soloActivist

joined 1 year ago
[–] [email protected] 0 points 2 weeks ago* (last edited 2 weeks ago)

There are many stakeholders with much to gain from the mass collection of data

Right but they need our permission because they want to hold on to power. This is what Snowden covers when he talks about cover for action w.r.t. surveillance programs. They need the anti-terror excuse. They rely on it. Where does that excuse come from? This article covers it well.

It’s not that long of a read. But I thought this was a gem worth quoting here:

One of the senators, Russ Feingold, said during the debate preceding the vote on this law [US Patriot Act]:

"There's no doubt that if we lived in a police state, it would be easier to catch terrorists. If we lived in a country where the police were allowed to search your home at any time and for any reason, if we lived in a country where the government had the right to open your mail, listen to your phone conversations or intercept your e-mail communications... the government would probably discover and arrest more terrorists, or would-be terrorists, than in the past. But it would not be a country we would want to live in."

He was not listened to by his colleagues, and was the only senator not to vote for the PATRIOT Act

I should also mention he was a democrat (not relevant to the point, but noteworthy nonetheless).

This is not to dismiss what you’ve said. But the “unthinking masses uncritically accepting the convenience” will be under the influence of the idea that anti-terror justifies it. A forced-banking policy will acquire the 55-65% you mention under that premise. The convenience of electronic payment is just the lubrication that will demotivate resistance. In fact I suspect we already have a majority believing the anti-terror narrative both as justification and the effectiveness of it.

0
submitted 2 weeks ago* (last edited 2 weeks ago) by [email protected] to c/[email protected]
 

The unwarranted surveillance policies that get enshrined into law and all the illegal snooping by the gov seems to trace to anti-terror legislation and anti-terror backroom initiatives. I have to wonder, is this all attributed to Israel? If the US and other Israel allies had quit supporting Israel during their oppression of Palestinians, would there be a notable terror threat that could then be the cause for action (for unwarranted snooping) under the anti-terror façade?

Is this why we will lose cash in the future?

Have any privacy orgs calculated how many terror incidents stem from Israel? This could even count the white supremacist nutters who attack mosques in retaliation.

[–] [email protected] 0 points 1 month ago (4 children)

I was trying to recall where I read about that. Search is terrible. Took some digging but found it here:

https://mander.xyz/post/18090719

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago)

There is no public ledger for cash. There is no attack surface on the devices of yourself or the other party by which your cash transaction can be compromised. There are no electronic records to exfiltrate unless one party proactively deliberately records a transaction. And if they do, there is no non-repudiation. There is no risk that any cryptanalytic advances can later expose the whole history of all cash transactions or even a chain of cash transactions. Cash transactions leave no trace unless you do them under surveillance.

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago) (1 children)

I don’t quite recall the context I had in mind when I wrote that post 1 year ago, but Belgium (for example) has enacted a law that all suppliers must accept electronic payment. It’s not just shops or b2b situations. It all-encompassing including self-employed freelancers. Even someone who rents part of their home out must give the tenant the option to pay electronically.

Many water and utility companies refuse cash. So if you consider the right to housing to include a right to water and power, then those consumers are being forced to use a bank. But that’s not apparently government force.

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago) (2 children)

Where is this? I think if he is in China or Europe he would already be excluded from society to some extent. But I don’t believe it would be a problem in the US (of course neglecting obscure cases like that of the Georgia attorney general).

There are so few of us without smartphones that are updated Google/Apple attached and subscribed that we should be collecting the stories of exclusion somewhere.

(edit) I take back what I said about the US. I just remembered a patient who was denied medical care in the US because he did not go to the Google Playstore to install the app of the hospital.

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago)

That link is unreachable from secure networks (tor). I can’t quite work out if you’re talking about a digital national passport, or a COVID “passport”. I suspect you mean the former.

