1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1582
+user: Proxies\__CG__\App\Entity\User {#2384 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: Proxies\__CG__\App\Entity\Image {#2285 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2284 …}
+slug: "PSA-Don-t-torrent-over-TOR"
+title: "PSA: Don't torrent over TOR"
+url: "https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor"
+body: """
1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.\n
2. Tor is a TCP only network.\n
3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 100
+favouriteCount: 624
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699287082 {#2253
date: 2023-11-06 17:11:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2034 …}
+reports: Doctrine\ORM\PersistentCollection {#2286 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2156 …}
+badges: Doctrine\ORM\PersistentCollection {#2154 …}
+children: [
App\Entity\EntryComment {#1606
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1582 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
+body: """
It is a different anonymity network, which works differently in many aspects.\n
\n
I2P and Tor comparison: [geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor) \n
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): [geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)\n
\n
Currently BiglyBt supports I2P and it has been that way for quite some time. \n
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.\n
\n
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 21
+score: 0
+lastActive: DateTime @1697887206 {#1428
date: 2023-10-21 13:20:06.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@onlinepersona@programming.dev"
"@supervent@lemmy.dbzer0.com"
"@atlasraven31@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#1671 …}
+nested: Doctrine\ORM\PersistentCollection {#1667 …}
+votes: Doctrine\ORM\PersistentCollection {#1670 …}
+reports: Doctrine\ORM\PersistentCollection {#1678 …}
+favourites: Doctrine\ORM\PersistentCollection {#1551 …}
+notifications: Doctrine\ORM\PersistentCollection {#1586 …}
-id: 62781
-bodyTs: "'/en/comparison/tor](https://geti2p.net/en/comparison/tor)':19 '/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':35 '4.6':60 'anonym':5 'aspect':12 'biglybt':37 'bittorr':22 'candid':71 'client':25,75,96 'come':57,85 'comparison':16 'current':36 'dev':26 'differ':4,9 'experi':106 'geti2p.net':18,34 'geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor)':17 'geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':33 'guid':27 'hope':114 'i2p':13,20,39,54,100,111 'info':32 'interest':31 'librari':90 'libtorr':88 'load':110 'mani':11 'misconfigur':120 'most':23 'network':6 'overload':133 'part':123 'probabl':73 'program':89 'publish':69 'qbittorr':53 'quit':47,102 'releas':70 'right':98 'site':128 'slow':103 'specif':127 'support':38,55,83 'term':108 'time':49 'tor':15 'tri':63,130 'use':52,93 'version':59,72 'way':45 'websit':112 'work':8,77"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1446252"
+editedAt: DateTimeImmutable @1697887925 {#1440
date: 2023-10-21 13:32:05.0 +02:00
}
+createdAt: DateTimeImmutable @1697887206 {#1434
date: 2023-10-21 13:20:06.0 +02:00
}
+"title": 62781
}
]
-id: 6808
-titleTs: "'psa':1 'tor':6 'torrent':4"
-bodyTs: "'1':1 '2':32 '3':39 'actual':29 'address':31 'anonym':7,14,47 'design':12 'doesn':3,42 'give':44 'go':25 'hurt':52 'ip':30 'leak':27 'make':5 'million':21 'mind':16 'network':38,54 'protocol':9 're':24 'tcp':36 'tor':33 'torrent':8 'user':57 'want':49 'wasn':10 'way':22"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697969159
+visibility: "visible "
+apId: "https://programming.dev/post/4694754"
+editedAt: null
+createdAt: DateTimeImmutable @1697882759 {#2132
date: 2023-10-21 12:05:59.0 +02:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1582
+user: Proxies\__CG__\App\Entity\User {#2384 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: Proxies\__CG__\App\Entity\Image {#2285 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2284 …}
+slug: "PSA-Don-t-torrent-over-TOR"
+title: "PSA: Don't torrent over TOR"
+url: "https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor"
