soloActivist

joined 2 years ago
 

I’ve noticed that the data protection authorities are deadbeats for the most part. None of my reports have ever lead to any action in the slightest -- not even a warning to the offender. Sometimes reports are rejected for frivilous reasons.

So knowing that the GDPR is merely symbolic in my experience, I have quit trusting the marketplace. Quit paying for things electronically, quit buying things online, quit sending email, quit sharing my email address with others, cut way back on electronic transactions, reach orgs the old fashioned way (by paper letter), etc.

Anyone else practicing data minimisation like this? It seems like the world around me is entirely unaware that the GDPR is mostly unenforced. Sure, they enforce a few token cases against Google and the like just for appearances. But the GDPR is failing to protect actual people whose rights are undermined.

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago) (2 children)

When “such engagement” is required to exercise human rights, I’m not as quick as you to call that optional. I expect to have all of my human rights simultaneously satisfied together in aggregate.

A mandate can be explicitly written or merely implied. If you need food to survive, for example, and a law were to say all food distributors must refuse cash, you can safely call that an implied mandate to use a bank. Or would you say they are off the hook for the human rights consequences, perhaps on the basis that people can freely refuse to buy food and opt to grow their own food?

art.4 & art.23 (employment)


Are you suggesting that the ban on cash wages is not a banking mandate because it’s an “engagement”, despite exercise of human rights articles relying on that engagement? Consider that art.4 entitles people to be free from slavery and couple that with art.23 which states: “Everyone has the right to work, to free choice of employment”. In Belgium, it is illegal for an engineer to receive cash wages. But it is not illegal for a domestic worker to receive cash wages if that has been established as a common practice in that trade.

Do you see the issue? An unbanked engineer can freely refuse to work and live on welfare (if offered by their gov assuming no disqualifying requirements due to their ability to work), but then they must give up their rights under art.23. And even then, how do they get their welfare payment? See below.

art.25 (housing & social svcs)


Consider that no real estate transaction can involve cash, by law. Yet, art.25 states:

Everyone has the right to a standard of living adequate for the health and well-being of himself and of his family, including food, clothing, housing and medical care and necessary social services

I highlighted social services as well as housing because social services in some countries refuse to pay cash to beneficiaries. You cannot get financial aid without a bank account.

Regarding utilities, is that also what you consider to be an optional engagement? That people do not need water and power service? This may be debatable but I believe the right to housing likely includes a right to energy in regions where a box with walls+roof is insufficient to prevent freezing. I believe housing implies having a warm space. So when the energy supplier refuses cash, is that not a mandate to use a bank? If you are wondering where the gov comes into play in this case, it would be when the utility supplier refuses cash then sues the unbanked consumer in court for non-payment. When the court finds the energy contract to be “legal” and sides with the utility company, that’d essentially be a case of the gov mandating the use of banks.

It’s also worth noting that the UDHR is not limited to govs. The private sector is also bound by the UDHR.

Anyway, this is all quite far off from the original question in the OP, which remains unanswered.

(edit) And what about tax?


Some govs require taxes to be paid electronically. Tax is by definition a mandate. Both income tax and property tax must be paid electronically. There was a guy in Germany to was denied the option to pay his radio licensing fees in cash. IIUC, that’s like BBC, a mandatory tax. You could perhaps argue that income tax is optional because income is optional, and that property tax is optional because home ownership is optional, but I’m not sure the same can be said for radio fees in Germany.

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago) (4 children)

I answered that same question upstream earlier today.

[–] [email protected] 4 points 5 months ago (1 children)

Ah, so I guess there would be no updates to the story. Patient walked in the end because the hospital demanded indemnity from late notifications.

[–] [email protected] 10 points 5 months ago* (last edited 5 months ago)

There is a slight renaissance of feature phones (aka dumb phones) lately. The main drive is self-control. People trying to shake free of an addiction. Tech illiterates of course like smart phones as well but you have the security factor backwards. The smartest consumers favor feature phones precisely for their superior security.

