|
You been had! Hoodwinked, bamboozled, run amok!
|
# ? Jun 11, 2016 07:03 |
|
|
# ? Apr 27, 2024 00:56 |
|
Zand posted:its actually spelled "gypped" and its a racist term that means "defrauded" or "swindled" In the abstract, maybe. Never known a person to use it with racial overtones. Maybe in the 19th Century, but c'mon.
|
# ? Jun 11, 2016 07:57 |
|
BeanpolePeckerwood posted:In the abstract, maybe. Never known a person to use it with racial overtones. Maybe in the 19th Century, but c'mon. The "racial overtones" are inherent to the word.
|
# ? Jun 11, 2016 11:18 |
|
Jacobin posted:More regular people couldn't give much crap about whether someone 'hasn't pushed a commit in years' or 'had a patch accepted'. Who is the face of an issue? Who is advocating it? This matters just as much if its a political issue and a technical one. Most regular people have literally never heard of him, and a lot of people in the know about such things don't consider him the face of anything.
|
# ? Jun 11, 2016 12:34 |
|
fishmech posted:Most regular people have literally never heard of him, and a lot of people in the know about such things don't consider him the face of anything. are... are you in the know?
|
# ? Jun 11, 2016 12:50 |
|
Zand posted:its actually spelled "gypped" and its a racist term that means "defrauded" or "swindled" Ok sorry I forgot it had a root meaning from the word gypsy. Anyways yes it felt devaluing. fishmech posted:Most regular people have literally never heard of him, and a lot of people in the know about such things don't consider him the face of anything. The Real Foogla posted:are... are you in the know? The guy was in Rolling Stone, regularly quoted in a mainstream German newspaper. Is about as regular and relateable as it comes from this field, is just what I am saying. Its all a bit poo poo. Jacobin fucked around with this message at 15:01 on Jun 11, 2016 |
# ? Jun 11, 2016 14:55 |
|
Jacobin posted:Ok sorry I forgot it had a root meaning from the word gypsy. Anyways yes it felt devaluing. Instead of using a potentially-offensive term, you could instead just say that he welshed on the deal, or that you expected more from him but he managed to jew you down.
|
# ? Jun 11, 2016 16:09 |
|
Appelbaum is a known credit thief that regularly used his social power to force himself on people doing actual work, overshadowing and minimizing them to increase his own clout. That he's famous outside tech circles because of this behavior isn't an argument in his favor.
|
# ? Jun 11, 2016 18:37 |
|
pr0zac posted:Appelbaum is a known credit thief that regularly used his social power to force himself on people doing actual work, overshadowing and minimizing them to increase his own clout. That he's famous outside tech circles because of this behavior isn't an argument in his favor. Your absolutely right just sucks, there is a real need for communicators who can reach out of the circles but who arent abusive etc Jacobin fucked around with this message at 18:57 on Jun 11, 2016 |
# ? Jun 11, 2016 18:43 |
|
Jacobin posted:The guy was in Rolling Stone, regularly quoted in a mainstream German newspaper. Is about as regular and relateable as it comes from this field, is just what I am saying. Its all a bit poo poo. yeah, ok, but I was making fun of loving fishmech
|
# ? Jun 11, 2016 18:55 |
|
Seeing Jacob's horseshit exposed and subsequent comeuppance is a pleasure to many of us.
|
# ? Jun 12, 2016 05:35 |
|
The Real Foogla posted:yeah, ok, but I was making fun of loving fishmech Nobody cares about your meltdown. pr0zac posted:Appelbaum is a known credit thief that regularly used his social power to force himself on people doing actual work, overshadowing and minimizing them to increase his own clout. That he's famous outside tech circles because of this behavior isn't an argument in his favor. Exactly this. The ESR of "security".
|
# ? Jun 12, 2016 19:43 |
|
In case you've forgotten, the FBI has access to a Tor 0day, and there's been a little legal dust-up over the matter as Tor tried to get access to it so they could patch it. The FBI has gotten tired of making legal arguments and has gone right ahead and classified their exploit.
|
# ? Jun 24, 2016 14:19 |
|
Combed Thunderclap posted:In case you've forgotten, the FBI has access to a Tor 0day, and there's been a little legal dust-up over the matter as Tor tried to get access to it so they could patch it. The FBI has gotten tired of making legal arguments and has gone right ahead and classified their exploit. On top of this, as another side-effect of the Tor Playpen case, thanks to the presence of online hackers and/or you handing over your IP address when you access a website, a federal court has ruled that you have no "reasonable expectation of privacy" on your home computer, and, therefore, law enforcement does not need to get a warrant to hack into it.