+body: """
1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.\n
2. Tor is a TCP only network.\n
3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 100
+favouriteCount: 624
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699287082 {#2253
date: 2023-11-06 17:11:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2034 …}
+reports: Doctrine\ORM\PersistentCollection {#2286 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2156 …}
+badges: Doctrine\ORM\PersistentCollection {#2154 …}
+children: [
App\Entity\EntryComment {#1606
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1582 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
+body: """
It is a different anonymity network, which works differently in many aspects.\n
\n
I2P and Tor comparison: [geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor) \n
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): [geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)\n
\n
Currently BiglyBt supports I2P and it has been that way for quite some time. \n
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.\n
\n
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 21
+score: 0
+lastActive: DateTime @1697887206 {#1428
date: 2023-10-21 13:20:06.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@onlinepersona@programming.dev"
"@supervent@lemmy.dbzer0.com"
"@atlasraven31@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#1671 …}
+nested: Doctrine\ORM\PersistentCollection {#1667 …}
+votes: Doctrine\ORM\PersistentCollection {#1670 …}
+reports: Doctrine\ORM\PersistentCollection {#1678 …}
+favourites: Doctrine\ORM\PersistentCollection {#1551 …}
+notifications: Doctrine\ORM\PersistentCollection {#1586 …}
-id: 62781
-bodyTs: "'/en/comparison/tor](https://geti2p.net/en/comparison/tor)':19 '/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':35 '4.6':60 'anonym':5 'aspect':12 'biglybt':37 'bittorr':22 'candid':71 'client':25,75,96 'come':57,85 'comparison':16 'current':36 'dev':26 'differ':4,9 'experi':106 'geti2p.net':18,34 'geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor)':17 'geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':33 'guid':27 'hope':114 'i2p':13,20,39,54,100,111 'info':32 'interest':31 'librari':90 'libtorr':88 'load':110 'mani':11 'misconfigur':120 'most':23 'network':6 'overload':133 'part':123 'probabl':73 'program':89 'publish':69 'qbittorr':53 'quit':47,102 'releas':70 'right':98 'site':128 'slow':103 'specif':127 'support':38,55,83 'term':108 'time':49 'tor':15 'tri':63,130 'use':52,93 'version':59,72 'way':45 'websit':112 'work':8,77"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1446252"
+editedAt: DateTimeImmutable @1697887925 {#1440
date: 2023-10-21 13:32:05.0 +02:00
}
+createdAt: DateTimeImmutable @1697887206 {#1434
date: 2023-10-21 13:20:06.0 +02:00
}
+"title": 62781
}
]
-id: 6808
-titleTs: "'psa':1 'tor':6 'torrent':4"
-bodyTs: "'1':1 '2':32 '3':39 'actual':29 'address':31 'anonym':7,14,47 'design':12 'doesn':3,42 'give':44 'go':25 'hurt':52 'ip':30 'leak':27 'make':5 'million':21 'mind':16 'network':38,54 'protocol':9 're':24 'tcp':36 'tor':33 'torrent':8 'user':57 'want':49 'wasn':10 'way':22"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697969159
+visibility: "visible "
+apId: "https://programming.dev/post/4694754"
+editedAt: null
+createdAt: DateTimeImmutable @1697882759 {#2132
date: 2023-10-21 12:05:59.0 +02:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1582
+user: Proxies\__CG__\App\Entity\User {#2384 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: Proxies\__CG__\App\Entity\Image {#2285 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2284 …}
+slug: "PSA-Don-t-torrent-over-TOR"
+title: "PSA: Don't torrent over TOR"
+url: "https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor"
+body: """
1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.\n
2. Tor is a TCP only network.\n
3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 100
+favouriteCount: 624
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699287082 {#2253
date: 2023-11-06 17:11:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2034 …}