So I believe feature phone users largely fall into the following demographics:

  • social media addicts looking for escape
  • tech-literate street-wise people who understand the vastness of the attack surface and risks of smartphones with knowledge about mass surveillance programs and loss of control (this demographic does their e2ee comms from a PC)
  • tech illiterates

(edit) To a lesser extent:

  • (policy/child protection)? I think I heard some schools (and districts thereof) are banning smartphones from very young children
  • those who simply have no compelling use case
  • pro-environment ethical consumers who oppose e-waste and the ecocide from the designed obsolescence that impacts all smartphones (even Fairphone needs to make progress here)
  • the extreme poor. The US has a “Lifeline” program to give gratis smartphones to poor people, but I’m not sure they’re all aware of it, or whether the program keeps up with the chronic need for software updates that require hardware replacements (designed obsolescence)
 

cross-posted from: https://links.hackliberty.org/post/38945

Question about #humanRights— Article 20 of the #UDHR¹ states:

“① Everyone has the right to freedom of peaceful assembly and association.

② No one may be compelled to belong to an association.”

How does that apply in the context of forced banking? If a government forces you to enter the marketplace and register for a bank account, does that qualify as being compelled to belong to an association?

¹UDHR: Universal Declaration of Human Rights

#askFedi

 

cross-posted from: https://links.hackliberty.org/post/2977653

All links for this story are shit -- Cloudflare or paywalls. So I linked the archive and will dump the text below. Note the difference between my title and the original. I think mine is more accurate. The AG seems to view feature phones as a tool for criminals. But also says having no phone is suspect as well, so the original title is also correct.


Georgia AG claims not having a phone makes you a criminal

That’s dangerous for constitutional rights
SAMANTHA HAMILTON
FEBRUARY 12, 2024 6:52 PM

The ubiquity of smartphones is causing some to pine for simpler times, when we didn’t have the entire history of humankind’s knowledge at our fingertips on devices that tracked our every move. There’s a growing trend, particularly among young people, to use non-smartphones, or “basic phones.” The reasons range from aesthetic to financial to concern for mental health. But according to Georgia Attorney General Chris Carr, having a basic phone, or a phone with no data on it, or no phone at all in the year 2024, is evidence of criminal intent. The AG’s position poses grave dangers for all Georgians’ constitutional rights.

Last month, Deputy Attorney General John Fowler argued in state court that mere possession of a basic cellphone indicates criminal intent to commit conspiracy under Georgia’s racketeer influenced and corrupt organizations statute, better known as RICO.

His accusation was directed at 19-year-old Ayla King, one of 61 people indicted last summer on RICO charges linked to protests in the South River Forest where the $109 million Atlanta Public Safety Training Center, nicknamed “Cop City” by its opponents, is slated to be built. The RICO charges against King and the 60 other RICO defendants have been widely criticized as a political prosecution running contrary to the First Amendment. King is the first of these defendants to stand trial.

During the Jan. 8 hearing in Fulton County Superior Court, Fowler argued that a cellphone in King’s possession on the day of their arrest, which he characterized as a “burner phone,” should be admissible as evidence of wrongdoing, even though it contained no data. He went even further to suggest that not possessing a cellphone at all also indicates criminal intent. Judge Kimberly Adams agreed to admit evidence of King’s cellphone.

Civil liberty groups are decrying the AG’s argument and court’s action as violations of constitutional rights under the First Amendment and Fourth Amendment. In an open letter to Attorney General Carr, the groups wrote, “It is alarming that prosecutors sworn to uphold the Constitution would even make such arguments—let alone that a sitting judge would seriously entertain them, and allow a phone to be searched and potentially admitted into evidence without any indication that it was used for illegal purposes.”

The Supreme Court recognized in the 2014 case Riley v. California that cellphones carry enough personal information—photos, text messages, calendar entries, internet history, and more—to reconstruct a person’s life using smartphone data alone. “Prior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day,” the Court noted. “Now it is the person who is not carrying a cellphone, with all that it contains, who is the exception.”

On the dark side of smartphones’ interconnectivity is their susceptibility to surveillance. In 2022, it was reported that the U.S. Department of Justice had purchased for testing a version of the Phantom spyware from NSO Group, an Israeli firm which sold its surveillance technology to governments like Mexico and Saudi Arabia to spy on journalists and political dissidents. Phantom could be used to hack into the encrypted data of any smartphone located anywhere in the world, without the hacker ever touching the phone and without the phone’s user ever knowing. The U.S. federal government denied using Phantom in any criminal investigation, but concerns about surveillance in the U.S. have led some folks to obtain basic phones.

Flip phones have made a comeback, and the potential for invasion of privacy is one of the reasons why. I’m not talking about the recent wave of smartphones that flip open. I’m talking about early 2000s-era basic phones, whose smartest feature was the game Snake or, if you were lucky, the ability to set your favorite song as your ringtone.

