cloudflare instance (matrix.org). That really drives up the investigative effort I have to do in order to trust it because Cloudflare Inc sees everything under that TLS layer. I assume payloads are e2ee but the payload isn’t everything. It’s also sketchy because if everything is e2ee then there’s nothing for CF to optimize by caching, so it seems like a senseless move. When Matrix first emerged I instantly lost respect for everyone working on that project because it sends a loud message that there’s a competency and awareness problem. They don’t know their audience. If they don’t understand the issues with Cloudflare then they are probably not well informed in other ways. It’s a serious optics problem to say the least.

    Matrix is UK based [14] and so does not need to follow GDPR and could be compelled under warrant to share metadata on users.

    The UK mirrored the GDPR with just a few minor changes.

    XMPP

    …modern features like VoIP and user avatars are only supported by one! client, Dino.

    #Snikket has those features.

    Missing platforms

    • Wire
    • Jami
    • Briar (it’s mentioned incidentally in a “hostile regimes” section but it’s an app and network of its own and should have a section)
    1
  • dark_web Dark Web Quiet marginalization of the Tor community never causes outrage. Why is the Tor community such an easy pushover?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    I wasn’t speaking about a single public service in particular, but generally. It’s a regular widespread problem.

    I do not believe this can be solved by an individual. It requires a collective action of many and it needs to be spearheaded by a recognized org like ACLU or EFF. The #EFF is quite close to the Tor Project and in principle this problem would be in the EFF’s scope. But the EFF is only goes as far as suggesting that people use Tor -- as they turn a blind eye to global DoS against Tor. I don’t see a single privacy advocacy/lobbyist org who is working this problem and worthy of donations.

    1
  • dark_web
    Dark Web soloActivist 10 months ago 83%
    Quiet marginalization of the Tor community never causes outrage. Why is the Tor community such an easy pushover?

    cross-posted from: https://links.hackliberty.org/post/285435 > When a private sector company blocks Tor, I simply boycott. No private entity is so important that I cannot live well enough without them. But when a *public* service blocks Tor, that’s a problem because we are increasingly forced to use the online services of the public sector who have gone down the path of assuming offline people do not exist. > > They simply block Tor without discussion. It’s not even clear who at what level makes these decisions.. could even be an IT admin at the bottom of the org chart. They don’t even say they’re blocking Tor. They don’t even give Tor users a block message that admits that they block Tor. They don’t disclose in their privacy policies that they exclude Tor. > > Just a 403 error. That’s all we get. As if it needs no justification. Why is the Tor community so readily willing to play the pushover? Even the Tor project itself will not stand up for their own supporters. > > The lack of justification is damaging because it essentially sends the message: “you Tor-using privacy seekers are such scum we don’t even have to explain why you are outcast. We don’t even have to ask permission to exclude you from participating in society” This reinforces the myth that Tor users are criminals and encourages non-criminal Tor users to abandon Tor, thus shrinking the Tor userbase. The civilized world has evolved to a point of realizing the injustice of #collectivePunishment. At best this is a case of punishing many because of a few. I say “at best” because I’m skeptical that a bad actor provokes the arbitrary denial of service. > > When the question is publicly asked “why did service X start blocking Tor” answers always come as speculation from people who don’t really know, who say they were probably attacked.

    4
    2
    dark_web
    Dark Web soloActivist 10 months ago 90%
    Strategy for action against tor-hostile corporations

    cross-posted from: https://links.hackliberty.org/post/303031 > These are the steps I take against companies who block Tor (e.g. a grocery store, bank, DNS provider.. whoever you do business with who have started using Cloudflare): > > 1. GDPR art.17 request to delete my email address & any other electronic means to reach me, but nothing else. > 2. Wait 30 days for them to comply. > 3. GDPR art.13 & 14 request to disclose all entities personal data was shared with + art.15 request for all my data (if I am interested) + art.17 request to erase all records. These requests are sent together along with criticisms for their lack of respect for privacy and human rights and shaming for treating humans like robots (if that’s the case). > > The reason for step 1 & 2 is to neuter the data controller’s option to respond electronically so they are forced to pay postage. It’s a good idea as well because they would otherwise likely use Microsoft for email and you obviously don’t want to feed MS. It may be feasible to skip steps 1 & 2 by withdrawing consent to use the email address (untested). > > A few people doing this won’t make a dent but there is a threshold by which a critical mass of requests would offset their (likely uncalculated) cost savings by arbitrarily marginalizing the Tor community. It’s a way to send a message that cannot be ignored.

    9
    0
    privacy Privacy Signal Privacy Concerns
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    Wire and Jami work as well w/out forcing a phone number disclosure. Also there’s an app¹ that does PGP over email under the hood so normies need not be PGP-aware which simply makes use of whatever email account you configure it to use.