+reports: Doctrine\ORM\PersistentCollection {#2286 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2156 …}
+badges: Doctrine\ORM\PersistentCollection {#2154 …}
+children: [
App\Entity\EntryComment {#1606
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1582 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
+body: """
It is a different anonymity network, which works differently in many aspects.\n
\n
I2P and Tor comparison: [geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor) \n
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): [geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)\n
\n
Currently BiglyBt supports I2P and it has been that way for quite some time. \n
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.\n
\n
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 21
+score: 0
+lastActive: DateTime @1697887206 {#1428
date: 2023-10-21 13:20:06.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@onlinepersona@programming.dev"
"@supervent@lemmy.dbzer0.com"
"@atlasraven31@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#1671 …}
+nested: Doctrine\ORM\PersistentCollection {#1667 …}
+votes: Doctrine\ORM\PersistentCollection {#1670 …}
+reports: Doctrine\ORM\PersistentCollection {#1678 …}
+favourites: Doctrine\ORM\PersistentCollection {#1551 …}
+notifications: Doctrine\ORM\PersistentCollection {#1586 …}
-id: 62781
-bodyTs: "'/en/comparison/tor](https://geti2p.net/en/comparison/tor)':19 '/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':35 '4.6':60 'anonym':5 'aspect':12 'biglybt':37 'bittorr':22 'candid':71 'client':25,75,96 'come':57,85 'comparison':16 'current':36 'dev':26 'differ':4,9 'experi':106 'geti2p.net':18,34 'geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor)':17 'geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':33 'guid':27 'hope':114 'i2p':13,20,39,54,100,111 'info':32 'interest':31 'librari':90 'libtorr':88 'load':110 'mani':11 'misconfigur':120 'most':23 'network':6 'overload':133 'part':123 'probabl':73 'program':89 'publish':69 'qbittorr':53 'quit':47,102 'releas':70 'right':98 'site':128 'slow':103 'specif':127 'support':38,55,83 'term':108 'time':49 'tor':15 'tri':63,130 'use':52,93 'version':59,72 'way':45 'websit':112 'work':8,77"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1446252"
+editedAt: DateTimeImmutable @1697887925 {#1440
date: 2023-10-21 13:32:05.0 +02:00
}
+createdAt: DateTimeImmutable @1697887206 {#1434
date: 2023-10-21 13:20:06.0 +02:00
}
+"title": 62781
}
]
-id: 6808
-titleTs: "'psa':1 'tor':6 'torrent':4"
-bodyTs: "'1':1 '2':32 '3':39 'actual':29 'address':31 'anonym':7,14,47 'design':12 'doesn':3,42 'give':44 'go':25 'hurt':52 'ip':30 'leak':27 'make':5 'million':21 'mind':16 'network':38,54 'protocol':9 're':24 'tcp':36 'tor':33 'torrent':8 'user':57 'want':49 'wasn':10 'way':22"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697969159
+visibility: "visible "
+apId: "https://programming.dev/post/4694754"
+editedAt: null
+createdAt: DateTimeImmutable @1697882759 {#2132
date: 2023-10-21 12:05:59.0 +02:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1606
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1582
+user: Proxies\__CG__\App\Entity\User {#2384 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: Proxies\__CG__\App\Entity\Image {#2285 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2284 …}
+slug: "PSA-Don-t-torrent-over-TOR"
+title: "PSA: Don't torrent over TOR"
+url: "https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor"
+body: """
1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.\n
2. Tor is a TCP only network.\n
3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 100
+favouriteCount: 624
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699287082 {#2253
date: 2023-11-06 17:11:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2034 …}
+reports: Doctrine\ORM\PersistentCollection {#2286 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2156 …}
+badges: Doctrine\ORM\PersistentCollection {#2154 …}
+children: [
App\Entity\EntryComment {#1606}
]
-id: 6808
-titleTs: "'psa':1 'tor':6 'torrent':4"