|
# ? Jun 26, 2016 06:29 |
|
ComradeCosmobot posted:On top of this, as another side-effect of the Tor Playpen case, thanks to the presence of online hackers and/or you handing over your IP address when you access a website, a federal court has ruled that you have no "reasonable expectation of privacy" on your home computer, and, therefore, law enforcement does not need to get a warrant to hack into it. US v. Matish, p. 53 posted:Just as the area into which the officer in Carter peered - an apartment - usually is afforded Fourth Amendment protection, a computer afforded Fourth Amendment protection in other circumstances is not protected from Government actors who take advantage of an easily broken system to peer into a user's computer.
|
# ? Jun 26, 2016 11:36 |
|
Except looking through your window blinds isn't generally a crime, hacking into a computer is explicitly illegal. Which is likely why an appeals court is going to take one glance at this and say "wtf"
|
# ? Jun 26, 2016 22:15 |
|
However the actual laws we have to make hacking illegal are really awful to begin with.
|
# ? Jun 26, 2016 22:37 |
|
hobbesmaster posted:Except looking through your window blinds isn't generally a crime, hacking into a computer is explicitly illegal. But I think the Carter analogy is flawed because a broken window blind is in and of itself an objectively failed privacy protection (that is, with no further intervention on the part of anyone else), while a computer that is in principle vulnerable to attack is not---and in this case the computer wasn't just randomly leaking private information or anything, it was only doing so after malware was crafted specifically to perform that operation was placed on the computer. The fact that the FBI (or anyone else for that matter) has to make a really nontrivial investment in technology and infrastructure to be able to accomplish this is a pretty obvious facial challenge to any comparison to Carter. I mean I think the issue is actually much broader---by a more or less identical argument you could say that no citizen has an objectively reasonable expectation of any of their rights, because it is clearly within the capabilities of the LEA community to deprive people of them. But that has never been and, hopefully, never will be a legal standard. This decision notwithstanding.
|
# ? Jun 27, 2016 00:59 |
|
pr0zac posted:Appelbaum is a known credit thief that regularly used his social power to force himself on people doing actual work, overshadowing and minimizing them to increase his own clout. That he's famous outside tech circles because of this behavior isn't an argument in his favor. Source? I've never heard of him, I'm interested in knowing about what credits he's thieved and people he's minimized.
|
# ? Jun 27, 2016 02:37 |
|
The 'broken blinds' argument is a terrible analogy; it would be far more accurate to describe it as being like an easily picked lock.
|
# ? Jun 27, 2016 15:57 |
|
Denver PD seizes $30k from citizens and uses it to license Geofeedia, acquiring the ability to simultaneously monitor posts on Facebook, Twitter, YouTube, Instagram, Vine, Periscope, and Flickr, among others. Its location-based search capabilities enable police to vacuum up nearly every social media post emanating from within specified geographical boundaries. The tweets, photos, videos, and live broadcasts of anyone identified by the software within the area are intercepted and recorded by police through a process developers call “geo-fencing.” Denver P.D. denied the Daily Dot access to records concerning the types of social media posts it has acquired through Geofeedia’s platform, describing the posts as “confidential intelligence information.” A request for access to any training materials, or paperwork that would describe the software’s functionality, was also denied. According to police, “the proprietary interests of the manufacturer outweighs any public purpose to be served by release” of said records, if they exist.
|
# ? Sep 20, 2016 07:19 |
|
So this is like a Stingray but just for the Internet instead of phone calls?
|
# ? Sep 20, 2016 15:46 |
|
FlamingLiberal posted:So this is like a Stingray but just for the Internet instead of phone calls? Except that this lets the police permanently store the ill-advised boob-flashes your teenage daughter is periscoping to her friends who are peer-pressuring her.
|
# ? Sep 22, 2016 19:10 |
|
That thing just sounds like a scraper that pulls in public social media and allows searching of geotags by distance. A teenager could build this from scratch over a weekend, or in 10 minutes starting from another scraper. I wouldn't compare it to something as sophisticated and nefarious as stingray.
|
# ? Sep 22, 2016 19:33 |
|
FlamingLiberal posted:So this is like a Stingray but just for the Internet instead of phone calls? Nah, it's more like hired-gun scanning of social media to control police PR narratives, say, in the aftermath of protesting or police shootings or other instances of 'social disturbance.' Basically part of institutionally sponsored community policing. http://thebaffler.com/salvos/social-media-spin-cantu
|
# ? Sep 23, 2016 23:38 |
|
Yahoo has been complicit in monitoring their users, scanning most or all users' email for the FBI, NSA, et al. So far, Google, Microsoft, and Facebook have all denied doing this (or denied receiving this type of request), while Twitter has partially denied (due to a gag order and a lawsuit resulting from said gag order). If you still had a Yahoo account, might be a good idea to shut it down.