    W.r.t. gplay: jami & the pgp app are on f-droid. Wire is not, but Wire had an APK download option on their website last time i checked. Signal also had a direct APK option last time I checked, but as the article states Singal conceals and discourages that option.

    1. I forgot what the app is called but Strypey would know.. I heard about it from him.
    1
  • philosophy Philosophy How I shook free from the addiction to cars — car drivers have *less* freedom; less intelligence
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSO
    soloActivist
    10 months ago 100%

    says someone who clearly has lived in a city their entire life.

    The opening phrase has escaped you: “After living in regions that were (foolishly¹) designed exclusively for cars”.

    1
  • privacy
    Privacy soloActivist 11 months ago 100%
    Dirt has been gathered on extremist Ohio school board candidates - would this be legal if it had been in the EU (under the GDPR)? https://web.archive.org/web/20231012145424/https://docs.google.com/spreadsheets/u/0/d/1bNftkYLPiW84VhBHqjkp32REyerA_xfn534zkbTKeSg/htmlview

    Some good samaritan has created a list of school board candidates and dug up dirt on them. They’re doing a good public service, but then I have to wonder: what if this happened in Europe? Wouldn’t those candidates have a #GDPR right to be removed from that list? I don’t think I’ve noticed anything in the GDPR that exceptionally withholds protections for public service people. (BTW, plz excuse the Google link. I hate to publicize a link to Google but there seems to be no free-world way to reach Google Docs.) EDIT: fixed. #askFedi #lawFedi

    4
    2
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearPH
    Philosophy soloActivist 11 months ago 60%
    Effective altruism by Sam Bankman-Fried w.r.t. his political donations (dems: transparently; republicans: secretly) https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion/2022/12/21/us/politics/sam-bankman-fried-ftx-political-donations.html

    cross-posted from: https://links.hackliberty.org/post/307315 > Considering Sam Bankman-Fried claimed to practice #effectiveAltruism, and the fact that he makes substantial political donations, I thought we can validate to some extent whether his effective altruism is bogus or genuine. I thought this would be easily settled. If he favors democrats, he’s putting humanity above wealth & tyranny. If republicans, the altruistic claim can be easily dismissed. > > It turns out #SamBankmanFried donated to democrats and republicans both. It’s unclear if the donations were equally effective for both parties, but interesting that he donated to dems in-the-clear while hiding donations to republicans. One of the notable donations went to a congressman who was most critical of cryptocurrency. So naturally he had to bribe that politician. > > Dems were surprised to find that he also donated to republicans (and by his own admission!). Had he donated to both parties in transparency, recipients could see their opponent is also being fed and disregard the donation (i.e. give no preferential treatment). Seeing all the recipients would reveal if there were at least a consistent ideology or philosophy in play. > > I have to conclude the political donations were likely all just to promote his own success. It does not completely nix the claim of effective altruism because he would argue it was purely a wealth accumulation endeavor as a precursor to effective altruism. But I have to say someone who is fully engaged in the idea of effective altruism would be irresistibly selective in who receives political contributions even at the cost of reduced wealth. A humanitarian would not be able to stomach the idea of financing a republican war chest. > > You also have to figure that since he chose to make dem financing transparent and repub financing in the dark, he inherently gave republican recipients full view of it. That’s only viable if he donates much more to republicans who would see that he donates mere peanuts to the opponent for optics.

    2
    6
    philosophy
    Philosophy soloActivist 11 months ago 57%
    Effective altruism by Sam Bankman-Fried w.r.t. his political donations (dems: transparently; republicans: secretly) https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion/2022/12/21/us/politics/sam-bankman-fried-ftx-political-donations.html

    Considering Sam Bankman-Fried claimed to practice #effectiveAltruism, and the fact that he makes substantial political donations, I thought we can validate to some extent whether his effective altruism is bogus or genuine. I thought this would be easily settled. If he favors democrats, he’s putting humanity above wealth & tyranny. If republicans, the altruistic claim can be easily dismissed. It turns out #SamBankmanFried donated to democrats and republicans both. It’s unclear if the donations were equally effective for both parties, but interesting that he donated to dems in-the-clear while hiding donations to republicans. One of the notable donations went to a congressman who was most critical of cryptocurrency. So naturally he had to bribe that politician. Dems were surprised to find that he also donated to republicans (and by his own admission!). Had he donated to both parties in transparency, recipients could see their opponent is also being fed and disregard the donation (i.e. give no preferential treatment). Seeing all the recipients would reveal if there were at least a consistent ideology or philosophy in play. I have to conclude the political donations were likely all just to promote his own success. It does not completely nix the claim of effective altruism because he would argue it was purely a wealth accumulation endeavor as a precursor to effective altruism. But I have to say someone who is fully engaged in the idea of effective altruism would be irresistibly selective in who receives political contributions even at the cost of reduced wealth. A humanitarian would not be able to stomach the idea of financing a republican war chest. You also have to figure that since he chose to make dem financing transparent and repub financing in the dark, he inherently gave republican recipients full view of it. That’s only viable if he donates much more to republicans who would see that he donates mere peanuts to the opponent for optics.