-bodyTs: "'1':1 '2':32 '3':39 'actual':29 'address':31 'anonym':7,14,47 'design':12 'doesn':3,42 'give':44 'go':25 'hurt':52 'ip':30 'leak':27 'make':5 'million':21 'mind':16 'network':38,54 'protocol':9 're':24 'tcp':36 'tor':33 'torrent':8 'user':57 'want':49 'wasn':10 'way':22"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697969159
+visibility: "visible "
+apId: "https://programming.dev/post/4694754"
+editedAt: null
+createdAt: DateTimeImmutable @1697882759 {#2132
date: 2023-10-21 12:05:59.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
+body: """
It is a different anonymity network, which works differently in many aspects.\n
\n
I2P and Tor comparison: [geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor) \n
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): [geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)\n
\n
Currently BiglyBt supports I2P and it has been that way for quite some time. \n
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.\n
\n
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 21
+score: 0
+lastActive: DateTime @1697887206 {#1428
date: 2023-10-21 13:20:06.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@onlinepersona@programming.dev"
"@supervent@lemmy.dbzer0.com"
"@atlasraven31@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#1671 …}
+nested: Doctrine\ORM\PersistentCollection {#1667 …}
+votes: Doctrine\ORM\PersistentCollection {#1670 …}
+reports: Doctrine\ORM\PersistentCollection {#1678 …}
+favourites: Doctrine\ORM\PersistentCollection {#1551 …}
+notifications: Doctrine\ORM\PersistentCollection {#1586 …}
-id: 62781
-bodyTs: "'/en/comparison/tor](https://geti2p.net/en/comparison/tor)':19 '/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':35 '4.6':60 'anonym':5 'aspect':12 'biglybt':37 'bittorr':22 'candid':71 'client':25,75,96 'come':57,85 'comparison':16 'current':36 'dev':26 'differ':4,9 'experi':106 'geti2p.net':18,34 'geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor)':17 'geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':33 'guid':27 'hope':114 'i2p':13,20,39,54,100,111 'info':32 'interest':31 'librari':90 'libtorr':88 'load':110 'mani':11 'misconfigur':120 'most':23 'network':6 'overload':133 'part':123 'probabl':73 'program':89 'publish':69 'qbittorr':53 'quit':47,102 'releas':70 'right':98 'site':128 'slow':103 'specif':127 'support':38,55,83 'term':108 'time':49 'tor':15 'tri':63,130 'use':52,93 'version':59,72 'way':45 'websit':112 'work':8,77"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1446252"
+editedAt: DateTimeImmutable @1697887925 {#1440
date: 2023-10-21 13:32:05.0 +02:00
}
+createdAt: DateTimeImmutable @1697887206 {#1434
date: 2023-10-21 13:20:06.0 +02:00
}
+"title": 62781
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\EntryComment {#1606
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1582
+user: Proxies\__CG__\App\Entity\User {#2384 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: Proxies\__CG__\App\Entity\Image {#2285 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2284 …}
+slug: "PSA-Don-t-torrent-over-TOR"
+title: "PSA: Don't torrent over TOR"
+url: "https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor"
+body: """
1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.\n
2. Tor is a TCP only network.\n
3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 100
+favouriteCount: 624
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699287082 {#2253
date: 2023-11-06 17:11:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2034 …}
+reports: Doctrine\ORM\PersistentCollection {#2286 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2156 …}
+badges: Doctrine\ORM\PersistentCollection {#2154 …}
+children: [
App\Entity\EntryComment {#1606}
]
-id: 6808
-titleTs: "'psa':1 'tor':6 'torrent':4"
-bodyTs: "'1':1 '2':32 '3':39 'actual':29 'address':31 'anonym':7,14,47 'design':12 'doesn':3,42 'give':44 'go':25 'hurt':52 'ip':30 'leak':27 'make':5 'million':21 'mind':16 'network':38,54 'protocol':9 're':24 'tcp':36 'tor':33 'torrent':8 'user':57 'want':49 'wasn':10 'way':22"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697969159
+visibility: "visible "
+apId: "https://programming.dev/post/4694754"
+editedAt: null
