• 16 Posts
  • 395 Comments
Joined 1 year ago
cake
Cake day: July 23rd, 2023

help-circle




  • 2FA is great. It’s the best tool there is against impersonation and account takeovers.

    But it’s only great PROVIDED

    1. It’s a real, proper second factor like a hardware token or - less great but okay - a “secure” cellphone app. When it’s a totally insecure factor like SMS, 1FA is preferable.
    2. It’s not such a PITA that you hate using it.
    3. When it’s a proprietary app from one of the big data sonsabitches, it’s also an app to spy on you and your activities.




  • The TOR network itself is safe - at least assuming the TLAs don’t control at least half of the nodes, which is far from impossible. But let’s assume…

    The weak point comes from the browser: that’s how the fuzz deanonymizes users. The only safe browser to use on TOR is the TOR browser, and that’s the problem: it disables so many unsafe functionalities that it’s essentially unusable on a lot of websites. So people use regular browsers over TOR, the browser leaks identifying data and that’s how they get caught.


  • Here’s a little story that shows how much society has become dystopian:

    Back in the 90’s, I worked in France for a while. When I was there, a case was brought up against the state that had violated a CNIL rule: some dude was cheating on his taxes by claiming he lived at some address. Tthe French fiscal administration sued him because they obtained a file from the electricity company and another from the water utilty company showing that the consumption of both electricity and water were so low it wasn’t consistent with the dude actually living there.

    The case was thrown out, the dude walked and the state was fined because it had violated a rule that clearly stipulated cross-referencing files for the purpose of extracting secondary information that wasn’t available in each single file was a violation of privacy and civil liberties.

    I shit you not. This used to be a thing.

    Can you imagine this today? All the Big Data sonsabitches cross-reference billions of files ALL THE TIME and nobody bats an eyelid anymore.

    If you’re old enough, you remember sovereign states taking privacy seriously. If you’re not, you don’t. And that’s how Big Data gets away with what they do today because fewer and fewer people remember a time when it was unacceptable.






  • What if you don’t want a Pixel? Or a Fairphone? Or one of the very, VERY few cellphones that you can install a deGoogled OS on?

    There are precious few ways of escaping the Google monopoly. I own a Fairphone running CalyxOS, and it happens to be the phone I want because of its excellent repairability. So lucky me. But if I didn’t want a Fairphone, nor any Samsung phone, nor any Chinese cellphone, and certainly not a fucking Google phone - because I’d rather cut off my left nut than give Google money to escape Google’s surveillance, that’s just too rich for me - then I’d be SOL.

    My point is, if you refuse to be Google’s bitch, Google backs you into a corner. Just because you’re happy with the corner doesn’t mean you’re not stuck in a corner.