|
# ? Oct 5, 2016 01:19 |
|
So is Tor still the way to go to help hide your network traffic? I figure this morning showed that I need to start taking my privacy a lot more seriously.
|
# ? Nov 9, 2016 15:29 |
|
IUG posted:So is Tor still the way to go to help hide your network traffic? I figure this morning showed that I need to start taking my privacy a lot more seriously. TAILS is an OS that will route all traffic through the tor network for you. You can run it via a bootable USB and it will wipe the memory well enough during the shutdown process - https://tails.boum.org/ Whonix is another option as an OS for forcing all traffic through the tor network. Whonix goes as far as compartmentalizing the routing of traffic to its own isolated virtual machine, which it calls the Gateway, and then having a separate VM as your Workstation which works with the Gateway to configure/maintain any connections - https://www.whonix.org/ Keep in mind though, its really important to understand that tor isn't a silver bullet or anything. Please understand this is a privacy tool, not inherently a security tool, and so you must rely on your own actions to a degree - https://www.torproject.org/download/download-easy.html.en#warning Here's also a handy guide of what the tor browser does and doesn't protect you from: quote:TOR BROWSER CAN
|
# ? Nov 9, 2016 16:28 |
|
IUG posted:So is Tor still the way to go to help hide your network traffic? I figure this morning showed that I need to start taking my privacy a lot more seriously. US and allied (five eyes) intelligence agencies can and have in the past broken tor. If you're planning something that the secret service would be interested in due to President Elect Trump it won't work.
|
# ? Nov 9, 2016 16:31 |
|
I hope the intelligence community is happy now, they will get to break all of the laws they want
|
# ? Nov 9, 2016 16:32 |
|
hobbesmaster posted:US and allied (five eyes) intelligence agencies can and have in the past broken tor. If you're planning something that the secret service would be interested in due to President Elect Trump it won't work. Yeah, I doubt that I'm going to be entirely anonymous online anymore. And it's not like I'm doing anything online that I don't want seen, except for downloading linux ISOs. However, if I can just hide the sites from my ISP just so they don't get cataloged or anything, I might as well give myself that privacy. I'm just imagining the Patriot Act 2.0 coming out in the next few years. EDIT: Does the bootable OS still work as well if I run it in a virtual image on my computer (Mac)? I don't think I would want it for my full OS, since I still use programs, like iTunes, that wouldn't work in this OS. IUG fucked around with this message at 16:46 on Nov 9, 2016 |
# ? Nov 9, 2016 16:44 |
|
IUG posted:Yeah, I doubt that I'm going to be entirely anonymous online anymore. And it's not like I'm doing anything online that I don't want seen, except for downloading linux ISOs. However, if I can just hide the sites from my ISP just so they don't get cataloged or anything, I might as well give myself that privacy. Ironically, using Tor makes you more interesting to the intelligence agencies, so it's sort of a lose-lose proposition.
|
# ? Nov 9, 2016 16:47 |
|
T dt y I
|
# ? Nov 9, 2016 17:22 |
|
Are there any other active threads similar to this one?
|
# ? Jan 30, 2017 00:59 |
|
IUG posted:And it's not like I'm doing anything online that I don't want seen, except for downloading linux ISOs. Please don't run bit torrents through tor. Pay $5 a month for a VPN if you're worried about that.
|
# ? Jan 30, 2017 02:29 |
|
pr0zac posted:Please don't run bit torrents through tor. Pay $5 a month for a VPN if you're worried about that. Seriously. The oldest and most well-known endpoint identificaiton attack against TOR is based on targetting users stupid enough to use bittorrent over it. It's been known how to identify BT-over-TOR users for over 5 years.
|
# ? Jan 30, 2017 17:23 |
|
Some chilling effect ITT.
|
# ? Apr 23, 2017 08:04 |
|
have we discussed the lovely wordart logos they gave some of these programs
|
# ? Apr 23, 2017 17:16 |
|
https://www.nytimes.com/2017/04/28/us/politics/nsa-surveillance-terrorism-privacy.htmlquote:WASHINGTON — The National Security Agency is stopping one of the most disputed forms of its warrantless surveillance program in which it collects Americans’ emails and texts to and from people overseas and that mention a foreigner under surveillance, according to officials familiar with the matter. Waiting for more updates, but quite a development if confirmed.
|
# ? Apr 28, 2017 18:24 |
|
|
# ? Apr 27, 2024 00:56 |
|
I still have SA banner ads turned on after all these years, and still click for some stupid reason Anyways...does poo poo like this work AT ALL? https://easyvpnrouter.com/ Or is it another misapplication of confidence?
|
# ? Apr 29, 2017 02:09 |