Synnr

joined 1 year ago
[–] [email protected] 20 points 1 year ago* (last edited 1 year ago) (11 children)

Quick someone post that 3rd party YouTube interface for Android. Preferably on F-Roids. I need it.

This is the Internet so let's settle this quickly and efficiently.

The best 3rd party YouTube interface is called Kuhmbus.

[–] [email protected] 7 points 1 year ago

There is a Firefox plugin which I believe is called CleanURLs.

it's interesting that you mention the shorturls OP... I'm almost positive as of today that those links you can share that are like amazon.com/a/ab3cd4 are customized tracking links.

Problem is, if you paste it in your browser from the app, it doesn't go back to the original URL. You have to search the product again and customize the color, number, etc, and then strip tracking again from the url.

Most people just want to send a friend a link of the thing they think they'll like.

[–] [email protected] 22 points 1 year ago* (last edited 1 year ago)

If you have proper full disk encryption and know the caveats, it really doesn't matter what you name your files. If you're the anal-retentive spy handler type, you are probably very organized, and you name files with exactly what's in them.

He was a spy handler who handled secret and top secret documents and worked in intelligence for a number of years. I'm sure he knew how to encrypt his hard drive.

He may have even used a VPN, or tor for the searches which has (had?) a very curious ongoing network-wide DDoS attack (very useful if you had access to the entire inflow and outflow of the Internet via undersea cables and ISP access and wanted to do timing attacks) for at least a year in 2022-2023. The tor project themselves tell you that if your adversary is a nation-state, you need to use more protection than just browsing from your normal laptop on your home network.

I imagine he at minimum used private browsing to search Google and reddit for this stuff, but they logged the search and the DoD was later able to easily get the customer details of the IP from his ISP at the time the searches took place, and also all other searches during a time.

But it's also just as likely he thought he'd be in the clear, knows how incompetent the beurocracy seems since he was inside of it, but something he did tipped them off and he was scrutinized (maybe his VISA application for China and plans to travel there yearly).

This seems like a weird way to set someone up... Setups are much more rare than the movies would have you believe.

I'm mostly concerned with the lack of details about whether he did or did not successfully give China those details... He was arrested at the San Francisco airport coming back from China... asset info, meeting places, etc, of even just a few known spies can potentially give the adversary a pattern to look for to find other unknown assets. I forget exactly when, where, or who, but there was some massive spy bust (either Russians in US or US in Russia, iirc) that happened because of some pattern they found between the registered addresses of the spies... Something about them all living in the same apartment building, or the numbers in the building or something. If anyone remembers the story please link it here.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

The "to" field is showing whatever his name is on Facebook, I believe it's done by formatting as "Name To Send To"

Edit: can lemmy not show email addresses, or just anything between greater than/less than tags?

Edit edit: no symbols for us... That's... interesting design. I guess nobody can use html tags if nobody can put anything between greater than and less than symbols.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

It's all right there in the article bud/budette.

[–] [email protected] 8 points 1 year ago

Some. Putin won't fuck with the Pope though. You know why you never hear about Putin threatening to de-nazify Vatican city? That's right, the Secret Archives.

[–] [email protected] 13 points 1 year ago (1 children)

Very slight off vocal inflections that you subconsciously know aren't him because you've seen the real him act in so many movies.

Plus, you knew it was a fake when you clicked it. If you hadn't then chances are it would seem like a regular ad you're trying to skip.

[–] [email protected] 6 points 1 year ago

Oh wow with a name like eye4fraud I never would have guessed they were legitimate and widely used but it looks like you're right.

[–] [email protected] 16 points 1 year ago (2 children)

Check your email addresses at haveibeenpwned.com and it will tell you what was all was leaked. eye4fraud was likely a fraud credentials hosting site that got hacked and leaked, and yours was in there, and it would have come from a previous leak.

[–] [email protected] 25 points 1 year ago* (last edited 1 year ago)

Group of accounts set up webcams outside of busy public restrooms. Records people's faces as they exit the bathroom and how long they were in there. Auto-ID's and sends email asking as part of a public poll if they agree with the statement "If you have nothing to hide you have nothing to fear"

N: auto erase image and associated data

Y: auto publish bathroom exiting face and time spent in restroom to tiktok.

Let's really get the privacy conversation started.

We can call it Operation Feardrop

[–] [email protected] 6 points 1 year ago* (last edited 1 year ago)

This explains the 4 different "Hey! I got your number at the XX meetup." and "Hey, let's go play golf tomorrow!" type texts ove gotten this week. Trying to validate info.

EDIT: RTFA (says to myself)... this just makes it harder for shell companies to setup shop in the US and get blocks of US numbers to make VOIP calls/texts from. Someone will at least be held accountable, so they have to burn people (in jail) or get fined etc in their home country.

[–] [email protected] 5 points 1 year ago (1 children)

Well it is Australia, have you seen their drug prices?

I bet they counted the cost of the porn too. Special collectors edition DVD box sets, of course.

view more: ‹ prev next ›