    1
    7
    fightforprivacy
    Fight For Privacy soloActivist 11 months ago 83%
    Strategy for action against tor-hostile corporations

    These are the steps I take against companies who block Tor (e.g. a grocery store, bank, DNS provider.. whoever you do business with who have started using Cloudflare): 1. GDPR art.17 request to delete my email address & any other electronic means to reach me, but nothing else. 2. Wait 30 days for them to comply. 3. GDPR art.13 & 14 request to disclose all entities personal data was shared with + art.15 request for all my data (if I am interested) + art.17 request to erase all records. These requests are sent together along with criticisms for their lack of respect for privacy and human rights and shaming for treating humans like robots (if that’s the case). The reason for step 1 & 2 is to neuter the data controller’s option to respond electronically so they are forced to pay postage. It’s a good idea as well because they would otherwise likely use Microsoft for email and you obviously don’t want to feed MS. It may be feasible to skip steps 1 & 2 by withdrawing consent to use the email address (untested). A few people doing this won’t make a dent but there is a threshold by which a critical mass of requests would offset their (likely uncalculated) cost savings by arbitrarily marginalizing the Tor community. It’s a way to send a message that cannot be ignored.

    8
    0
    fightforprivacy
    Fight For Privacy soloActivist 11 months ago 80%
    Quiet marginalization of the Tor community never causes outrage. Why is the Tor community such an easy pushover?

    cross-posted from: https://links.hackliberty.org/post/285435 > When a private sector company blocks Tor, I simply boycott. No private entity is so important that I cannot live well enough without them. But when a *public* service blocks Tor, that’s a problem because we are increasingly forced to use the online services of the public sector who have gone down the path of assuming offline people do not exist. > > They simply block Tor without discussion. It’s not even clear who at what level makes these decisions.. could even be an IT admin at the bottom of the org chart. They don’t even say they’re blocking Tor. They don’t even give Tor users a block message that admits that they block Tor. They don’t disclose in their privacy policies that they exclude Tor. > > Just a 403 error. That’s all we get. As if it needs no justification. Why is the Tor community so readily willing to play the pushover? Even the Tor project itself will not stand up for their own supporters. > > The lack of justification is damaging because it essentially sends the message: “you Tor-using privacy seekers are such scum we don’t even have to explain why you are outcast. We don’t even have to ask permission to exclude you from participating in society” This reinforces the myth that Tor users are criminals and encourages non-criminal Tor users to abandon Tor, thus shrinking the Tor userbase. The civilized world has evolved to a point of realizing the injustice of #collectivePunishment. At best this is a case of punishing many because of a few. I say “at best” because I’m skeptical that a bad actor provokes the arbitrary denial of service. > > When the question is publicly asked “why did service X start blocking Tor” answers always come as speculation from people who don’t really know, who say they were probably attacked.

    12
    11
    privacy
    Privacy soloActivist 11 months ago 81%
    Quiet marginalization of the Tor community never causes outrage. Why is the Tor community such an easy pushover?

    When a private sector company blocks Tor, I simply boycott. No private entity is so important that I cannot live well enough without them. But when a *public* service blocks Tor, that’s a problem because we are increasingly forced to use the online services of the public sector who have gone down the path of assuming offline people do not exist. They simply block Tor without discussion. It’s not even clear who at what level makes these decisions.. could even be an IT admin at the bottom of the org chart. They don’t even say they’re blocking Tor. They don’t even give Tor users a block message that admits that they block Tor. They don’t disclose in their privacy policies that they exclude Tor. Just a 403 error. That’s all we get. As if it needs no justification. Why is the Tor community so readily willing to play the pushover? Even the Tor project itself will not stand up for their own supporters. The lack of justification is damaging because it essentially sends the message: “you Tor-using privacy seekers are such scum we don’t even have to explain why you are outcast. We don’t even have to ask permission to exclude you from participating in society” This reinforces the myth that Tor users are criminals and encourages non-criminal Tor users to abandon Tor, thus shrinking the Tor userbase. The civilized world has evolved to a point of realizing the injustice of #collectivePunishment. At best this is a case of punishing many because of a few. I say “at best” because I’m skeptical that a bad actor provokes the arbitrary denial of service. When the question is publicly asked “why did service X start blocking Tor” answers always come as speculation from people who don’t really know, who say they were probably attacked.

