this post was submitted on 27 Mar 2024
1 points (100.0% liked)

Technology

68910 readers
25 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Meta tried to gain a competitive advantage over its competitors, including Snapchat and later Amazon and YouTube, by analyzing the network traffic of how its users were interacting with Meta’s competitors. Given these apps’ use of encryption, Facebook needed to develop special technology to get around it.

Facebook’s engineers solution was to use Onavo, a VPN-like service that Facebook acquired in 2013. In 2019, Facebook shut down Onavo after a TechCrunch investigation revealed that Facebook had been secretly paying teenagers to use Onavo so the company could access all of their web activity.

After Zuckerberg’s email, the Onavo team took on the project and a month later proposed a solution: so-called kits that can be installed on iOS and Android that intercept traffic for specific subdomains, “allowing us to read what would otherwise be encrypted traffic so we can measure in-app usage,” read an email from July 2016. “This is a ‘man-in-the-middle’ approach.”

A man-in-the-middle attack — nowadays also called adversary-in-the-middle — is an attack where hackers intercept internet traffic flowing from one device to another over a network. When the network traffic is unencrypted, this type of attack allows the hackers to read the data inside, such as usernames, passwords, and other in-app activity.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 0 points 1 year ago (2 children)

And people want to let these parasites integrate into the fediverse

[–] [email protected] 1 points 1 year ago

honest question: why does it matter? all data in any fediverse project is public anyways

[–] [email protected] 0 points 1 year ago (2 children)

Please tell me what governing body exists for the fediverse that would let us deny them access?

[–] [email protected] 1 points 8 months ago

Diaspora allows for whitelisting visibility of posts to certain users(and servers.. depending on where users are hosted)

[–] [email protected] 0 points 1 year ago (1 children)

How is this a relevant question? Nobody said anything about some governing body. There have been discussions on many instances about whether to federate with them or not, and it’s accurate to say that some people think we should.

[–] [email protected] 0 points 1 year ago (1 children)

For example, I'm personally of the opinion that instances should be allowed to federate until they prove themselves to be bad actors, but in Meta's case there's a lot of existing evidence that shows they shouldn't be allowed to federate in the first instance.

[–] [email protected] 0 points 1 year ago (1 children)

Who do you imagine is (or should be) making these rules for the Fediverse?

[–] [email protected] 0 points 1 year ago (1 children)

Every instance gets to decide on its own, there's no set of rules governing the whole thing. That's why I stated this is my opinion, not some hard and fast rule.

[–] [email protected] 0 points 1 year ago (1 children)

You stated it very much as a set of rules that should exist. Twice.

[–] [email protected] 0 points 1 year ago (1 children)

For example, I'm personally of the opinion ...

Are you replying to the correct person?

[–] [email protected] 0 points 1 year ago

Yes. Did you forget how to quote your whole post?