this post was submitted on 07 May 2024
520 points (94.5% liked)

Technology

59223 readers
3147 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 0 points 6 months ago* (last edited 6 months ago) (1 children)

Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.

[–] [email protected] 3 points 6 months ago (1 children)

Well not exactly. They might be reading the metadata of your lower level packages.

Unless you're not using encryption, then wth are you even doing?

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago) (1 children)

You forget the nsa, interpol. I remember back in the 90s there was a blurb about hackers sniffing packets and using that data to hack those systems. Gotta remember back then everyone had more open ports than shanghai

[–] [email protected] 5 points 6 months ago (1 children)

I mean yeah, maybe? Are you one of the people that believes aes or ecc has a backdoor? I think we'd know by now, and I'm certain they don't have the compute to break aes256.

[–] [email protected] -1 points 6 months ago (1 children)

Keep believing that. Just because all those ports are closed to you and me is no guaratee that theyre not being keyed for them

[–] [email protected] 2 points 6 months ago (1 children)

Yeah sure. There is no perfect security, but your paranoia is not only impractical but conspiratory.

[–] [email protected] 1 points 6 months ago

Im not paranoid about anything. I merely read what gets published and sift out the trash

[–] [email protected] 50 points 6 months ago* (last edited 6 months ago) (2 children)

As much as some of us may dislike it when a company does these kinds of things. You can't really blame them for following the laws of the country that they are headquartered in.

You can blame them for operating there to begin with in cases like Apple in China, but you could hardly blame them for following the laws of the US where they are headquartered for example.

If the law of the land where the headquarters is requires them to give up the data they do have to partner nations then they don't really have much choice in the long run if they want to continue to exist.

[–] [email protected] 17 points 6 months ago

"Nobody's going to jail for you" is pretty much the way to think about any cloud privacy service. They may not keep logs unless they're required to, but in the end, they will comply to stay in business.

[–] [email protected] 25 points 6 months ago* (last edited 6 months ago)

Plus there isn't many jurisdictions with stronger privacy law than the swiss. It is unlike they made a bad choice for choosing a headquarters.

I guess they can operate on the public sea or the arctic, but I imagine the commute will be terrible.

[–] [email protected] 36 points 6 months ago (2 children)

If you use ANYTHING other than face to face meetings when discussing something illegal, you get what you deserve.

[–] [email protected] -2 points 6 months ago (1 children)

Or use WhatsApp like most of criminals

[–] [email protected] 7 points 6 months ago* (last edited 6 months ago)

it's compromised (explicitly part of PRISM). nice try FBI shill

[–] [email protected] 36 points 6 months ago

Although I like the idea of a drug smuggler typing "as per my previous email..."

load more comments
view more: next ›