    7
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearLE
    Lemmy Support soloActivist 11 months ago 85%
    [bug] Code blocks sabotaged when the code is HTML — data lost

    After submitting an HTML sample in [this post](https://links.hackliberty.org/post/264937), #Lemmy gutted the content ***silently*** and destructively without telling me. The original text is totally lost and not recoverable. I only noticed because more than half the code was discarded. This is terrible. It’s perhaps understandable that raw HTML might have security issues if it appears as-is, so of course the angle brackets should be automatically encoded as literals by the submission processing modules. The status quo is obviously a #LemmyBug because authors are not even warned about the destruction and given a chance to preserve their work. It just gets trashed.

    10
    4
    main
    Blind Main soloActivist 11 months ago 100%
    Do screen readers read mouseover text when the alt attribute is empty (alt="")?

    A public library’s website has iconified buttons instead of textual buttons; I assume to make it easy for those who don’t speak the local language. The code snip looks like this: ``` <div>Wifi</div> <div><p></p> </div> ``` Will that cause problems for blind people considering `alt=""`? I don’t have a screen reader or whatever tools blind people use, so I’m somewhat blind in being able to know if the website is reasonably accessible. Lynx shows the button descriptions just fine, so I think if a blind user ran #Lynx with a screen reader the UX would work. But what if a GUI browser is used in order to run JavaScript? I loaded the site in a GUI browser with image loading disabled and the text description (“WiFi” in this case) does not appear unless I hover the mouse over the substitute icon for the missing icon. So the question is: do a screen readers handle that okay? EDIT: Shit, my HTML code was gutted by #Lemmy even though it was a code block thus making the above code useless (calling that a #LemmyBug). Perhaps it’s not important for answering my question. ([bug reported](https://links.hackliberty.org/post/265101))

    10
    4
    solarpunktravel
    Solarpunk Travel soloActivist 11 months ago 31%
    How I shook free from the addiction to cars — car drivers have *less* freedom; less intelligence

    cross-posted from: https://links.hackliberty.org/post/226775 > After living in a region that was (foolishly¹) designed exclusively for cars, I moved to a proper city: a city with public transport and a cycling infrastructure. Started using public transport and felt liberated. No more insurance burden, no maintenance burden, no vehicle registration, no traffic fines, parking fees &amp; fines, no more financing unethical right-wing oil companies that are burning up the planet, etc. It was a weight off my shoulders to live cheaper and more ethical. > > ***public transport also unethical*** > > Then a colleague convinced me that using public transport needlessly is also unethical.. that the huge amount of energy required to power that infrastructure is still harmful &amp; wasteful. Public transport needs to exist for various reasons like serving disabled people, but when able-bodied people flood onto it more vehicles must be dispatched more frequently. I was adding to that burden. > > ***the winner: cycling*** > > So after years on public transport I switched to a bicycle. It’s even cheaper than public transport. And it came with another upgrade to liberties: > > * privacy— my realtime whereabouts is no longer surveilled &amp; tracked (no license plate readers, no public transport card readers w/DBs, no insurance records which can then intermingle with other insurance &amp; credit records &amp; cause harm in other ways). > > * independence— it’s easy to maintain one’s own bicycle. So I’m free of dependency on mechanics &amp; free of dependency on public transport schedules (which can be unreliable). Dirt cheap and you only need to depend on yourself. > > After evolving into a cyclist, I cannot stomach the thought of living again in a non-cyclable region. Those regions are encumbered by stupidity and addicts: people addicted to their perception of convenience (despite sitting in traffic that bicycles are immune to and despite looking for parking)… and people addicted to energy (from oil or power plants) because they think peddling their bike will be a notable effort. > > ***Intelligence of car drivers*** > > It’s been said jokingly (by Douglas Adams IIRC) that dolphins are smarter than humans because they’ve figured out how to get their needs met without investing crazy amounts of cost and labor to create things that work against them to some extent. Cyclists are like dolphins in this regard, as they see people work their asses off to be able to afford the car that takes them to work, where they earn the money to finance their car ownership so they can work more. At the same time they work to finance the oil politicians who work against them. > > 2023 research suggests [cycling makes you smarter](https://goldcountrymedia.com/news/294091/we-knew-it-all-along-cyclists-are-smarter/) and apparently 2014 research suggests cyclists are more intelligent² (I suspect there’s the factor that people with naturally higher IQs favor cycling anecdotally. E.g. many profs cycle to universities). > > ***self imprisonment*** > > We all live in a prison of some kind. My new prison is being self-excluded from a big chunk of the car-dependent world and living in all those regions. But I prefer my new prison better than that of car dependency and being forced to finance companies that finance politicians who work against humanity. > > _*footnotes*_ > > ¹: it would be unfair to fault pre-climate aware municipal designs as foolish, but foolish that decades thereafter these shitty designs are still being maintained (unlike Utrecht who were wise enough to [realize their mistake &amp; fix it](https://mastodon.online/@BrentToderian/109907272450375948)) while people continue rewarding the shit designs with their residency and tax. > > ²: I’ve not read the 2014 study myself. Some articles claim the research shows cyclists are [*perceived*](https://web.archive.org/web/20220603230839/https://www.independent.co.uk/sport/cycling/cyclists-are-more-intelligent-charitable-and-cool-than-the-average-person-says-study-9051434.html) as more intelligent while other reports claim cyclists [*are* more intelligent](https://www.huffingtonpost.co.uk/2014/01/09/cyclists-more-intelligent-charitable_n_4569136.html).