Folks are returning to basic phones—or in the case of Gen Z, turning for the first time—out of recognition that doom scrolling on a smartphone for hours each day is not good for mental health. For some older adults, basic phones, which offer few features beyond calling and texting, are preferable to smartphones for their simplicity. There are lots of reasons why someone might have a basic phone—not to mention they’re cheaper and more durable than a lot of smartphones.

Using simple phones that have little data on them is a legitimate, and common, practice for journalists, whistleblowers, human rights activists, and other people seeking to protect their identities or those of others from surveillance by the government or malicious actors. The Committee to Protect Journalists recommends that journalists cycle through “low-cost burner phones every few months” to maintain their safety and that of their sources. Even athletes competing in the 2022 Beijing Olympics were advised to use burner phones in light of the overreaching state surveillance in China.

Using a burner phone is not evidence of criminal intent—it’s a reasonable response to the threat of surveillance and government overreach. While burner phones are not immune from location tracking via cell towers, the fact that they contain much less data than a smartphone can make them a more secure form of communication.

How deeply invasive of privacy rights will the AG’s logic extend? Will the prosecution argue that using a virtual private network (VPN) is evidence of criminal intent? What about communicating via encrypted messaging apps, like Signal? The First Amendment protects the right to anonymous speech, and the use of privacy protection measures like VPNs and Signal has become commonplace in today’s world. The AG has already asserted in the RICO indictment that anonymous speech communicated online constitutes a conspiracy, but if the AG argues that using VPNs and Signal is evidence of criminal intent, he would be going even further by claiming that the very tools which make people feel safe to communicate online are themselves evidence of criminal intent, thereby assuming criminality before the speech has even taken place.

The position the AG has taken in Ayla King’s case has the potential to make all of us suspects. If you have a smartphone with data on it, the information on the phone can be used as evidence against you. And if you have a phone with no data on it or no phone at all, that can be used as evidence against you.

The state’s use of the absence of evidence as affirmative evidence is an unsettling development, and one that seems desperate. Is it—and perhaps the RICO charges themselves—a sign of prosecutorial weakness in a case intended to silence criticism and criminalize First Amendment expression?


(update) possible awareness campaign action: Would it be worthwhile for people who do not carry a smartphone to write to the Georgia AG to say they don’t carry a smartphone? The idea being to improve the awareness of the AG.

take action

40
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 

A guy posted a long thread in Mastodon about how a hospital refused him service because he did not install the smartphone app of the hospital/clinic which (IIRC) was exclusively available in Google’s Playstore.

Sorry to say I lost track of the link. If anyone finds the thread, please reply.

(edit) I found the link

@[email protected] -- any updates?

 

Just did a search using the most privacy respecting search service in the world:

ombrelo.im5wixghmfmt7gf7wb4xrgdm6byx2gj26zn47da6nwo7xvybgxnqryid.onion

Was quite disgusted to see a link to a sh.itjust.works thread in the results. It was rightfully low-ranking with a strike-through, which is how ombrelo treats Cloudflare sites. But still, ombrelo sources the results from the giants and that exclusive centralised shit is now polluting search results even more.

 

All links for this story are shit -- Cloudflare or paywalls. So I linked the archive and will dump the text below. Note the difference between my title and the original. I think mine is more accurate. The AG seems to view feature phones as a tool for criminals. But also says having no phone is suspect as well, so the original title is also correct.


Georgia AG claims not having a phone makes you a criminal

That’s dangerous for constitutional rights
SAMANTHA HAMILTON
FEBRUARY 12, 2024 6:52 PM

The ubiquity of smartphones is causing some to pine for simpler times, when we didn’t have the entire history of humankind’s knowledge at our fingertips on devices that tracked our every move. There’s a growing trend, particularly among young people, to use non-smartphones, or “basic phones.” The reasons range from aesthetic to financial to concern for mental health. But according to Georgia Attorney General Chris Carr, having a basic phone, or a phone with no data on it, or no phone at all in the year 2024, is evidence of criminal intent. The AG’s position poses grave dangers for all Georgians’ constitutional rights.

Last month, Deputy Attorney General John Fowler argued in state court that mere possession of a basic cellphone indicates criminal intent to commit conspiracy under Georgia’s racketeer influenced and corrupt organizations statute, better known as RICO.