I see no problem with border control forcing people to present a passport (or particular form thereof) if they have one. But a citizen is (or should be) absolutely entitled to enter their country, full stop. If they have no documentation at all, it would be an abuse of their rights to deny them entry on that basis. We might expect a citizen without docs to face a long inconvenient process to verify their citizenship, but it’d be a perverse injustice to deny them entry. IMO a passport should be a convenience, not a requirement.

I recall either Australia or NZ was refusing entry of their own well documented citizens if either they had COVID or were unvaccinated (I forgot which). Regardless of their COVID situation there is no good reason for denying a citizen entry. It dilutes the purpose and meaning of citizenship. Anyway, this is why I cannot be sure what passport you’re talking about.

[–] [email protected] 0 points 1 month ago

I think the common term for “internet-izing” is #digitalTransformation. That’s the language used in the EU as they enact policy that ultimately cattle-herds people into a forced digital transformation. The quasi antithesis of that which wiser people support would be:

  • right to be offline
  • right to be analog
  • right to unplug

I kind of favor right to be analog because it also somewhat implies a right to cash and to be unbanked.

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago) (3 children)

Indeed in Netherlands I already encountered an e-receipt-only fiasco at a cafe. They forced me to order and pay by app as a cloud order (no cash.. no paper menu either). I had a degoogled phone so I could not do Playstore and their captive portal did not work on my phone anyway. So a staff member had to lend me their phone just to be able to order. Then the order was trapped in their account. The receipt becomes more important when paying by card so I can check it against the bank statement later. They had no printer. Only e-receipts. And their app could not handle entering another email address than what the staff member already entered for their own account -- assuming I were even willing to give them a (disposable) address as I oppose feeding Google on general principle and their email provider was Google. They could not handle pulling out a notebook and writing out a receipt.

Throughout the whole fiasco the staff must have been wondering “what’s wrong with this person? How can someone be walking around in public without a recent smartphone and all the Google services?” Probably wondered if I was part of an organised crime gang.

I’m also excluded from my public library’s Wi-Fi for not carrying a subscribed SMS-capable phone to get past the captive portal. So WTF, to get wi-fi service (financed with public money) you must already be equipped with tools that are generally redundant with wi-fi to begin with. They seem to be excluding the people who would need wi-fi the most from wi-fi service.

 

All links for this story are shit -- Cloudflare or paywalls. So I linked the archive and will dump the text below. Note the difference between my title and the original. I think mine is may be more accurate. The AG seems to view feature phones as a tool for criminals.


Georgia AG claims not having a phone makes you a criminal

That’s dangerous for constitutional rights
SAMANTHA HAMILTON
FEBRUARY 12, 2024 6:52 PM

The ubiquity of smartphones is causing some to pine for simpler times, when we didn’t have the entire history of humankind’s knowledge at our fingertips on devices that tracked our every move. There’s a growing trend, particularly among young people, to use non-smartphones, or “basic phones.” The reasons range from aesthetic to financial to concern for mental health. But according to Georgia Attorney General Chris Carr, having a basic phone, or a phone with no data on it, or no phone at all in the year 2024, is evidence of criminal intent. The AG’s position poses grave dangers for all Georgians’ constitutional rights.

Last month, Deputy Attorney General John Fowler argued in state court that mere possession of a basic cellphone indicates criminal intent to commit conspiracy under Georgia’s racketeer influenced and corrupt organizations statute, better known as RICO.

His accusation was directed at 19-year-old Ayla King, one of 61 people indicted last summer on RICO charges linked to protests in the South River Forest where the $109 million Atlanta Public Safety Training Center, nicknamed “Cop City” by its opponents, is slated to be built. The RICO charges against King and the 60 other RICO defendants have been widely criticized as a political prosecution running contrary to the First Amendment. King is the first of these defendants to stand trial.

During the Jan. 8 hearing in Fulton County Superior Court, Fowler argued that a cellphone in King’s possession on the day of their arrest, which he characterized as a “burner phone,” should be admissible as evidence of wrongdoing, even though it contained no data. He went even further to suggest that not possessing a cellphone at all also indicates criminal intent. Judge Kimberly Adams agreed to admit evidence of King’s cellphone.

