ThreeHopsAhead

joined 3 years ago
[–] ThreeHopsAhead@lemmy.ml 9 points 1 year ago (1 children)

YouTube once did a genius and really nice move: Paying the video authors. They realized that treating the people who create the works – that are the entire reason why people use the platform – well and creating an incentive for that work is smart and a good way to grow the platform.

But that time is long gone. YouTube is the monopoly in the market now. They ruin everything that was good about YouTube. They brought the adpocolypse and only pay video authors for videos the content of which they deem friendly to their advertisements business and easy to sell to advertisers based on a completely arbitrary broken automatic system that enforces self censorship on the video authors. All other videos that are still vital to the platform do not get any of the money they make of the viewers the demonetized videos keep on the platform.
They started putting ads on videos that the author did not choose to monetize completely breaking with their system of sharing their revenue with the people who create the basis for that.
While they impose strict arbitrary self censorship on the video authors who want a cut of the revenue their videos allowed to generate they allow a flood of scams and other illegitimate and inappropriate content for advertisers.
They removed the dislike button making the platform much worse for the users just to appeal to advertisers even more.

[–] ThreeHopsAhead@lemmy.ml 1 points 1 year ago

TikTok is a cancer that always does this. It is a tool for censorship, propaganda and population control. You should never use TikTok. It is extremely unethical to do so.

[–] ThreeHopsAhead@lemmy.ml 3 points 1 year ago

You should get no information from TikTok. That is all there is to say about it. This is even much more true for medical information.

[–] ThreeHopsAhead@lemmy.ml 2 points 1 year ago (2 children)

That is not the topic at discussion.

[–] ThreeHopsAhead@lemmy.ml 22 points 1 year ago (6 children)

If you get your medical information from TikTok you really have far bigger problems.

[–] ThreeHopsAhead@lemmy.ml 6 points 1 year ago (8 children)

GrapheneOS is the go torecommendations.

[–] ThreeHopsAhead@lemmy.ml 8 points 1 year ago

Note that the admins of your instance can see absolutely everything in your account. Social media is not private and Lemmy is no exception to this.

[–] ThreeHopsAhead@lemmy.ml 7 points 1 year ago* (last edited 1 year ago) (1 children)

What is interesting is that they paint this as a security reason:

However, Microsoft has decided to remove this option from the Edge settings menu, citing security and privacy reasons. According to a Microsoft engineer, the reset sync option was “a potential attack vector for malicious actors to wipe out user data without their consent or knowledge”.

This is a very common reappearing thing in big tech. They deny you control over your data and device for alleged security reasons. Apple uses the same pretens for locking down iOS and not allowing the user to install apps of their choice but only what Apple approves.
They are right in a way. They are doing this for security reasons. But not for your security but for theirs, from you. You do not own "your" data and you do not own "your" device. We are heading towards a society where you do not own anything. No matter how much you pay for it.

[–] ThreeHopsAhead@lemmy.ml 7 points 1 year ago

That's all nice but their lowest paid plan also just tripled in price (while getting more features).

[–] ThreeHopsAhead@lemmy.ml 14 points 1 year ago (1 children)

The entire point of E2EE encryption is that you do not have to trust the server.

[–] ThreeHopsAhead@lemmy.ml 1 points 1 year ago (1 children)

Tor Browser on Android. It happens on multiple circuits with different exits. Not an image by me, but it looks like this: https://global.discourse-cdn.com/cloudflare/original/3X/c/3/c38eaed81c96ac19e4fd5a69d4257445b391927e.png

[–] ThreeHopsAhead@lemmy.ml 2 points 1 year ago

Really? That is a stupid limitation.

 

Never rely on any cloud service! A good cloud based password manager is end to end encrypted meaning the password manager provider cannot access your passwords and they are secured from the provider and any compromise of the provider. But you do not only need confidentiality but also reliability. The cloud is just someone else's computer that you store your data on. They can cease their service or stop providing you access to it at any time. Always have a local backup of anything important saved in a cloud.

With Bitwarden for example you can export your vault as unencrypted json and csv format. Those are widely compatible and allow you to easily access and import your passwords.