His accusation was directed at 19-year-old Ayla King, one of 61 people indicted last summer on RICO charges linked to protests in the South River Forest where the $109 million Atlanta Public Safety Training Center, nicknamed “Cop City” by its opponents, is slated to be built. The RICO charges against King and the 60 other RICO defendants have been widely criticized as a political prosecution running contrary to the First Amendment. King is the first of these defendants to stand trial.

During the Jan. 8 hearing in Fulton County Superior Court, Fowler argued that a cellphone in King’s possession on the day of their arrest, which he characterized as a “burner phone,” should be admissible as evidence of wrongdoing, even though it contained no data. He went even further to suggest that not possessing a cellphone at all also indicates criminal intent. Judge Kimberly Adams agreed to admit evidence of King’s cellphone.

Civil liberty groups are decrying the AG’s argument and court’s action as violations of constitutional rights under the First Amendment and Fourth Amendment. In an open letter to Attorney General Carr, the groups wrote, “It is alarming that prosecutors sworn to uphold the Constitution would even make such arguments—let alone that a sitting judge would seriously entertain them, and allow a phone to be searched and potentially admitted into evidence without any indication that it was used for illegal purposes.”

The Supreme Court recognized in the 2014 case Riley v. California that cellphones carry enough personal information—photos, text messages, calendar entries, internet history, and more—to reconstruct a person’s life using smartphone data alone. “Prior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day,” the Court noted. “Now it is the person who is not carrying a cellphone, with all that it contains, who is the exception.”

On the dark side of smartphones’ interconnectivity is their susceptibility to surveillance. In 2022, it was reported that the U.S. Department of Justice had purchased for testing a version of the Phantom spyware from NSO Group, an Israeli firm which sold its surveillance technology to governments like Mexico and Saudi Arabia to spy on journalists and political dissidents. Phantom could be used to hack into the encrypted data of any smartphone located anywhere in the world, without the hacker ever touching the phone and without the phone’s user ever knowing. The U.S. federal government denied using Phantom in any criminal investigation, but concerns about surveillance in the U.S. have led some folks to obtain basic phones.

Flip phones have made a comeback, and the potential for invasion of privacy is one of the reasons why. I’m not talking about the recent wave of smartphones that flip open. I’m talking about early 2000s-era basic phones, whose smartest feature was the game Snake or, if you were lucky, the ability to set your favorite song as your ringtone.

Folks are returning to basic phones—or in the case of Gen Z, turning for the first time—out of recognition that doom scrolling on a smartphone for hours each day is not good for mental health. For some older adults, basic phones, which offer few features beyond calling and texting, are preferable to smartphones for their simplicity. There are lots of reasons why someone might have a basic phone—not to mention they’re cheaper and more durable than a lot of smartphones.

Using simple phones that have little data on them is a legitimate, and common, practice for journalists, whistleblowers, human rights activists, and other people seeking to protect their identities or those of others from surveillance by the government or malicious actors. The Committee to Protect Journalists recommends that journalists cycle through “low-cost burner phones every few months” to maintain their safety and that of their sources. Even athletes competing in the 2022 Beijing Olympics were advised to use burner phones in light of the overreaching state surveillance in China.

Using a burner phone is not evidence of criminal intent—it’s a reasonable response to the threat of surveillance and government overreach. While burner phones are not immune from location tracking via cell towers, the fact that they contain much less data than a smartphone can make them a more secure form of communication.

How deeply invasive of privacy rights will the AG’s logic extend? Will the prosecution argue that using a virtual private network (VPN) is evidence of criminal intent? What about communicating via encrypted messaging apps, like Signal? The First Amendment protects the right to anonymous speech, and the use of privacy protection measures like VPNs and Signal has become commonplace in today’s world. The AG has already asserted in the RICO indictment that anonymous speech communicated online constitutes a conspiracy, but if the AG argues that using VPNs and Signal is evidence of criminal intent, he would be going even further by claiming that the very tools which make people feel safe to communicate online are themselves evidence of criminal intent, thereby assuming criminality before the speech has even taken place.

The position the AG has taken in Ayla King’s case has the potential to make all of us suspects. If you have a smartphone with data on it, the information on the phone can be used as evidence against you. And if you have a phone with no data on it or no phone at all, that can be used as evidence against you.