Civil liberty groups are decrying the AG’s argument and court’s action as violations of constitutional rights under the First Amendment and Fourth Amendment. In an open letter to Attorney General Carr, the groups wrote, “It is alarming that prosecutors sworn to uphold the Constitution would even make such arguments—let alone that a sitting judge would seriously entertain them, and allow a phone to be searched and potentially admitted into evidence without any indication that it was used for illegal purposes.”

The Supreme Court recognized in the 2014 case Riley v. California that cellphones carry enough personal information—photos, text messages, calendar entries, internet history, and more—to reconstruct a person’s life using smartphone data alone. “Prior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day,” the Court noted. “Now it is the person who is not carrying a cellphone, with all that it contains, who is the exception.”

On the dark side of smartphones’ interconnectivity is their susceptibility to surveillance. In 2022, it was reported that the U.S. Department of Justice had purchased for testing a version of the Phantom spyware from NSO Group, an Israeli firm which sold its surveillance technology to governments like Mexico and Saudi Arabia to spy on journalists and political dissidents. Phantom could be used to hack into the encrypted data of any smartphone located anywhere in the world, without the hacker ever touching the phone and without the phone’s user ever knowing. The U.S. federal government denied using Phantom in any criminal investigation, but concerns about surveillance in the U.S. have led some folks to obtain basic phones.

Flip phones have made a comeback, and the potential for invasion of privacy is one of the reasons why. I’m not talking about the recent wave of smartphones that flip open. I’m talking about early 2000s-era basic phones, whose smartest feature was the game Snake or, if you were lucky, the ability to set your favorite song as your ringtone.

Folks are returning to basic phones—or in the case of Gen Z, turning for the first time—out of recognition that doom scrolling on a smartphone for hours each day is not good for mental health. For some older adults, basic phones, which offer few features beyond calling and texting, are preferable to smartphones for their simplicity. There are lots of reasons why someone might have a basic phone—not to mention they’re cheaper and more durable than a lot of smartphones.

Using simple phones that have little data on them is a legitimate, and common, practice for journalists, whistleblowers, human rights activists, and other people seeking to protect their identities or those of others from surveillance by the government or malicious actors. The Committee to Protect Journalists recommends that journalists cycle through “low-cost burner phones every few months” to maintain their safety and that of their sources. Even athletes competing in the 2022 Beijing Olympics were advised to use burner phones in light of the overreaching state surveillance in China.

Using a burner phone is not evidence of criminal intent—it’s a reasonable response to the threat of surveillance and government overreach. While burner phones are not immune from location tracking via cell towers, the fact that they contain much less data than a smartphone can make them a more secure form of communication.

How deeply invasive of privacy rights will the AG’s logic extend? Will the prosecution argue that using a virtual private network (VPN) is evidence of criminal intent? What about communicating via encrypted messaging apps, like Signal? The First Amendment protects the right to anonymous speech, and the use of privacy protection measures like VPNs and Signal has become commonplace in today’s world. The AG has already asserted in the RICO indictment that anonymous speech communicated online constitutes a conspiracy, but if the AG argues that using VPNs and Signal is evidence of criminal intent, he would be going even further by claiming that the very tools which make people feel safe to communicate online are themselves evidence of criminal intent, thereby assuming criminality before the speech has even taken place.

The position the AG has taken in Ayla King’s case has the potential to make all of us suspects. If you have a smartphone with data on it, the information on the phone can be used as evidence against you. And if you have a phone with no data on it or no phone at all, that can be used as evidence against you.

The state’s use of the absence of evidence as affirmative evidence is an unsettling development, and one that seems desperate. Is it—and perhaps the RICO charges themselves—a sign of prosecutorial weakness in a case intended to silence criticism and criminalize First Amendment expression?

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago) (2 children)

Not sure what your point is. Monero is far more traceable than cash. Any self-respecting privacy advocate would fight against the war on cash first and foremost. Anything else is less important to fight for because it’s less private. When cash is gone, gold coins will probably be more private than Monero.