    -7
    6
    philosophy
    Philosophy soloActivist 11 months ago 27%
    How I shook free from the addiction to cars — car drivers have *less* freedom; less intelligence

    After living in regions that were (foolishly¹) designed exclusively for cars, I moved to a proper city: a city with public transport and a cycling infrastructure. Started using public transport and felt liberated. No more insurance burden, no maintenance burden, no vehicle registration, no traffic fines, parking fees &amp; fines, no more financing unethical right-wing oil companies that are burning up the planet, etc. It was a weight off my shoulders to live cheaper and more ethical. ***public transport also unethical*** Then a colleague convinced me that using public transport needlessly is also unethical.. that the huge amount of energy required to power that infrastructure is still harmful &amp; wasteful. Public transport needs to exist for various reasons like serving disabled people, but when able-bodied people flood onto it more vehicles must be dispatched more frequently. I was adding to that burden. ***the answer: cycling*** So after years on public transport I switched to a bicycle. It’s even cheaper than public transport. And it came with another upgrade to liberties: * privacy— my realtime whereabouts is no longer surveilled &amp; tracked (no license plate readers, no public transport card readers w/DBs, no insurance records which can then intermingle with other insurance &amp; credit records &amp; cause harm in other ways). * independence— it’s easy to maintain one’s own bicycle. So I’m free of dependency on mechanics &amp; free of dependency on public transport schedules (which can be unreliable). Dirt cheap and you only need to depend on yourself. After evolving into a cyclist, I cannot stomach the thought of living again in a non-cyclable region. Those regions are encumbered by stupidity and addicts: people addicted to their perception of convenience (despite sitting in traffic that bicycles are immune to and despite looking for parking)… and people addicted to energy (from oil or power plants) because they think peddling their bike will be a notable effort. ***Intelligence of car drivers*** It’s been said jokingly (by Douglas Adams IIRC) that dolphins are smarter than humans because they’ve figured out how to get their needs met without investing crazy amounts of cost and labor to create things that work against them to some extent. Cyclists are like dolphins in this regard, as they see people work their asses off to be able to afford the car that takes them to work, where they earn the money to finance their car ownership so they can work more. At the same time they work to finance the oil politicians who work against them. 2023 research suggests [cycling makes you smarter](https://goldcountrymedia.com/news/294091/we-knew-it-all-along-cyclists-are-smarter/) and apparently 2014 research suggests cyclists are more intelligent² (I suspect there’s the factor that people with naturally higher IQs favor cycling anecdotally. E.g. many profs cycle to universities). ***self imprisonment*** We all live in a prison of some kind. My new prison is being self-excluded from a big chunk of the car-dependent world and living in all those regions. But I prefer my new prison better than that of car dependency and being forced to finance companies that finance politicians who work against humanity. _*footnotes*_ ¹: it would be unfair to fault pre-climate aware municipal designs as foolish, but foolish that decades thereafter these shitty designs are still being maintained (unlike Utrecht who were wise enough to [realize their mistake &amp; fix it](https://mastodon.online/@BrentToderian/109907272450375948)) while people continue rewarding the shit designs with their residency and tax. ²: I’ve not read the 2014 study myself. Some articles claim the research shows cyclists are [*perceived*](https://web.archive.org/web/20220603230839/https://www.independent.co.uk/sport/cycling/cyclists-are-more-intelligent-charitable-and-cool-than-the-average-person-says-study-9051434.html) as more intelligent while other reports claim cyclists [*are* more intelligent](https://www.huffingtonpost.co.uk/2014/01/09/cyclists-more-intelligent-charitable_n_4569136.html). ***update:*** bonus paragraph. Due to popular demand, I’m giving you folks a bonus paragraph: ***car → bicycle upgrade*** If we go back to the last year I drove a car, and someone were to say: ditch your car and get a bicycle, my answer would probably be hell no, I'm not going to peddle my ass around. I might rather drive over animals like in [this pic](https://image.cagle.com/266695/750/266695.png) (j/k). Having the public transport middle-step seems important. It’s easy to go from car to effectively being chauffered around. Then to transition to cycling has the upgrade of not waiting, no tracking, etc.. door-to-door about the same as public transport.