The state’s use of the absence of evidence as affirmative evidence is an unsettling development, and one that seems desperate. Is it—and perhaps the RICO charges themselves—a sign of prosecutorial weakness in a case intended to silence criticism and criminalize First Amendment expression?


(update) possible awareness campaign action: Would it be worthwhile for people who do not carry a smartphone to write to the Georgia AG to say they don’t carry a smartphone? The idea being to improve the awareness of the AG.

take action

3
hackliberty.org onion is down (links.hackliberty.org)
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 

The onion host:

http://snb3ufnp67uudsu25epj43schrerbk7o5qlisr7ph6a3wiez7vxfjxqd.onion

is down. Clearnet host is up.

 

I was winging over the fact that the CJEU ruled that victims of GDPR offenses cannot claim their legal costs (particularly the lawyer’s fees) when they win a case, which kills lawsuits as a viable option in most GDPR situations. At the same time, data protection authorities are deadbeats -- not enforcing most cases. So the GDPR is mostly just symbolic for most of us.

A brit said they use the court and it only costs them £30 to file a paper with no need for a lawyer. I’m surprised because that’s even cheaper than typical small claims courts in the US. And the other thing is, small claims courts (in the US) only handle money disputes. A US small claims court can only order someone to pay for damages. If a CCPA case were brought to a small claims court in California, it would be unable to order someone to take an action such as to erase info from a DB.

So I’m curious about this UK option. Do UK small claims courts have the power to order a data controller to erase data? Or would it be a higher court?

To be clear, the brit said they do not get their £30 back (unlike what would happen in a US small claims court). So Brits are still at a loss, but perhaps still worthwhile in some cases.

 

Is there any kind of legal standard of liability when a victim of a data breach suffers from someone exploiting their data? If you are only breached once, obviously it’s easy to point the finger to whoever leaked your data.

But I’ve been hit 3 times now. So all those shitty corps who sloppily handled my data can point the finger to each other. Would a court say the most recent sloppy custodian is responsible if my data is used against me? Or would it be the most reckless custodian? Or would it be equal blame? Or does everyone get off the hook when a victim cannot prove which leak leads to an exploit?

It’s a hypothetical question. Not saying my data was exploited after the breaches, but I wonder about the overall trend. What I’m getting at is there may be little incentive to actually invest in good data security because when a breach happens amid so many other breaches there is perhaps a diffusion responsibility.

 

Folks just post whatever link they want to share without thinking. Then thousands of people have to grapple with some enshitified paywall or a shitty Cloudflare CAPTCHA. We need smarter users. It just takes one lazy/naive motherfucker to cause a lot of work for people collectively.

This is inspired by archive.org going down. The sole digital public library we have in the world is a hack around shared links to shitty servers -- servers that expect US to serve THEM. Servers that piss on their role as a /server/ and fail to serve us.

So here are some methods/rules that will make you a better contributor:

① Realize that the same story is often published by several sources. Whatever source you first encountered, it’s probably not decent. The web is designed to get the most enshitified page in front of you. Instead of spreading that garbage, go to Ombrelo:

https://ombrelo.im5wixghmfmt7gf7wb4xrgdm6byx2gj26zn47da6nwo7xvybgxnqryid.onion/

Search for the story there. Ombrelo will down-rank the exclusive Cloudflare garbage so the more inclusive links float to the top.

② Copy the whole text of the article into your post. This will become the most convenient and most accessible version of the article. Maybe not convenient for you but the reader’s convenience is more important (because there are thousands of them).

③ Don’t link archive.is. That’s just another shitty exclusive walled garden. Link to archive.org if it is online.

④ Don’t create an original thread on a Cloudflared community or you are just worsening the problem of jailing more content in an exclusive place. These are some of the mainstream shitty oppressive Cloudflare instances:

  • lemmy.world
  • lemm.ee
  • sh.itjust.works
  • lemmy.ca
  • lemmy.zip
  • aussie.zone
  • lemmy.one
  • lemdro.id
  • programming.dev
  • literature.cafe
  • beehaw.org ← not Cloudflare, but Tor-hostile thus exclusive

Most people are ignorant and have no idea that by using those places they are jailing content in the worlds biggest centralized walled garden. Now that you know, you can choose more wisely. Use lemmyverse.net to find the community you’re after. And use the filter to nix the above nodes. If it does not show the community you need outside of the above giant walled garden, then create the community in the open free world. If you are desperate for visibility you can cross-post to those shitty places above. At least some of the subscribers in the walled garden will learn of your more free venue.