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago)

If you try bringing 100k in cash to buy a car/house, there is a good chance it’ll get seized by police.

In the US debtors are /entitled/ to pay their debts using legal tender, and mortgages are not excluded AFAIK. In the UK, you can legally pay your mortgage with legal tender.

if you use a cell phone they know what store you went into. That can be combined with other metadata to know exactly what you’re doing. Carrying cash does not fix this.

You need not carry a mobile phone. I don’t. Cash is part of that equation. If I walk into an unsurveilled shop with cash, no phone, and no loyalty card to buy liquor, how does that get pinned on me?

It could become criminal in the future to not carry a smartphone (with the direction things are going in), but that’s not yet the case in most of the world.

[–] [email protected] 0 points 1 month ago* (last edited 1 month ago) (6 children)

mander.xyz has this:

mandermybrewn3sll4kptj2ubeyuiujz6felbaanzj3ympcrlykfs2id.onion

but it’s a disaster. Data loss. Posts go into a black hole. Use it on a read-only basis.

[–] [email protected] 0 points 2 months ago

To reach the particular law office which has become a specialist in this particular case, yes you are trapped because they use MS Outlook. There is no way to exchange email with them without involving MS.

Victims can use any lawyer, but any other lawyer will need to research the case (at the victim’s cost).

 

cross-posted from: https://links.hackliberty.org/post/2667522

Apparently some company I do business with shared my data with another corp without me knowing, then that corp who I did not know had my data was breached.

WTF?

Then the breached corp who could not competently secure the data in the first place offers victims a gratis credit monitoring services (read: offers to let yet another dodgy corp also have people’s sensitive info thus creating yet another breach point). Then the service they hired as a “benefit” to victims outsources to another corp and breach point: Cloudflare.

WTF?

So to be clear, the biggest privacy abuser on the web is being used to MitM a sensitive channel between a breach victim and a credit monitoring service who uses a configuration that blocks tor (thus neglecting data minimization and forcing data breach victims to reveal even more sensitive info to two more corporate actors, one of whom has proven to be untrustworthy with private info).

I am now waiting for someone to say “smile for the camera, you’ve been punk’d!”.

 

Apparently some company I do business with shared my data with another corp without me knowing,

WTF?

then that corp who I did not know had my data was breached.

WTF?

Then the breached corp who could not competently secure the data in the first place offers victims gratis credit monitoring services (read: offers to let yet another dodgy corp also have people’s sensitive info thus creating yet another breach point). Then the service they hired as a “benefit” to victims outsources to another corp and breach point: Cloudflare.

WTF?

So to be clear, the biggest privacy abuser on the web is being used to MitM a sensitive channel between a breach victim and a credit monitoring service who uses a configuration that blocks tor (thus neglecting data minimization and forcing data breach victims to reveal even more sensitive info to two more corporate actors, one of whom has proven to be untrustworthy with private info).

I am now waiting for someone to say “smile for the camera, you’ve been punk’d!”.

(update)
Then the lawyers representing data breach victims want you to give them your e-mail address so they can put Microsoft Outlook in the loop. WTF? The shit show of incompetence has no limit.

(update 2)
It’s interesting to note that the FTC as well as a data breach lawyer both recommend that data breach victims take advantage of the free credit monitoring. I’m a bit surprised. As much as I want to cause the breached company to incur a cost for that subscription, it seems like a foolish move to put my sensitive info in the hands of yet another dodgy 3rd party.

 

The link is Cloudflare-free, popup-free and reachable to Tor users.

 

I normally grab a #youtube video via #invidious onion instances this way:

yt-dlp --proxy http://127.0.0.1:8118 -f 18 http://ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion/watch?v="$videoID"

Now it leads to:

ERROR: [youtube] $videoID: Sign in to confirm you’re not a bot. This helps protect our community. Learn more

There used to be a huge number of Invidious instances. Now the official list is down to like ½ dozen.