Do not save your exported passwords unencrypted. I strongly recommend creating a dedicated VeraCrypt or LUKS container or similar and saving the export directly into that without saving it to disk unencrypted in the first place.

Note that shared organizations are not included in the standard vault export and need to be exported separately.

Edit: Someone mentioned that Bitwarden's export feature does not export attachments. So export them manually if you need to.

 

Just because software is open source does not mean someone is actually looking at the code. But depending on the software there are incentives to do so. Some people might be technologically interested on the way a software does something and look at the source code for that. Some people might want to check the benignity for themselves and actively check the source code for malicious features. With community maintained software there are often many different independent people working on the software. Also many open source software projects allow code commits to the software. Many eyes on the software due to many people working on it increases the chance of malicious features or vulnerabilities being discovered. A great thing about FOSS is the possibility to fork it or to use the FOS software of someone else in your software. FOSS allows and even encourages everyone to work with the software of others for ones own purpose and to modify, adapt or embed it. This leads to more people having an eye on the source code just for purely practical purposes. Open source just means publishing the source code, but FOSS is about actively reusing, improving and adapting other people's work in your own work. Security researchers might also have a look on open source software purely for their own research. Another great important aspect are bug bounties. Many developers pay bounties to people who report vulnerabilities to them. That creates an incentive to audit the code. But obviously not every project, especially smaller ones, have bug bounty programs. But you could probably sponsor one for some software you like.
Lastly there are independent third party audits. Those can be done for a number of reasons. There can be community paid audits through donations. VeraCrypt had one for example. Then there might also be other organizations who want to use the software and have an interest in its security. VeraCrypt is also an example for that. The German government paid the Frauenhofer Institute for an audit of VeraCrypt.

In the end it comes down to the specific software. If someone implements a malicious feature in their software it is not necessarily going to be found just because the source code is open. If you find some random unknown software it is not secure just for being open source, but the chance of malicious features or vulnerabilities being discovered is definitely higher if it is possible to look for them in the first place.

Security critical software should be open source and audited.

This work is licensed under CC BY-SA 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/

 

You might have old accounts especially cloud accounts that are just idling abandoned while still holding personal information. They might have old weak passwords just waiting to get compromised. Same goes for old email addresses that you do not use anymore but are still linked to other accounts. This is a reminder to check those, delete your data from them or to delete them altogether (delete private information manually first before deleting the account as many companies do not actually delete the data from deleted accounts and just mark the account as deleted).

Some examples of this could be:

  • old Google accounts from old devices
  • old iCloud accounts
  • old Microsoft accounts
  • old Aol or similar email accounts
  • old accounts from smartphone vendors like Samsung, Huawei etc. that often have their own cloud services

Make sure to set a strong passwords on accounts you want to keep and of course use a password manager. Besides the security password managers have the great side effect of giving you an overview over all your accounts so that you cannot just forget old ones.

This work is licensed under CC BY-SA 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/

 

Privacy means being in control of ones own personal information. It does not mean secrecy but deciding on your own what you share and with whom and what you do not share.
On computers you can only have this control over your data when you have control over your computer. You should be the one deciding what your computer does, what software runs on its processor, what it does with your hardware and what it does with your data.

That is your personal freedom. Software should respect this freedom. That means you have to be in control of the software. This requires the following things:

  • You should have the freedom to use the software for any purpose. Only you should decide and control what you do with your hardware and data.
  • You should have the freedom to see what the software does. The software should be transparent and open source. To be in control of your data and your hardware, to be able to freely decide over it software should be open source so that you and anyone else who obtains a copy of it can freely check and see for themselves what the software does.
  • You should be allowed to freely modify the software. To be in control of the software and in extent your device and data you need to have the right to modify the software to your liking: to remove any features that you dislike, that handle your hardware or data in a way you do not approve of, to modify features to your liking so that they suit your use case and use your hardware and data in the way you choose and to add new features so that you can do with your hardware and data what you choose to.
  • You should be allowed to freely redistribute and publish the software and your modifications to it. You should not be forced to keep your copy of the software and your changes to it to yourself. Others should have the ability to profit of them as well if you want them to and you should have the ability to profit of the work and modifications of others if they want you to be able to. Your freedoms over your device are only effective if you can run the software developed and published by anyone. You should not need to develop all changes to the software yourself. Everyone including people who cannot develop software themselves should have freedom over their device and data and people developing and modifying software should have the freedom to collaborate and to build upon another. Innovation, peace, human culture and progress depend on people working together and building on the work of others.