+createdAt: DateTimeImmutable @1697882759 {#2132
date: 2023-10-21 12:05:59.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
+body: """
It is a different anonymity network, which works differently in many aspects.\n
\n
I2P and Tor comparison: [geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor) \n
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): [geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)\n
\n
Currently BiglyBt supports I2P and it has been that way for quite some time. \n
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.\n
\n
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 21
+score: 0
+lastActive: DateTime @1697887206 {#1428
date: 2023-10-21 13:20:06.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@onlinepersona@programming.dev"
"@supervent@lemmy.dbzer0.com"
"@atlasraven31@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#1671 …}
+nested: Doctrine\ORM\PersistentCollection {#1667 …}
+votes: Doctrine\ORM\PersistentCollection {#1670 …}
+reports: Doctrine\ORM\PersistentCollection {#1678 …}
+favourites: Doctrine\ORM\PersistentCollection {#1551 …}
+notifications: Doctrine\ORM\PersistentCollection {#1586 …}
-id: 62781
-bodyTs: "'/en/comparison/tor](https://geti2p.net/en/comparison/tor)':19 '/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':35 '4.6':60 'anonym':5 'aspect':12 'biglybt':37 'bittorr':22 'candid':71 'client':25,75,96 'come':57,85 'comparison':16 'current':36 'dev':26 'differ':4,9 'experi':106 'geti2p.net':18,34 'geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor)':17 'geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':33 'guid':27 'hope':114 'i2p':13,20,39,54,100,111 'info':32 'interest':31 'librari':90 'libtorr':88 'load':110 'mani':11 'misconfigur':120 'most':23 'network':6 'overload':133 'part':123 'probabl':73 'program':89 'publish':69 'qbittorr':53 'quit':47,102 'releas':70 'right':98 'site':128 'slow':103 'specif':127 'support':38,55,83 'term':108 'time':49 'tor':15 'tri':63,130 'use':52,93 'version':59,72 'way':45 'websit':112 'work':8,77"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1446252"
+editedAt: DateTimeImmutable @1697887925 {#1440
date: 2023-10-21 13:32:05.0 +02:00
}
+createdAt: DateTimeImmutable @1697887206 {#1434
date: 2023-10-21 13:20:06.0 +02:00
}
+"title": 62781
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1606
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1582
+user: Proxies\__CG__\App\Entity\User {#2384 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: Proxies\__CG__\App\Entity\Image {#2285 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2284 …}
+slug: "PSA-Don-t-torrent-over-TOR"
+title: "PSA: Don't torrent over TOR"
+url: "https://tor.stackexchange.com/questions/64/how-can-bittorrent-traffic-be-anonymized-with-tor"
+body: """
1. It doesn’t make you anonymous. Torrent protocol wasn’t designed with anonymity in mind and there are a million ways you’re going to leak your actual IP address.\n
2. Tor is a TCP only network.\n
3. While this doesn’t give you the anonymity you wanted, it will hurt the network for other users.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 100
+favouriteCount: 624
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699287082 {#2253
date: 2023-11-06 17:11:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2251 …}
+votes: Doctrine\ORM\PersistentCollection {#2034 …}
+reports: Doctrine\ORM\PersistentCollection {#2286 …}
+favourites: Doctrine\ORM\PersistentCollection {#2142 …}
+notifications: Doctrine\ORM\PersistentCollection {#2156 …}
+badges: Doctrine\ORM\PersistentCollection {#2154 …}
+children: [
App\Entity\EntryComment {#1606}
]
-id: 6808
-titleTs: "'psa':1 'tor':6 'torrent':4"
-bodyTs: "'1':1 '2':32 '3':39 'actual':29 'address':31 'anonym':7,14,47 'design':12 'doesn':3,42 'give':44 'go':25 'hurt':52 'ip':30 'leak':27 'make':5 'million':21 'mind':16 'network':38,54 'protocol':9 're':24 'tcp':36 'tor':33 'torrent':8 'user':57 'want':49 'wasn':10 'way':22"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697969159
+visibility: "visible "
+apId: "https://programming.dev/post/4694754"
+editedAt: null
+createdAt: DateTimeImmutable @1697882759 {#2132