 

This email provider gives onion email addresses:

pflujznptk5lmuf6xwadfqy6nffykdvahfbljh7liljailjbxrgvhfid.onion

Take care when creating the username to pull down the domain list and choose the onion domain. That address you get can then be used to receive messages. Unlike other onion email providers, this is possibly the only provider who offers addresses with no clearnet variations. So if a recipient figures out the clearnet domain it apparently cannot be used to reach you. This forces Google and MS out of the loop.

It’s narrowly useful for some situations where you are forced to provide an email address against your will (which is increasingly a problem with European governments). Though of course there are situations where it will not work, such as if it’s a part of a procedure that requires confirmation codes.

Warning: be wary of the fact that this ESP’s clearnet site is on Cloudflare. Just don’t use the clearnet site and keep CF out of the loop.

0
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/[email protected]
 

I have lots of whistles to blow. Things where if I expose them then the report itself will be instantly attributable to me by insiders who can correlate details. That’s often worth the risks if the corporate baddy who can ID the whistle blower is in a GDPR region (they have to keep it to themselves.. cannot doxx in the EU, Brazil, or California, IIUC).

But risk heightens when many such reports are attributable under the same handle. Defensive corps can learn more about their adversary (me) through reports against other shitty corps due to the aggregation under one handle.

So each report should really be under a unique one-time-use handle (or no handle at all). Lemmy nodes have made it increasingly painful to create burner accounts (CAPTCHA, interviews, fussy email domain criteria, waiting for approval followed by denial). It’s understandable that unpaid charitable admins need to resist abusers.

Couldn’t this be solved by allowing anonymous posts? The anonymous post would be untrusted and hidden from normal view. Something like Spamassassin could score it. If the score is favorable enough it could go to a moderation queue where a registered account (not just mods) could vote it up or down if the account has a certain reputation level, so that an anonymous msg could then possibly reach a point of general publication.

It could even be someone up voting their own msg. E.g. if soloActivist is has established a history of civil conduct and thus have a reputation fit for voting, soloActivist could rightfully vote on their own anonymous posts that were submitted when logged-out. The (pseudo)anonymous posts would only be attributable to soloActivist by the admin (I think).

A spammer blasting their firehose of sewage could be mitigated by a tar pit -- one msg at a time policy, so you cannot submit an anonymous msg until SA finishes scoring the previous msg. SA could be artificially slowed down as volume increases.

 

(cross-posting is broken on links.hackliberty.org, so the following is manually copied from the original post)


When your bank/CU/brokerage demands that you login to their portal to update KYC info soloActivist to [email protected] ·

In the past I have only seen PayPal spontaneously demand at arbitrary/unexpected moments that I jump their their hoops -- to login and give them more info about me. I reluctantly did what they wanted, and they kept my account frozen and kept my money anyway.

So I’ve been boycotting PayPal ever since. Not worth it for to work hard to find out why they kept my account frozen and to work hard to twist their arm to so that I can give them my business.

Now an actual financial institution is trying something similar. They are not as hostile as PayPal was (they did not pre-emptively freeze my account until I dance for them), but they sent an email demanding that I login and update my employment information (even though it has not changed). Presumably they will eventually freeze my account if I do not dance for them to satisfy their spontaneous demand.

I just wonder how many FIs are pulling this shit. And what are people doing about it? Normally I would walk.. pull my money out and go elsewhere. But the FI that is pushing KYC harassment has a lot of power because they offer some features I need that I cannot get elsewhere, and I have some stocks through them, which makes it costly/non-trivial to bounce.

I feel like we should be keeping a public database on FIs who pull this shit, so new customers can be made aware of who to avoid.

1
submitted 10 months ago* (last edited 10 months ago) by [email protected] to c/[email protected]
 

There is a common theme pushed by fanatics of capitalism that never dies: that a profit-driven commercial project ensures higher quality products than products under non-profit projects. Some hard-right people I know never miss the chance to use the phrase “good enough for government work” to convey this idea.

