coffeeClean

joined 1 year ago
[–] [email protected] -3 points 6 months ago* (last edited 6 months ago)

The wifi is for public use. The Ethernet isn’t. How is that so hard to understand?

How is it hard to understand that those two undisputed facts are actually a crucial part of my thesis? Of course I understand it because it’s the cause for the problems I described and my premise. It’s why this thread exists.

If that weren’t the case, the only notable problem would be with the mobile phone precondition on captive portals.

[–] [email protected] -2 points 6 months ago* (last edited 6 months ago)

Time to wake up to reality. Everyone has access, the method of access isn’t discriminating, nor do you have any say in it.

That’s not reality. The reality is everyone has partial access (Firefox on a shared Windows PC only), while some people have full access via both public resources.

If you want to gain anything from this conversation, try to at least come to terms with the idea that Firefox is not the internet. The internet is so much more than that. Your experience and information is being limited by your perception that everything that happens in a browser encompasses the internet.

In other words, it’s public, free for all, and the way they set it up.

It’s not free. We paid tax to finance this. The moment you call it free you accept maladministration that you actually paid for.

If you don’t like the free service, don’t use it. It not being how you like it isn’t wrong in any way, that’s your problem.

You’re confusing the private sector with the public sector. In the private sector, indeed you simply don’t use the service and that’s a fair enough remedy. Financing public service is not optional. You still seem to not grasp how human rights works, who it protects, despite the simplicity of the language of Article 21.

[–] [email protected] -5 points 6 months ago* (last edited 6 months ago) (1 children)

Could I be in the wrong? No, it must be literally everyone else in this entire thread / national library network.

Is your position so weak that you need to resort to a bandwagon fallacy?

Grow up.

and an ad hominem?

You demonstrate being a grown up by avoiding ad hominems in favor of logically sound reasoning.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago)

Their terms require a phone so yes, on their terms.

I keep a copy of everything I sign. The ToS I signed on one library do not require a mobile phone. It’s an ad hoc implementation that was certainly not thought out to the extent of mirroring the demand for a mobile phone number into the agreement. And since it’s not in the agreement, this unwritten policy likely evaded the lawyer’s eyes (who likely drafted or reviewed the ToS).

Why would they make an exception for anyone?

Because their charter is not: “to provide internet service exclusively for residents who have mobile phones”.

And why would they want to deal with paper agreements for WiFi?

Paper agreements:

  • do not discriminate (you cannot be a party to a captive portal agreement that you cannot reach)
  • are more likely to actually be read (almost no one reads a tickbox agreement)
  • inherently (or at least easily) give the non-drafting party a copy of the agreement for their records. A large volume of text on a tiny screen is unlikely to even be opened and even less likely to save it. Not having a personal copy reduces the chance of adherence to the terms.
  • provide a higher standard of evidence whenever the agreement is litigated over

You don’t have to be a member to use WiFi, someone else could have given you the password if there even is one

That’s not how it works. The captive portal demands a phone number. After supplying it, an SMS verification code is sent. It’s bizarre that you would suggest asking a stranger in a library for their login info. In the case at hand, someone would have to share their mobile number, and then worry that something naughty would be done under their phone number, and possibly also put that other person at risk for helping someone circumvent the authentication (which also could be easily detected when the same phone number is used for two parallel sessions).

If someone is doing something illegal it’s gonna involve the library if you get caught (that’s why the phone number but maybe they are just being shitty with it). Not worth the risk.

Exactly what makes it awkward to ask someone else to use their phone.

[–] [email protected] -2 points 6 months ago* (last edited 6 months ago) (1 children)

You have, throughout your comments, repeatedly spoken down toward librarians and libraries.

Again, you’re not quoting. You’ve already been told it’s not the case. You need to quote. You replied to the wrong message.

but you’re certainly not painting them as “trying their best”

There are many librarians with varying degrees of motivation. I spoke to one yesterday that genuinely made an effort to the best of their ability. I cannot say the same for all librarians. When I describe a problem of being unable to connect, some librarians cannot be bothered to reach out to tech support, or even so much as report upstream that someone was unable to connect.