Follow the advice RMS gives to people who insist on feeding Facebook, but substitute the above Cloudflare list. Ensure everything you author is reachable somewhere in the open free world. Only show a minimal number of posts on Cloudflare-pawned or exclusive nodes. Keep in mind when you post to those places, you are feeding an oppressive corporation while blocking some demographics of your fellow human beings from access. That’s some fucked up boot licking when done knowingly.

⑤ If you want to link a youtube video, yikes. That sucks because (at least at the moment) the free world resources (Invideous) have been rendered dysfunctional by Google. But in the very least, you can copy the Youtube transcript into the body of your post. If you have the video up in Youtube, you can click into the transcript. I forgot how.. something like expanding the description then details, or some buried place. There is also https://www.tubetranscripts.com/

⑥ If you want to link a NY Times article, we’re all fucked.. plz don’t do it. Look for the story elsewhere. NYtimes has this onion: https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion/

which used to give full access to content, but now it’s as enshitified as the clearnet site. For BBC, there is:

https://www.bbcnewsd73hkzno2ini43t4gblxvycyac5aw4gnv7t2rccijh7745uqd.onion/

I don’t recall if BBC’s onion is free-er. For medium.com, there is https://scribe.rip/ (many instances thereof). I suggest also searching here:

https://search.fabiomanganiello.com/search

That guy has gone to some trouble to do link replacements with better versions. Though i’m confused because he is no longer replacing Reddit links with mirrors.. wtf.

[–] [email protected] 14 points 6 months ago* (last edited 6 months ago) (4 children)

I do in fact do that. It’s very useful. But the breach notice came by postal mail.

(edit) In fact, it would have been cheaper for them to send the breach notices by email. I suspect they chose postal mail precisely to conceal from victims who the data source was due to people’s use of email aliases.

 

A company I have no business relationship with sent me a breach notice stating that criminals got my data. This company is a supplier to many banks, brokerages, insurance companies, etc.

Obviously I want to know which of my banks or insurance companies I am doing business with trusted them with my data. I called and asked. They refused to tell me. But they have made it deliberately complicated. The phone number they gave to breach victims is for a 3rd party call center who knows nothing. So the call center says “we don’t have that info”.

Question: do financial/analytics orgs (or whatever the fuck they are) have a legal obligation to provide data breach victims with the SOURCE of the info? Do they have to tell me which of my banks (or whatever) hired them to be a custodian of my data?

What rights to data breach victims have?

(more background: https://links.hackliberty.org/post/2667522)

(update)
Thanks for all the useful feedback folks! I guess the question that remains is whether there are any federal laws that require the disclosure I am after. I looked up the law for my state here and found no law entitling breach victims to be informed of the source of their personal data. It would help to know the law because the AG, CFPB, and FTC will be limited to the law themselves.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago)

It’s a decent approach but incomplete. Couple problems:

  • Lemmy would not host youtube videos. YT transcripts could (and should) be part of the post, but then there is the same problem as the next bullet:
  • w.r.t text content, some people (very few people) indeed copy the content. It’s failing because people are lazy. Too lazy to check whether the link is in a walled garden; too lazy to warn people of the walled garden; also too lazy to copy the text. Sometimes it’s more naivety than lazy, but same problem: you are relying on the masses to make individual decisions that are wise, inclusive, and higher effort.

A good system is designed with the assumption that users are lazy. As such, Lemmy is poorly designed.

1 lazy author can inconvenience thousands of readers. Lammy’s design fails to address that.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago)

My point still stands.

Of course it doesn’t. Your point doesn’t even grasp the problem. You think the problem is that fedi users have (or have not) entitlement to content. It’s a red herring. You cannot begin to solve a problem you do not understand. It does not matter who is “entitled” to the content. The content is exclusive; locked inside a walled-garden with a gatekeeper. The problem is that exclusive access content is being linked on an open content platform and shoved in the face of readers who do not have access to the closed content.

The moment you are using someone else’s platform

Again, you still fail to grasp the problem. Using someone else’s platform is not a premise. You can either be on someone else’s node or you can be on your own self-hosted node. Either way, exclusive links are in the reader’s face.

How can you get so many things wrong.. then you claim using one platform inherently revokes rights outside that platform -- of course not. Irrelevant regardless, but rights granted on one platform do not diminish rights on another.

you loose the rights to the content outside of that platform.

