• 0 Posts
  • 27 Comments
Joined 1 year ago
cake
Cake day: July 14th, 2023

help-circle
  • Follow-up: teach them to learn to troubleshoot and search. Take the fear of breaking something from them by providing them with a VM with windows where they need to fix something or install a driver. Provide them with a Linux VM just for them to try too.

    Teach them mistrust. Make them upload things to a copy of Google docs or something, and then show how you have access to everything.

    Teach them about open source as a precondition for being able to trust software.


  • I would go with tasks where they get to “hack” or learn about each other. Give them usb sticks, make them put a silly trivia on an encrypted 7z with passwords that are somewhat crackable. Then, take their usbs from them, and distribute them randomly, and let them use jack the ripper or so. Twist, you would have added a virus or something into the USB stick, so they get infected with a “silly pop up” once they start jack the ripper. They get to play, and the exercise will stick with them.

    Teach them about 10 minute mails pages, to open a silly account t somewhere.

    Make them use a VPN like mullvad or some that you have set up to access a specific page or make web searches. They can notice the difference in content depending on the country they are exiting with. Twist: you control the VPN, provide them at the end with a list of accessed pages so they understand how the vpns do not ensure privacy. Explain simply what a VPN is (tunnel,etc).




  • That argument makes absolutely no sense. These server-side code does almost nothing. The only task it really has is passing around encrypted packets between clients.

    So it knows about all metadata, plus registration with phone number, etc. got it.

    The Signal protocol, which is used for client-side, local, on-device end-to-end encryption has always been fully open, and it can be used by any app/platform.

    you conveniently leave out how you need to use the client built by Signal, with dependencies from Google Services and the like, and you can’t use one built from the source they provide. Which at that point means they can introduce whatever they want in whichever version.

    Decentralisation is the only safe way.




  • Conservatism is dead. Climate change is scientifically proven to be catastrophic.

    If we do nothing, change will come to us, and fuck up everything. If we elect to change our society and systems, we save ourselves but our way of living changes.

    One way or another there’s change. There’s nothing to conserve. Stop yelling and kicking like an irrational kid trying to save conservatism and crony capitalism.













  • Of course I have. I’ve never found any substantiation, which is why I’m asking. I use them every day so I would certainly like to know if there is, but the concerns I constantly see only apply to Chrome, and not Chromium-based browsers.

    Just run WIreshark against your Chromium then. Enjoy.

    This is specifically for the Chromium browser, not Chromium-based browsers. I know, it’s confusing. Chromium is basically just the open-sourced version of Chrome.

    Did you read the link I posted?

    Let me copy-paste directly from the Chromium office page for you then:

    Additional Information on Chromium, Google Chrome, and Privacy

    Features that communicate with Google made available through the compilation of code in Chromium are subject to the Google Privacy Policy.

    There, you have it. Now you can try moving more goalposts again, and provide excuses for them.

    This is yet another item attributed to Chrome and it’s users. You can totally create a Chromium fork that adheres to conventional standards.

    Nah it’s not. I’m talking about Google pushing and implementing IETF standards that hamstring privacy. They are open standards, but they are malicious. That a standard is open doesn’t mean is doing things that are not ethical.

    To me, it’s obvious that you don’t even want to look for proof. Why so hell-bent on taking the stance of a state-level billionare corporation built by extracting privacy from users? How do you think they got there?

    Or do you have something specific against the legal non-profit organization that is Mozilla?