“worth having an adult conversation with instead of misrepresenting my situation intentionally”

This is a matter of being able to read people. I don’t just bluntly blurt out a request. I start the conversation with baby steps (borderline small talk) describing the issue to assess from their words, mood, and body language the degree to which they are likely to be accommodating whatever request I am building up to. Different people get a different conversation depending on the vibe I get from them. Even the day of week is a factor. People tend to be in their best mood on Fridays and far from that on Mondays.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago) (3 children)

You’ll have to quote me on that because I do not recall calling them baddies. I have spotlighted an irresponsible policy and flawed implementation. It’s more likely a competency issue and unlikely a case of malice (as it’s unclear whether the administration is even aware that they are excluding people).

If they are knowingly and willfully discriminating against people without mobile phones, then it could be malice. But we don’t know that so they of course have the benefit of any doubt. They likely operate on the erroneous assumption that every single patron has a mobile phone and functional wifi.

[–] [email protected] -2 points 6 months ago* (last edited 6 months ago)

I have to say I didn’t downvote you as you’ve been civil and informative so far. But I’m not sure how to cite/quote from the UDHR as though it’s not law. I named the article and pasted the text. For me whether the enforcement machinery is in force doesn’t matter w.r.t to the merits of the discussion. From where I sit, many nations signed the UDHR because it has a baseline of principles worthy of being held in high regard. When the principles are violated outside the context of an enforcement body, the relevance of legal actionability is a separate matter. We are in a forum where we can say: here is a great idea for how to treat human beings with dignity and equality, and here that principle is being violated. There is no court in the loop. Finger wagging manifests from public support and that energy can make corrections in countless ways. Even direct consumer actions like boycotts. Israel is not being held to account for Gaza but people are boycotting Israel.

I guess I’m not grasping your thesis. Are you saying that if a solidly codified national law was not breached, then it’s not worthwhile to spotlight acts that undermine the UDHR principles we hold in high regard?

[–] [email protected] -5 points 6 months ago* (last edited 6 months ago) (2 children)

You can’t claim shit about equality for all and access without materials, when discussing byod. Make up your mind.

There is PC access, and then there is byod access. It’s a false dichotomy to demand choosing one or the other particularly when only one of the two is available to everyone, and harmful to people’s rights if you simultaneously design a system of workflow on the assumption that one replaces the other interchangeably.

They are different services for different purposes. Don’t let the fact that some tasks can be achieved with both services cloud the fact that some use-cases cannot.

Everyone has access

Everyone has access to a PC running Firefox. Not everyone has BYoD WAN service access.

byod is covered for 99% as extra convenience.

Firefox is not the internet.

It’s not just convenience. It’s the capability and empowerment of controlling your own applications. If the public PC doesn’t have a screen reader and you are blind, the public PC is no good to you and you are better served with BYoD service. If you need to reach someone on Briar, a Windows PC with only Firefox will not work.

You aren’t being treated poorly, instead, you have unreasonable expectations.

This remains to be supported. I do not believe it’s reasonable to only serve people with mobile phones. Thus I consider it a reasonable expectation that people without a subscribed mobile phone still get BYoD WAN service.

Data persists both in the cloud, or on a memory stick. Free options exist.

None of the PCs in any library I have used will execute apps that you bring on a USB stick (but even if they did, the app you need to run may not be compatible with Windows). Also some library branches disallow USB sticks entirely. So a restricted Windows PC cannot replace controlling your own platform, regardless of the convenience factor.

(edit) But strictly about convenience, I also would not say it’s fair for a public service to offer extra convenience exclusively to people who have a subscribed mobile phone and not to those without one. That would still be unequal access even if you disregard the factors not related to convenience. It’s still discriminating against a protected class of people.

[–] [email protected] 0 points 6 months ago* (last edited 6 months ago) (2 children)

The UDHR is not a treaty, so it does not create any direct legal bindings.

Sure, but where are you going with this? Legal binding only matters in situations of legal action and orthogonal to its application in a discussion in a forum. Human rights violations are rampant and they rarely go to The Hague (though that frequency is increasing). Human rights law is symbolic and carries weight in the court of public opinion. Human rights law and violations thereof get penalized to some extent simply by widespread condemnation by the public. So of course it’s useful to spotlight HR violations in a pubic forum. It doesn’t require a court’s involvement.

The judge who presided over the merits of the Israel genocide situation explained this quite well in a recent interview. If you expect an international court to single-handedly remedy cases before it, your expectations are off. The international court renders judgements that are mostly symbolic. But it’s not useless. It’s just a small part of the overall role of international law.

