KarnaSubarna

joined 1 year ago
[–] [email protected] 2 points 10 months ago (1 children)

If installing extension is not an option for you -

  • You can open https://snowflake.torproject.org/ (or https://relay.love/) on a tab,
  • scroll down to 'Leave this browser tab open or embed a web badge on your website' section
  • toggle 'Enabled' button
  • and leave the browser running.
  • Note: Browser needs to have WebRTC enabled to make it work.

I'm personally running Snowflake container on docker on my little Raspberry pi 24/7. And, yes, in 2023 most of the connection to my bridge was from Iran.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago)

Yes, Temporary/Disposable email account is strictly for one time use.

[–] [email protected] 12 points 10 months ago

I think it depends on headphone model/setup.

My Sennheiser Momentum 3 by default only look for devices that were paired up in the past.

It goes to (forced) discovery/pairing mode only when I press a specific button on headset manually.

Check manual of your headset for similar setup.

[–] [email protected] 6 points 10 months ago

It’s a sell and not leak of data. It’s actually called Server to Server (S2S) tracking.

https://tinuiti.com/blog/data-privacy/server-to-server-tracking/

https://revealbot.com/blog/facebook-conversions-api/

[–] [email protected] 36 points 10 months ago* (last edited 10 months ago) (2 children)

This is how I explained it to one of my friends who is/was definitely a member of “I’ve got nothing to hide” club -

  • Suppose you are in a pay-to-use toilet minding your own Business.
  • That pay-to-use toilet is managed by a public/private entity called ToiletBook.
  • Suddenly you notice a (hidden) camera in the room.
  • When confronted, the owner confirms the only reason they took your picture to suggest you the perfect underwear based on your size. And, there is a legal guarantee that picture/data will never be used for any other purpose and only be processed by machine.
  • Will you still go to such toilet?

BTW, that friend stopped talking to me afterward; not sure why 🤔 (Edit: I should stop giving shitty examples to anyone, as it seems ) 🤐

[–] [email protected] 26 points 10 months ago* (last edited 10 months ago) (2 children)

Back in '50s, the connection between Tobacco products and Cancer was evident. Since '70s connection between Fossil fuel and Global warming was evident.

Yet, no one heeded those warnings at the time. With cancer rate going up, and climate becoming increasing unpredictable/extreme, people now started to take notice.

With so much information to process, Human brain ignores information that doesn't have a clear relation to a significant real world problem that immediately impacts their lives. This makes us intelligent (at short term) and dumb (at long term) at the same time.

Using a service at free of cost (at the expense of your privacy) is acceptable by majority of population as it has no significant real world impact on their lives.

If tomorrow, a huge data leak from these imbecile data hoarders leads to massive transaction fraud/identify theft that impacts a significant percentage of population and their daily lives, only then there will be massive outrage that you expect.

Till then, we are the only one who escaped the Matrix, while rest embraced it.

[–] [email protected] 2 points 10 months ago

An excellent read. Thanks OP 👍

 

Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of 186,892 companies sent data about them to the social network. On average, each participant in the study had their data sent to Facebook by 2,230 companies. That number varied significantly, with some panelists’ data listing over 7,000 companies providing their data.

 

X’s move to make people pay for a basic form of two-factor is problematic. It also created confusion because the company prompted free users to switch away from SMS two-factor, but then seemingly simply turned off the protection altogether for those who didn’t. This likely left a group of users in a situation where they think they have two-factor authentication on, but actually don’t.

 

To exploit the vulnerability, which the researchers call LeftoverLocals, attackers would need to already have established some amount of operating system access on a target’s device. Modern computers and servers are specifically designed to silo data so multiple users can share the same processing resources without being able to access each others’ data. But a LeftoverLocals attack breaks down these walls. Exploiting the vulnerability would allow a hacker to exfiltrate data they shouldn’t be able to access from the local memory of vulnerable GPUs, exposing whatever data happens to be there for the taking, which could include queries and responses generated by LLMs as well as the weights driving the response.

The researchers did not find evidence that Nvidia, Intel, or Arm GPUs contain the LeftoverLocals vulnerability, but Apple, Qualcomm, and AMD all confirmed to WIRED that they are impacted. This means that well-known chips like the AMD Radeon RX 7900 XT and devices like Apple’s iPhone 12 Pro and M2 MacBook Air are vulnerable. The researchers did not find the flaw in the Imagination GPUs they tested, but others may be vulnerable.

[–] [email protected] 2 points 10 months ago

Laughs in Invidious (docker container) 😎

 

Update 1/16 - Adblock has informed BleepingComputer that its engineers fixed the problem and released ABP 3.22.1 and AB 5.17.1 on the Opera and Edge extension stores. The same versions are currently in review on the Mozilla and Chrome add-on stores, and should be made available soon.

[–] [email protected] 5 points 10 months ago

If your hardware supports, you may self-host your favourite privacy frontends (e.g. LibReddit) on docker on your system, and point that extension to your self-hosted privacy frontend servers.

[–] [email protected] 7 points 10 months ago (1 children)

That's a clear indication of IoT control being taken over by malicious actor to make it a part of botnet.

Any IoT needs to be secured when connected to Internet (and, not intranet).

 

The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

 

"After signing into their ACT account, if a student accepted cookies on the following page, Facebook received details on almost everything they clicked on—including scrambled but identifiable data like their first and last name, and whether they’re registering for the ACT. The site even registered clicks about a student’s ethnicity and gender, and whether they planned to request college financial aid or needed accommodations for a disability"

view more: ‹ prev next ›