date: 2023-10-21 12:05:59.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
+body: """
It is a different anonymity network, which works differently in many aspects.\n
\n
I2P and Tor comparison: [geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor) \n
I2P on Bittorrent (mostly a client dev guide, but has some interesting info): [geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)\n
\n
Currently BiglyBt supports I2P and it has been that way for quite some time. \n
If you use qBittorrent, I2P support will come in version 4.6. you can try it out now with the published release candidate version. Probably other clients are working on it too as the support is coming from the libtorrent programming library, which is used by other clients too.\n
\n
Right now, I2P is quite slow in my experience, in terms of loading I2P websites. I hope that it’s just a misconfiguration on my part, or that these specific sites I tried are just overloaded.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 21
+score: 0
+lastActive: DateTime @1697887206 {#1428
date: 2023-10-21 13:20:06.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@onlinepersona@programming.dev"
"@supervent@lemmy.dbzer0.com"
"@atlasraven31@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#1671 …}
+nested: Doctrine\ORM\PersistentCollection {#1667 …}
+votes: Doctrine\ORM\PersistentCollection {#1670 …}
+reports: Doctrine\ORM\PersistentCollection {#1678 …}
+favourites: Doctrine\ORM\PersistentCollection {#1551 …}
+notifications: Doctrine\ORM\PersistentCollection {#1586 …}
-id: 62781
-bodyTs: "'/en/comparison/tor](https://geti2p.net/en/comparison/tor)':19 '/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':35 '4.6':60 'anonym':5 'aspect':12 'biglybt':37 'bittorr':22 'candid':71 'client':25,75,96 'come':57,85 'comparison':16 'current':36 'dev':26 'differ':4,9 'experi':106 'geti2p.net':18,34 'geti2p.net/en/comparison/tor](https://geti2p.net/en/comparison/tor)':17 'geti2p.net/en/docs/applications/bittorrent](https://geti2p.net/en/docs/applications/bittorrent)':33 'guid':27 'hope':114 'i2p':13,20,39,54,100,111 'info':32 'interest':31 'librari':90 'libtorr':88 'load':110 'mani':11 'misconfigur':120 'most':23 'network':6 'overload':133 'part':123 'probabl':73 'program':89 'publish':69 'qbittorr':53 'quit':47,102 'releas':70 'right':98 'site':128 'slow':103 'specif':127 'support':38,55,83 'term':108 'time':49 'tor':15 'tri':63,130 'use':52,93 'version':59,72 'way':45 'websit':112 'work':8,77"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1446252"
+editedAt: DateTimeImmutable @1697887925 {#1440
date: 2023-10-21 13:32:05.0 +02:00
}
+createdAt: DateTimeImmutable @1697887206 {#1434
date: 2023-10-21 13:20:06.0 +02:00
}
+"title": 62781
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
} |
|
Show voter details
|
17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
18 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
} |
|
Show voter details
|
19 |
DENIED
|
edit
|
App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
} |
|
Show voter details
|
20 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596}
0 => App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
} |
|
Show voter details
|
21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
22 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
} |
|
Show voter details
|
23 |
DENIED
|
edit
|
App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
} |
|
Show voter details
|
24 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1611
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550
+user: Proxies\__CG__\App\Entity\User {#2359 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2297 …}
+slug: "Faking-Pixel-5a"
+title: "Faking Pixel 5a"
+url: null
+body: "I’ve read on reddit that Google still provides unlimited photos backup if you own Pixel 5a and lower. On rooted Android you can fake that and get free backup storage, but who wants to give pictures to Google?! I was thinking if it’s possible or done by someone to create an environment on Docker by faking device info to access that free storage and backup rclone crypted files as images (by .jpeg fake extension or something)?"