    -5
    2
    privacy
    Privacy soloActivist 11 months ago 100%
    Using teletext to escape voice printing

    cross-posted from: https://fedia.io/m/disabled/t/346115 > Banks have started capturing customers voice prints without consent. You call the bank and the robot’s greeting contains “your voice will be saved for verification purposes”. IIUC, these voice prints can be used artificially reconstruct your voice. So they could be exfiltrated by criminals who would then impersonate you. > > I could be wrong about impersonation potential.. just fragments of my memory from what I’ve read. In any case, I don’t like my biometrics being collected without my control. > > The countermeasure I have in mind is to call your bank using [#Teletext](https://fedia.io/tag/Teletext) (TTY). This is (was?) typically a special hardware appliance. As a linux user, TTY is what the text terminal is based on. So I have questions: > > 1. can a linux machine with a modem be used to convert a voice conversation to text? > > 2. how widespread are TTY services? Do most banks support that, or is it just a few giant banks? > > 3. if street-wise privacy enthusiasts would theoretically start using TTY in substantial numbers, would it help the deaf community by increasing demand for TTY service, thus increasing the number of businesses that support it?

    3
    1
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearLE
    Lemmy Support soloActivist 11 months ago 100%
    voting out of sync (kbin→lemmy)

    Directly visiting a Kbin thread on the server hosting it shows some positive number of votes. If the URL of that kbin thread is used is queried in lemmy so a copy local to the lemmy instance is made, the number of votes is zero. Edit-- this also happens when the source article is another lemmy instance.

    3
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearPH
    Philosophy soloActivist 11 months ago 92%
    [answered] When exercise of rights is made conditional on use of technology, is the right violated?

    cross-posted from: https://links.hackliberty.org/post/213918 > I’m increasingly encountering situations where people are forced to go through various kinds of technical hoops in order to exercise their legal rights. > > Five examples: > > ① You have a right to reserve streetside public parking in front of your house (e.g. for a week-long construction project). Historically you can go to city hall or the like, give your schedule, and pay a fee. But then they decided to put the reservation system exclusively online. Cash payers are excluded. Offline people are excluded. People who are online but do not want to share their email address with an office that uses Microsoft for their email are also excluded. > > ② You have a right to unemployment benefits. But the unemployment office goes online and forces you to solve a Google reCAPTCHA. Google’s reCAPTCHA often refuses to serve the puzzles to Tor users. People who are on clearnet may be unable to solve the CAPTCHA. Some people /can/ solve it but object to feeding a system that helps Google profit because they boycott Google. > > ③ You have a right to vote. But the voter registration process exposes your sensitive information to the tech giant Cloudflare and Amazon. Even if you register on paper, the data entry workers will expose your data to Cloudflare and Amazon anyway. > > ④ You have a right to energy access. But the energy company refuses cash payments so you are forced to open a bank account. All banks force you into a situation that goes against your beliefs. E.g. forcing you to obtain from Google a closed-source app to run on a smartphone (which you may not even have), or the bank’s website is Cloudflared and you will not share your sensitive financial info with CF. And the banks either have no analog/offline means of service, or the offline services are costly. > > ⑤ A public school excludes students who are unwilling to use Facebook, Google, Cloudflare, and Microsoft products &amp; services. Anyone can attend but those who refuse to feed the corporate surveillance capitalists are put at a great disadvantage perhaps to the extent that they cannot pass their classes. > > Not all those examples are real. E.g. in the real life scenario of case ② I think there is an offline option (but not sure during a pandemic). So my question is hypothetical— assume there is no pathway to service except for satisfying the barriers to entry. > > The Universal Declaration of Human Rights, article 21: > > **“2. Everyone has the right of equal access to public service in his country.”** > > Some nuances can be extracted from the examples: > > A) You are incapable of exercising your right yourself. E.g. blind and the CAPTCHA requires vision, or you are not tech literate enough to follow the tech process. But you can hire someone to do the work for you. > > B) You are capable of exercising your rights but unwilling to accept the conditions. Hiring someone may or may not be possible depending on whether your personal conditions can be accommodated. > > So the big question is, for groups A and B: are rights being violated? > > Group B is the more interesting one. A common attitude is: those people have *“preferences”* and their rights are not violated when their preference is not respected. I find that quite harsh. When a right becomes conditional by the institutions who are supposed to support the right, IMO the conditions (which are not written in law) are inherently excluding people. If a right is going to be made conditional, isn’t there some kind of legal principle that the conditions be codified into law and not some arbitrary condition that a systems administrator decided was a good idea? > > #rightToBeOffline #rightToBeAnalog

    11
    11
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearAU
    AusLegal soloActivist 11 months ago 50%
    [answered] When exercise of rights is made conditional on use of technology, is the right violated?