It’s not about “rights”. That’s a legal matter. It’s about digital inclusion (a technical matter). People don’t want to see links that exclude them. It’s just pollution.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago) (2 children)

You’ve misunderstood the problem. It’s not a fix to access content that’s needed. The question is how to fix the pollution: exclusive walled-garden links appearing outside of the walled garden (where not everyone has access or is part of the special club of Google/Facebook/Cloudflare patrons). How did you misunderstand when I mentioned a toggle? And the title... how could I make the title more clear?

 

Discuss. (But plz, it’s only interesting to hear from folks who have some healthy degree of contempt for exclusive corporate walled-gardens and the technofeudal system the fedi is designed to escape.)

And note that links can come into existence that are openly universally accessible and then later become part of a walled-garden... and then later be open again. For example, youtube. And a website can become jailed in Cloudflare but then be open again at the flip of a switch. So a good solution would be a toggle of sorts.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago)

But at some point to interact with any kind of large company .. You could also consider not interacting with large companies at all

Actually the large corps are more likely to hold the data in-house. Small companies cling to outsourcing. E.g. credit unions are the worst.. outsource every service they offer to the same giant suppliers. Everyone thinks only a small company has the data (and consequently that the small dataset does not appeal to cyber criminals) but it’s actually worse because they outsource jobs even as small as printing bank statements to the same few giants most other credit unions use. Then they do the same for bill pay with another company. It’s getting hard to find a credit union that does not put Cloudflare in the loop. So in the end a dozen or so big corps have your data and it’s not even disclosed in the privacy statement.

Of course it depends on the nature of the business. A large grocery chain is more likely to make sure your offline store purchase history reaches Amazon and Google than a mom & pop grocer who doesn’t even have a loyalty program.

Whether businesses get copies of information is usually included in a site’s privacy policy,

I have never seen a privacy policy that lists partners and recipients apart from Paypal, who lists the 600+ corps they share data with for some reason. Apart from bizarre exceptions privacy policies are always too vague to be useful. Even in the GDPR region. If you read them you can often find text that does not even make sense for their business because they just copied someone else’s sufficiently vague policy to use as a template.

If you really want to limit your information exposure, you either have to audit everyone you do business with this way (because most large companies do this) or hire someone (or a service) to do it.

The breach happened in a country where companies are not required to respond to audits. No company wants any avg joe’s business badly enough to answer questions about data practices. In the EU, sure, data controllers are obligated to disclose the list of parties they share with (on request, not automatically). And even then, some still refuse. Then you file an article 77 complaint with the DPA where it just sits for years with no enforcement action.

My approach is a combination of avoiding business entirely, or supplying fake info, or less sensitive info (mailing address instead of residential, mission-specific email, phone number that just goes to a v/m or fax). This is where the battle needs to be fought -- at data collection time. Countless banks needlessly demand residential address. That should be rejected by consumers. Data minimization is key.

In the case at hand, I’m leaning toward opting out of the class action lawsuit and suing them directly in small claims court. I can usually get better compensation that way.

[–] [email protected] -1 points 6 months ago* (last edited 6 months ago)

Exit nodes are temporary unless you deliberately pin them for a particular connection, which I have not done for the DNS servers. The problem manifests without exception for weeks now, so it could not be attributed to a bad exit node. The tor microdescriptor db tracks the perms of every node, so I don’t think it would create a circuit for disallowed traffic. There could be an inconsistency between the microdesc and reality, but it would have to be a replicated inconsistency for every connection attempted with torsocks and yet not replicated on any connection made using the torsocks alternative (which works).

[–] [email protected] -1 points 7 months ago* (last edited 7 months ago) (2 children)

Which torsocks version? Yours is probably newer than mine. It seems to be a problem with torsocks 2.3.0 and only with dig. And indeed there is nothing wrong at the network level because I was able to do an MX lookup over tor using a different method than torsocks. I'm also able to use other apps with torsocks, just not dig all of the sudden.

[–] [email protected] -1 points 10 months ago

what happened here? Looks like you tried summons an autotldr bot, but it did not do its job, correct? That’s kind of a shame. Indeed theregister.com is an exclusive website and direct links to it should not be shared. A privacy-respecting infrastructure would block such links or replace them with archive.org variants.

view more: next ›