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 30
+favouriteCount: 84
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1699050001 {#1723
date: 2023-11-03 23:20:01.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2293 …}
+votes: Doctrine\ORM\PersistentCollection {#2298 …}
+reports: Doctrine\ORM\PersistentCollection {#2044 …}
+favourites: Doctrine\ORM\PersistentCollection {#2270 …}
+notifications: Doctrine\ORM\PersistentCollection {#2209 …}
+badges: Doctrine\ORM\PersistentCollection {#2263 …}
+children: [
1 => App\Entity\EntryComment {#1548
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1561 …}
+body: """
The hard part of the problem is not spoofing the pixel, but preserving your privacy.\n
\n
Your solution solves the easier problem, but it doesn’t preserve your privacy.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1697924468 {#1579
date: 2023-10-21 23:41:08.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@randombullet@feddit.de"
]
+children: Doctrine\ORM\PersistentCollection {#1525 …}
+nested: Doctrine\ORM\PersistentCollection {#1566 …}
+votes: Doctrine\ORM\PersistentCollection {#1562 …}
+reports: Doctrine\ORM\PersistentCollection {#1554 …}
+favourites: Doctrine\ORM\PersistentCollection {#1556 …}
+notifications: Doctrine\ORM\PersistentCollection {#1555 …}
-id: 63661
-bodyTs: "'doesn':24 'easier':20 'hard':2 'part':3 'pixel':11 'preserv':13,26 'privaci':15,28 'problem':6,21 'solut':17 'solv':18 'spoof':9"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449295"
+editedAt: null
+createdAt: DateTimeImmutable @1697924468 {#1559
date: 2023-10-21 23:41:08.0 +02:00
}
+"title": 63661
}
2 => App\Entity\EntryComment {#1596
+user: App\Entity\User {#265 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1550 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: null
+root: null
+body: """
Recently I’ve read a comment here on Lemmy about someone who keeps an old pixel at home on a charger, and runs Syncthing on it to sync pictures to the phone so they will get automatically uploaded. \n
If you were to go that way, you could obfuscate your images before copying to the syncthing shared folder. If you were to encrypt it, be sure to only encrypt the content of the images, to keep any headers and such so that google still sees it as an image. You may try with encrypting the whole file, you’ll have to try it out if that works.\n
\n
Other things that may be interesting:\n
\n
- several years ago (2-3?) I’ve heard of a fork of the Simple Gallery app (the orange gallery app on fdroid) that if I remember correctly encrypted your photos and uploaded them that way to google photos. In google photos they were “viewable”, but they were just noise\n
- you mentioned Docker, so I suspect you’re not afraid of selfhosting. If you have the storage, you may like Immich. It’s basically a google photos clone. App on f-droid.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 4
+score: 0
+lastActive: DateTime @1697925328 {#1620
date: 2023-10-21 23:55:28.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1619 …}
+nested: Doctrine\ORM\PersistentCollection {#1701 …}
+votes: Doctrine\ORM\PersistentCollection {#1687 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1691 …}
+notifications: Doctrine\ORM\PersistentCollection {#1795 …}
-id: 63672