Software that adheres to these freedoms is called free software. Free as in freedom.

You can only own a device if it runs free software.
You can only have privacy if your personal information is processed by free software.

This work is licensed under CC BY-SA 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/

 

Privacy means being in control of ones own personal information. It does not mean secrecy but deciding on your own what you share and with whom and what you do not share.
On computers you can only have this control over your data when you have control over your computer. You should be the one deciding what your computer does, what software runs on its processor, what it does with your hardware and what it does with your data.

That is your personal freedom. Software should respect this freedom. That means you have to be in control of the software. This requires the following things:

  • You should have the freedom to use the software for any purpose. Only you should decide and control what you do with your hardware and data.
  • You should have the freedom to see what the software does. The software should be transparent and open source. To be in control of your data and your hardware, to be able to freely decide over it software should be open source so that you and anyone else who obtains a copy of it can freely check and see for themselves what the software does.
  • You should be allowed to freely modify the software. To be in control of the software and in extent your device and data you need to have the right to modify the software to your liking: to remove any features that you dislike, that handle your hardware or data in a way you do not approve of, to modify features to your liking so that they suit your use case and use your hardware and data in the way you choose and to add new features so that you can do with your hardware and data what you choose to.
  • You should be allowed to freely redistribute and publish the software and your modifications to it. You should not be forced to keep your copy of the software and your changes to it to yourself. Others should have the ability to profit of them as well if you want them to and you should have the ability to profit of the work and modifications of others if they want you to be able to. Your freedoms over your device are only effective if you can run the software developed and published by anyone. You should not need to develop all changes to the software yourself. Everyone including people who cannot develop software themselves should have freedom over their device and data and people developing and modifying software should have the freedom to collaborate and to build upon another. Innovation, peace, human culture and progress depend on people working together and building on the work of others.

Software that adheres to these freedoms is called free software. Free as in freedom.

You can only own a device if it runs free software.
You can only have privacy if your personal information is processed by free software.

This work is licensed under CC BY-SA 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/

 

Privacy means being in control of ones own personal information. It does not mean secrecy but deciding on your own what you share and with whom and what you do not share.
On computers you can only have this control over your data when you have control over your computer. You should be the one deciding what your computer does, what software runs on its processor, what it does with your hardware and what it does with your data.

That is your personal freedom. Software should respect this freedom. That means you have to be in control of the software. This requires the following things:

  • You should have the freedom to use the software for any purpose. Only you should decide and control what you do with your hardware and data.
  • You should have the freedom to see what the software does. The software should be transparent and open source. To be in control of your data and your hardware, to be able to freely decide over it software should be open source so that you and anyone else who obtains a copy of it can freely check and see for themselves what the software does.
  • You should be allowed to freely modify the software. To be in control of the software and in extent your device and data you need to have the right to modify the software to your liking: to remove any features that you dislike, that handle your hardware or data in a way you do not approve of, to modify features to your liking so that they suit your use case and use your hardware and data in the way you choose and to add new features so that you can do with your hardware and data what you choose to.
  • You should be allowed to freely redistribute and publish the software and your modifications to it. You should not be forced to keep your copy of the software and your changes to it to yourself. Others should have the ability to profit of them as well if you want them to and you should have the ability to profit of the work and modifications of others if they want you to be able to. Your freedoms over your device are only effective if you can run the software developed and published by anyone. You should not need to develop all changes to the software yourself. Everyone including people who cannot develop software themselves should have freedom over their device and data and people developing and modifying software should have the freedom to collaborate and to build upon another. Innovation, peace, human culture and progress depend on people working together and building on the work of others.

Software that adheres to these freedoms is called free software. Free as in freedom.

You can only own a device if it runs free software.
You can only have privacy if your personal information is processed by free software.

This work is licensed under CC BY-SA 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/

 

Privacy means being in control of ones own personal information. It does not mean secrecy but deciding on your own what you share and with whom and what you do not share.
On computers you can only have this control over your data when you have control over your computer. You should be the one deciding what your computer does, what software runs on its processor, what it does with your hardware and what it does with your data.