The article you quote may have been excluded, overwritten or rephrased in your jurisdiction.

I doubt it. It’s been a while since I read the exemptions of the various rights but I do not recall any mods to Article 21. The modifications do not generally wholly exclude an article outright. They typically make some slight modification, such as some signatories limiting free assembly (Art.20 IIRC) to /safe/ gatherings so unsafe gatherings can be broken up. I would not expect to see libraries excluded from the provision that people are entitled to equal access to public services considering there is also Article 27:

“Everyone has the right freely to participate in the cultural life of the community, to enjoy the arts and to share in scientific advancement and its benefits.”

The European HR convocations take that even further iirc.

 

Images do not get mirrored from one Lemmy instance to another. Understandably so. But there is a harmful side effect: if SourceNode is behind an access-restricted walled-garden and an image from that node is cross-posted to a DestinationNode that is not inside the same access-restricted walled-garden, then some readers on DestinationNode see posts where the image is inaccessible.

All variants of walled gardens are can trigger this problem but the most common is Cloudflare. So posts that contain images coming from instances like sh.itjust.works and lemmy.world are exclusive and do not include all people who infosec.pub includes.

How can this be fixed?

  1. infosec.pub could defederate from all Cloudflare nodes. This would prevent CF pawns from pushing exclusive content onto infosec.pub, but infosec.pub users could probably still post links to the exclusive venues.
  2. infosec.pub could block just cross-posts from CF nodes that contain images.
  3. infosec.pub could mirror images when the image is in a known exclusive walled garden.
  4. infosec.pub could accept posts that contain images in walled gardens and then immediately hide those posts. Perhaps a bot could populate a community designated for exclusive walled gardens with links to hidden posts so users not excluded by the walled garden can still reach the content.

Some of those options might require changes to lemmy code.

4
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

cross-posted from: https://infosec.pub/post/9382315

I have had no problem using VOIP over #protonVPN until recently. Connections happen but there is no audio. Anyone notice this?

I wondered if maybe they decided to make VOIP a non-free feature, but their premium plans do not list VOIP as an extra feature.

 

This may be an instance-specific problem because I’ve had no problem editing posts on other instances. When I try to exit the title and body of this post, I click save (or whatever) and without error it behaves as if my change was accepted.

Most instances take a minute or two to re-render the screen to show my updates. If the wait is long, I sometimes do a hard refresh to make sure the change got accepted (and if I don’t do that and I do another update, the old content populates the form and causes the recent edit to be lost).

Anyway, with infosec.pub my edits on the above-mentioned post just take no effect, confirmed by a hard-refresh showing no change.

1
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

tested from tor. Also reported down by downinspector.com.

BTW, downinspector.com is the only Cloudflare-free service of its kind, but it’s notable that noscript reports XSS scripting attempts via Google.

(edit) it came back online yesterday.

 

I bought a Silicondust HD Homerun back before they put their website on Cloudflare. I love the design of having a tuner with a cat5 port, so the tuner can work with laptops and is not dependent on being installed into a PC.

But now that Silicondust is part of Cloudflare, I will no longer buy their products. I do not patronize Cloudflare patrons.

I would love to have a satellite tuner in a separate external box that:

  • tunes into free-to-air content
  • has a cat5 connection
  • is MythTV compatible

Any hardware suggestions other than #Silicondust?

#AskFedi

 

cross-posted from: https://infosec.pub/post/8863199

This post was composed with a link to a Wired article:

https://lemmy.ohaa.xyz/post/1939209

Then in a separate step, the article was edited and an image was uploaded. The URL of the local image unexpectedly replaced the URL of the article. Luckily I noticed the problem before losing track of the article URL.

 

cross-posted from: https://infosec.pub/post/8862635

“Only because of that official investigation did Canadians learn that ‘over 5 million nonconsenting Canadians’ were scanned into Cadillac Fairview's database”. Wow.

This Wired article is contradictory. The spokesperson says:

“an individual person cannot be identified using the technology in the machines. The technology acts as a motion sensor that detects faces, so the machine knows when to activate the purchasing interface”

I suppose it’s possible that a sloppy developer would name an executable Invenda.Vending.FacialRecognitionApp.exe which merely senses the presence of a face. But it seems like a baldfaced lie when you consider that:

“Invenda sales brochures that promised ‘the machines are capable of sending estimated ages and genders’ of every person who used the machines—without ever requesting consent.”