    cross-posted from: https://links.hackliberty.org/post/213918 > I’m increasingly encountering situations where people are forced to go through various kinds of technical hoops in order to exercise their legal rights. > > Some examples: > > ① You have a right to reserve streetside public parking in front of your house (e.g. for a week-long construction project). Historically you can go to city hall or the like, give your schedule, and pay a fee. But then they decided to put the reservation system exclusively online. Offline people are excluded. People who are online but do not want to share their email address with an office that uses Microsoft for their email are also excluded. > > ② You have a right to unemployment benefits. But the unemployment office goes online and forces you to solve a Google reCAPTCHA. Google’s reCAPTCHA often refuses to serve the puzzles to Tor users. People who are on clearnet may be unable to solve the CAPTCHA. Some people /can/ solve it but object to feeding a system that helps Google profit because they boycott Google. > > ③ You have a right to vote. But the voter registration process exposes your sensitive information to the tech giant Cloudflare and Amazon. Even if you register on paper, the data entry workers will expose your data to Cloudflare and Amazon anyway. > > ④ You have a right to energy access. But the energy company refuses cash payments so you are forced to open a bank account. All banks force you into a situation that goes against your beliefs. E.g. forcing you to obtain from Google a closed-source app to run on a smartphone (which you may not even have), or the bank’s website is Cloudflared and you will not share your sensitive financial info with CF. And the banks either have no analog/offline means of service, or the offline services are costly. > > ⑤ A public school excludes students who are unwilling to use Facebook, Google, Cloudflare, and Microsoft products &amp; services. Anyone can attend but those who oppose the corporate surveillance capitalists are put at a great disadvantage perhaps to the extent that they cannot pass their classes. > > Not all those examples are real. E.g. in the real life scenario of case ② I think there is an offline option. But my question is hypothetical— assume there is no pathway to service except for satisfying the barriers to entry. > > The Universal Declaration of Human Rights, article 21: > > **“2. Everyone has the right of equal access to public service in his country.”** > > Some nuances can be extracted from the examples: > > A) You are incapable of exercising your right yourself. E.g. blind and the CAPTCHA requires vision, or you are not tech literate enough to follow the tech process. But you can hire someone to do the work for you. > > B) You are capable of exercising your rights but unwilling to accept the conditions. Hiring someone may or may not be possible depending on whether your personal conditions can be accommodated. > > So the big question is, for groups A and B: are rights being violated? > > Group B is the more interesting one. A common attitude is: those people have *“preferences”* and their rights are not violated when their preference is not respected. I find that quite harsh. When a right becomes conditional by the institutions who are supposed to support the right, IMO the conditions (which are not written in law) are inherently excluding people. If a right is going to be made conditional, isn’t there some kind of legal principle that the conditions be codified into law and not some arbitrary condition that a systems administrator decided was a good idea? > > #rightToBeOffline #rightToBeAnalog # UPDATE This question was [answered](https://links.hackliberty.org/comment/572192) in !philosophy@mander.xyz.

    0
    0
    philosophy
    Philosophy soloActivist 11 months ago 92%
    [answered] When exercise of rights is made conditional on use of technology, is the right violated?

    I’m increasingly encountering situations where people are forced to go through various kinds of technical hoops in order to exercise their legal rights. Five examples: ① You have a right to reserve streetside public parking in front of your house (e.g. for a week-long construction project). Historically you can go to city hall or the like, give your schedule, and pay a fee. But then they decided to put the reservation system exclusively online. Cash payers are excluded. Offline people are excluded. People who are online but do not want to share their email address with an office that uses Microsoft for their email are also excluded. ② You have a right to unemployment benefits. But the unemployment office goes online and forces you to solve a Google reCAPTCHA. Google’s reCAPTCHA often refuses to serve the puzzles to Tor users. People who are on clearnet may be unable to solve the CAPTCHA. Some people /can/ solve it but object to feeding a system that helps Google profit because they boycott Google. ③ You have a right to vote. But the voter registration process exposes your sensitive information to the tech giant Cloudflare and Amazon. Even if you register on paper, the data entry workers will expose your data to Cloudflare and Amazon anyway. ④ You have a right to energy access. But the energy company refuses cash payments so you are forced to open a bank account. All banks force you into a situation that goes against your beliefs. E.g. forcing you to obtain from Google a closed-source app to run on a smartphone (which you may not even have), or the bank’s website is Cloudflared and you will not share your sensitive financial info with CF. And the banks either have no analog/offline means of service, or the offline services are costly. ⑤ A public school excludes students who are unwilling to use Facebook, Google, Cloudflare, and Microsoft products &amp; services. Anyone can attend but those who refuse to feed the corporate surveillance capitalists are put at a great disadvantage perhaps to the extent that they cannot pass their classes. Not all those examples are real. E.g. in the real life scenario of case ② I think there is an offline option (but not sure during a pandemic). So my question is hypothetical— assume there is no pathway to service except for satisfying the barriers to entry. The Universal Declaration of Human Rights, article 21: **“2. Everyone has the right of equal access to public service in his country.”** Some nuances can be extracted from the examples: A) You are incapable of exercising your right yourself. E.g. blind and the CAPTCHA requires vision, or you are not tech literate enough to follow the tech process. But you can hire someone to do the work for you. B) You are capable of exercising your rights but unwilling to accept the conditions. Hiring someone may or may not be possible depending on whether your personal conditions can be accommodated. So the big question is, for groups A and B: are rights being violated? Group B is the more interesting one. A common attitude is: those people have *“preferences”* and their rights are not violated when their preference is not respected. I find that quite harsh. When a right becomes conditional by the institutions who are supposed to support the right, IMO the conditions (which are not written in law) are inherently excluding people. If a right is going to be made conditional, isn’t there some kind of legal principle that the conditions be codified into law and not some arbitrary condition that a systems administrator decided was a good idea? #rightToBeOffline #rightToBeAnalog # UPDATE This question was [answered](https://links.hackliberty.org/comment/572192) in !philosophy@mander.xyz.