I’m not looking to preach to the choir here, but rather to establish a thread of scenarios that correspond to quality for the purpose of countering inaccurate narratives. This is the thread to share your stories.

In my day job I’m paid to write code. Then I go home write code I was not paid for. My best work is done without pay.

Commercial software development

When I have to satisfy an employer, they don’t want quality code. They want fast code. They want band-aid fixes. The corporate structure is too myopic to optimize for quality.

Anti-gold-plating:I was once back-roomed by a manager and lectured for “gold plating”. That means I was producing code that was higher quality than what management perceives as economically optimal.

Bug fixes hindered:I was caught fixing some bugs conveniently as I spotted them when I happened to have a piece of code checked out in Clearcase. I was told I was “cheating the company out of profits” because they prefer if the bugs each go through a documentation procedure so the customer can ultimately be made to pay separately for the bug fix. Nevermind the fact that my time was already charged anyway (but they can get more money if there’s a bigger paper trail involving more staff). This contrasts with the “you get what you pay for” narrative since money is diverted to busy work (IOW: working hard, not smart).

Bugs added for “consistent quality”:One employer was so insistent on “consistent quality” that when one module was higher quality than another, they insisted on lowering the quality of the better module because improving the style or design pattern of the lower quality piece would be “gold plating”. This meant injecting bugs to achieve consistency. The bugs were non-serious varieties; more along the lines of needless complexity, reduced performance, coding standard non-compliances, etc, but nonetheless something that could potentially be charged to the customer to fix.

Syntactic dumbing-down:When making full use of the language constructs (as intended by the language designers), I am often forced by an employer to use a more basic subset of constructs. Employers are concerned that junior engineers or early senior engineers who might have to maintain my code will encounter language constructs that are less common and it will slow them down to have to look up the syntax they encounter. Managers assume that future devs will not fully know the language they are working in. IMO employers under-estimate the value of developers learning on the job. So I am often forced avoid using the more advanced constructs to accommodate some subset of perceived lowest common denominator. E.g. if I were to use an array in bash, an employer might object because some bash maintainers may not be familiar with an array.

Non-commercial software development

Free software developers have zero schedule pressure. They are not forced to haphazardly rush some sloppy work into an integration in order to meet a deadline that was promised to a customer by a manager who was pressured to give an overly optimistic timeline due to a competitive bidding process. #FOSS devs are free to gold-plate all they want. And because it’s a labor of love and not labor for a paycheck, FOSS devs naturally take more pride in their work.

I’m often not proud of the commercial software I was forced to write by a corporation fixated on the bottom line. When I’m consistently pressured to write poor quality code for a profit-driven project, I hit a breaking point and leave the company. I’ve left 3 employers for this reason.

Commercial software from a user PoV

Whenever I encounter a bug in commercial software there is almost never a publicly accessible bug tracker and it’s rare that the vendor has the slightest interest in passing along my bug report to the devs. The devs are unreachable by design (cost!). I’m just one user so my UX is unimportant. Obviously when I cannot even communicate a bug to a commercial vendor, I am wholly at the mercy of their testers eventually rediscovering the same bug I found, which is unlikely in complex circumstances.

Non-commercial software from a user PoV

Almost every FOSS app has a bug tracker, forum, or IRC channel where bugs can be reported and treated. I once wrote a feature request whereby the unpaid FOSS developer implemented my feature request and sent me a patch the same day I reported it. It was the best service I ever encountered and certainly impossible in the COTS software world for anyone who is not a multi-millionaire.

1
submitted 11 months ago* (last edited 11 months ago) by [email protected] to c/[email protected]
 

cross-posted from: https://links.hackliberty.org/post/609883

This BBC interview has a #Cloudflare rep David Bellson who describes CF’s observations on internet traffic. CF tracks for example the popularity of Facebook vs. Tiktok. Neither of those services are Cloudflared, so how is CF tracking this? Apparently they are snooping on traffic that traverses their servers to record what people are talking about. Or is there a more legit way Cloudflare could be monitoring this activity?

view more: next ›