Boycott Mars


I already boycott Mars because they are a GMA member and they spend ~$½ million lobbying against #GMO labeling -- and they have been blackballed for using child slave labor -- and Mars supports Russia. This is another good reason to #boycottMars.

 

“Only because of that official investigation did Canadians learn that ‘over 5 million nonconsenting Canadians’ were scanned into Cadillac Fairview's database”. Wow.

This Wired article is contradictory. The spokesperson says:

“an individual person cannot be identified using the technology in the machines. The technology acts as a motion sensor that detects faces, so the machine knows when to activate the purchasing interface”

I suppose it’s possible that a sloppy developer would name an executable Invenda.Vending.FacialRecognitionApp.exe which merely senses the presence of a face. But it seems like a baldfaced lie when you consider that:

“Invenda sales brochures that promised ‘the machines are capable of sending estimated ages and genders’ of every person who used the machines—without ever requesting consent.”

Boycott Mars


I already boycott Mars because they are a GMA member and they spent ~$500k lobbying against #GMO labeling -- and they have been blackballed for using child slave labor -- and Mars supports Russia. This is another good reason to #boycottMars.

Update


Apparently a LemmyBug replaced the article URL with a picture URL. The article is here:

https://www.wired.com/story/facial-recognition-vending-machine-error-investigation/

The vending machine pic is here:

https://infosec.pub/pictrs/image/2041d717-7cd7-4393-94f3-96aa87817aa7.jpeg

1
submitted 9 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

The mamot.fr website and web client seems to be up for everyone. But for the past few days the #mamot.fr API for 3rd-party apps has been unreachable. Unverified: whether Tor is a factor. It would be interesting to hear from a non-Tor user if they can reach #MamotFR from a 3rd party app.

update


mamot.fr has been unreliable for 2 weeks now for API access as well as normal web access. It’s hit or miss. Sometimes it’s up, sometimes down, slow to load, and slow to login. I’m on Tor every time so it could be some kind of tor defensive move. Like tar-pitting. I guess at this point we should consider this problem permanent. It’s much less convenient to use now.

 

The following fedi instances are perpetually exclusive because they sit inside Cloudflare’s walled garden:

  • lemmy.world
  • sh.itjust.works
  • zerobytes.monster
  • lemmy·ca
  • lemm·ee
  • programming.dev
  • lemmy.zip

If you cannot reach these instances, there are many possible reasons:

  • you use a VPN
  • you use a browser Cloudflare discriminates against while also using Tor
  • you are using a public library PC
  • your ISP uses CGNAT to allocate your IP address (often in impoverished communities)
  • you have disabled image loading (because you are visually impaired, or you are on a capped uplink, or you are an environmentalist), which then triggers a false positive for being a robot.
  • you are a legitimate beneficial bot (Cloudflare treats beneficial bots the same as malicious bots)

The listed sites will rarely be down for everyone but will often be unavailable to those in the above mentioned discriminated demographics of people.

1
Did I fry my CPU? (infosec.pub)
submitted 10 months ago* (last edited 10 months ago) by [email protected] to c/[email protected]
 

I left the cover off a tower PC and walked away while it installed linux (yes, bad idea). The cover had the cpu fan mounted on it but the CPU also had a fan strapped on it. I don’t know if the CPU-mounted fan was running or if the machine was entirely dependent on the cover-mounted fan directly above the cpu.

Someone junked this PC (asus p5b) simply because it’s old (2007). Seems like a high-end gaming machine designed for overclocking. Strangely, when I returned to the machine to find it powered off, I felt the heatsink and it did not feel warm at all. Power supply is apparently fine because a green LED on the motherboard is lit. When I press the power-on button the HDD LED flashes for a split second but nothing happens.

I thought if CPUs get too hot there is a protection mechanism to force a power off. Was that the case in 2007? The manual mentions this:

CPU TM function [Enabled] Allows you to enable or disable the CPU internal thermal control function. In TM mode, the CPU power consumption is reduced. Configuration options: [Disabled] [Enabled]

Would that setting cause a protective shutdown? I don’t know how that was set.

 

I saw a PCMCIA IDE card at a flee market without the cable. That stopped me buying it because it’s unclear if I would be able to find the cable it needs. Obviously the drive end of the cable would be the 50-pin standard but what about the tiny connector that attaches to the PCMCIA card?

view more: ‹ prev next ›