    11
    5
    philosophy
    Philosophy soloActivist 11 months ago 80%
    Boycott opponents always say: “good people work for bad companies”

    A common objection to boycotts is based on sympathy for the workers. If you call for a boycott on Amazon, for example, a substantial portion of the population will argue “good people work for bad companies”. This rationale essentially attempts to take the boycott option off the table entirely for all mid-size companies and larger. So I wonder to what extent this widespread way of thinking damages activist movements to correct harmful companies. Recently in Belgium there was a boycott on the grocery chain Delhaize for their employment practices. So I can’t help but notice this boycott is purely out of sympathy for the employees, effectively a 180° contradiction to the mentality that boycotts harm employees.

    3
    3
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearLE
    Lemmy Support soloActivist 11 months ago 75%
    [bug] non-stop spinner when trying to post to !assistive_technology@lemmy.sdf.org

    I filled out a form to crosspost to !assistive_technology@lemmy.sdf.org, clicked create, and the create button turns into a spinner. Forever. F12 » console gives: ` Source map error: Error: request failed with status 400` `Resource URL: https://links.hackliberty.org/css/themes/darkly-red.css` `Source Map URL: darkly-red.css.map ` #lemmyBug

    2
    0
    fightforprivacy
    Fight For Privacy soloActivist 11 months ago 92%
    [discussion] Using teletext to escape voice printing

    cross-posted from: https://fedia.io/m/disabled/t/346115 > Banks have started capturing customers voice prints without consent. You call the bank and the robot’s greeting contains “your voice will be saved for verification purposes”. IIUC, these voice prints can be used artificially reconstruct your voice. So they could be exfiltrated by criminals who would then impersonate you. > > I could be wrong about impersonation potential.. just fragments of my memory from what I’ve read. In any case, I don’t like my biometrics being collected without my control. > > The countermeasure I have in mind is to call your bank using [#Teletext](https://fedia.io/tag/Teletext) (TTY). This is (was?) typically a special hardware appliance. As a linux user, TTY is what the text terminal is based on. So I have questions: > > 1. can a linux machine with a modem be used to convert a voice conversation to text? (edit: perhaps [minimodem or asterisk](https://github.com/kamalmostafa/minimodem/issues/28)?) > > 2. how widespread are TTY services? Do most banks support that, or is it just a few giant banks? > > 3. if street-wise privacy enthusiasts would theoretically start using TTY in substantial numbers, would it help the deaf community by increasing demand for TTY service, thus increasing the number of businesses that support it? > > (update) > > Another privacy benefit that comes to mind: bankers will sometimes start an unprovoked interrogation of intrusive questions irrelevant to your reason for calling, such as who you work for, how much you earn, career skill, etc. The realtime nature of a voice call puts you at a disadvantage whereby a delayed response can create suspicion. So you must answer quick and without stumbling. Quick answers also invite many questions. In a text conversation, a delay can simply mean that you stepped away for a moment. And presumabley a CSR is handling multiple conversations at once. > > Some banks only have on file where I worked 2+ jobs ago. I don’t want to keep them up to date with more data, so I can take a moment to check my notes for where they think I still work.

    12
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearLE
    Lemmy Support soloActivist 12 months ago 81%
    The “B” word is not a slur in all situations (3 bugs in the slur filter)

    In [this comment](https://links.hackliberty.org/comment/409723) my use of the “b” word was overzealously suppressed, silently without telling me. I only discovered it when re-reading my post. There are **THREE** #LemmyBug cases here: 1. when the “b” word is used as a verb, it’s not a slur. And when it’s used as a noun, it’s only a slur if not literally referring to a dog. 2. my post was tampered with without even telling me. Authors should be informed when their words are manipulated and yet still presented to others as their own words. 3. The word “removed” cannot simply replace any word. It makes my sentence unreadable. In the very least, the word should be “REDACTED”, and there should be a footnote added that explains /why/ it was redacted.

    27
    24