That is your personal freedom. Software should respect this freedom. That means you have to be in control of the software. This requires the following things:

  • You should have the freedom to use the software for any purpose. Only you should decide and control what you do with your hardware and data.
  • You should have the freedom to see what the software does. The software should be transparent and open source. To be in control of your data and your hardware, to be able to freely decide over it software should be open source so that you and anyone else who obtains a copy of it can freely check and see for themselves what the software does.
  • You should be allowed to freely modify the software. To be in control of the software and in extent your device and data you need to have the right to modify the software to your liking: to remove any features that you dislike, that handle your hardware or data in a way you do not approve of, to modify features to your liking so that they suit your use case and use your hardware and data in the way you choose and to add new features so that you can do with your hardware and data what you choose to.
  • You should be allowed to freely redistribute and publish the software and your modifications to it. You should not be forced to keep your copy of the software and your changes to it to yourself. Others should have the ability to profit of them as well if you want them to and you should have the ability to profit of the work and modifications of others if they want you to be able to. Your freedoms over your device are only effective if you can run the software developed and published by anyone. You should not need to develop all changes to the software yourself. Everyone including people who cannot develop software themselves should have freedom over their device and data and people developing and modifying software should have the freedom to collaborate and to build upon another. Innovation, peace, human culture and progress depend on people working together and building on the work of others.

Software that adheres to these freedoms is called free software. Free as in freedom.

You can only own a device if it runs free software.
You can only have privacy if your personal information is processed by free software.

This work is licensed under CC BY-SA 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/

 

You might have old accounts especially cloud accounts that are just idling abandoned while still holding personal information. They might have old weak passwords just waiting to get compromised. Same goes for old email addresses that you do not use anymore but are still linked to other accounts. This is a reminder to check those, delete your data from them or to delete them altogether (delete private information manually first before deleting the account as many companies do not actually delete the data from deleted accounts and just mark the account as deleted).

Some examples of this could be:

  • old Google accounts from old devices
  • old iCloud accounts
  • old Microsoft accounts
  • old Aol or similar email accounts
  • old accounts from smartphone vendors like Samsung, Huawei etc. that often have their own cloud services

Make sure to set a strong passwords on accounts you want to keep and of course use a password manager. Besides the security password managers have the great side effect of giving you an overview over all your accounts so that you cannot just forget old ones.

 

You might have old accounts especially cloud accounts that are just idling abandoned while still holding personal information. They might have old weak passwords just waiting to get compromised. Same goes for old email addresses that you do not use anymore but are still linked to other accounts. This is a reminder to check those, delete your data from them or to delete them altogether (delete private information manually first before deleting the account as many companies do not actually delete the data from deleted accounts and just mark the account as deleted).

Some examples of this could be:

  • old Google accounts from old devices
  • old iCloud accounts
  • old Microsoft accounts
  • old Aol or similar email accounts
  • old accounts from smartphone vendors like Samsung, Huawei etc. that often have their own cloud services

Make sure to set a strong passwords on accounts you want to keep and of course use a password manager. Besides the security password managers have the great side effect of giving you an overview over all your accounts so that you cannot just forget old ones.

 

just that the TV commercial looks back at you through the TV and the TV follows you around everywhere, wherever you go, whatever you do, taking note of everything to get to know every single detail about you, every interest, every prejudice, every weakness of yours, to get to know you like no person, no matter how close to you does, like not even yourself do to use that information to influence you most effectively to the TV channel's and the advertiser's advantage, to manipulate you, to sell this information about you to other companies like insurances who use the power that this knowledge provides over you to extract every last cent of money from you, to sell you.

 

just that the TV commercial looks back at you through the TV and the TV follows you around everywhere, wherever you go, whatever you do, taking note of everything to get to know every single detail about you, every interest, every prejudice, every weakness of yours, to get to know you like no person, no matter how close to you does, like not even yourself do to use that information to influence you most effectively to the TV channel's and the advertiser's advantage, to manipulate you, to sell this information about you to other companies like insurances who use the power that this knowledge provides over you to extract every last cent of money from you, to sell you.

view more: next ›