-bodyTs: "'-3':117 '2':116 'afraid':171 'ago':115 'app':128,132,190 'automat':37 'basic':185 'charger':21 'clone':189 'comment':6 'content':70 'copi':52 'correct':139 'could':47 'docker':164 'droid':194 'encrypt':62,68,93,140 'f':193 'f-droid':192 'fdroid':134 'file':96 'folder':57 'fork':123 'galleri':127,131 'get':36 'go':43 'googl':82,149,152,187 'header':77 'heard':120 'home':18 'imag':50,73,88 'immich':182 'interest':112 'keep':13,75 'lemmi':9 'like':181 'll':98 'may':90,110,180 'mention':163 'nois':161 'obfusc':48 'old':15 'orang':130 'phone':32 'photo':142,150,153,188 'pictur':29 'pixel':16 're':169 'read':4 'recent':1 'rememb':138 'run':23 'see':84 'selfhost':173 'sever':113 'share':56 'simpl':126 'someon':11 'still':83 'storag':178 'sure':65 'suspect':167 'sync':28 'syncth':24,55 'thing':108 'tri':91,101 'upload':38,144 've':3,119 'viewabl':156 'way':45,147 'whole':95 'work':106 'year':114"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449345"
+editedAt: DateTimeImmutable @1697925120 {#1613
date: 2023-10-21 23:52:00.0 +02:00
}
+createdAt: DateTimeImmutable @1697924994 {#1604
date: 2023-10-21 23:49:54.0 +02:00
}
+"title": 63672
}
0 => App\Entity\EntryComment {#1611}
]
-id: 6780
-titleTs: "'5a':3 'fake':1 'pixel':2"
-bodyTs: "'5a':17 'access':62 'android':22 'backup':12,30,67 'creat':52 'crypt':69 'devic':59 'docker':56 'done':48 'environ':54 'extens':76 'fake':25,58,75 'file':70 'free':29,64 'get':28 'give':36 'googl':7,39 'imag':72 'info':60 'jpeg':74 'lower':19 'photo':11 'pictur':37 'pixel':16 'possibl':46 'provid':9 'rclone':68 'read':3 'reddit':5 'root':21 'someon':50 'someth':78 'still':8 'storag':31,65 'think':42 'unlimit':10 've':2 'want':34"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1697954371
+visibility: "visible "
+apId: "https://lemmy.ml/post/6795944"
+editedAt: null
+createdAt: DateTimeImmutable @1697867971 {#2392
date: 2023-10-21 07:59:31.0 +02:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1574 …}
+image: null
+parent: App\Entity\EntryComment {#1596}
+root: App\Entity\EntryComment {#1596}
+body: """
I think I have found that app\n
\n
- […columbia.edu/…/encrypting-cloud-photos](https://www.engineering.columbia.edu/news/encrypting-cloud-photos)\n
- [www.cs.columbia.edu/~nieh/…/mobisys2021_esp.pdf](https://www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)\n
- [helpnetsecurity.com/…/image-encryption-technique/](https://www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)
"""
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1697925324 {#1711
date: 2023-10-21 23:55:24.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@Gargari@lemmy.ml"
"@ReversalHatchery@beehaw.org"
]
+children: Doctrine\ORM\PersistentCollection {#1598 …}
+nested: Doctrine\ORM\PersistentCollection {#1629 …}
+votes: Doctrine\ORM\PersistentCollection {#1626 …}
+reports: Doctrine\ORM\PersistentCollection {#1618 …}
+favourites: Doctrine\ORM\PersistentCollection {#1597 …}
+notifications: Doctrine\ORM\PersistentCollection {#1731 …}
-id: 63681
-bodyTs: "'/2021/07/21/image-encryption-technique/)':24 '/encrypting-cloud-photos':9 '/image-encryption-technique':21 '/mobisys2021_esp.pdf':16 '/news/encrypting-cloud-photos)':12 '/~nieh/':15 '/~nieh/pubs/mobisys2021_esp.pdf)':19 'app':7 'columbia.edu':8 'found':5 'helpnetsecurity.com':20 'think':2 'www.cs.columbia.edu':14,18 'www.cs.columbia.edu/~nieh/':13 'www.cs.columbia.edu/~nieh/pubs/mobisys2021_esp.pdf)':17 'www.engineering.columbia.edu':11 'www.engineering.columbia.edu/news/encrypting-cloud-photos)':10 'www.helpnetsecurity.com':23 'www.helpnetsecurity.com/2021/07/21/image-encryption-technique/)':22"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://beehaw.org/comment/1449379"
+editedAt: null
+createdAt: DateTimeImmutable @1697925324 {#1616
date: 2023-10-21 23:55:24.0 +02:00
}
+"title": 63681
} |
|
Show voter details
|
25 |
DENIED
|
ROLE_ADMIN
|
null |
|
Show voter details
|
26 |
DENIED
|
ROLE_MODERATOR
|
null |
|
Show voter details
|