1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#1358
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#1356 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1355 …}
+slug: "Privacy-Checkup-Quiz-How-well-do-you-protect-your-privacy"
+title: "Privacy Checkup Quiz: How well do you protect your privacy and security?"
+url: "https://privacy-checkup.info/en"
+body: """
cross-posted from: [lemmy.world/post/11275170](https://lemmy.world/post/11275170)\n
\n
> > The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data.\n
> \n
> > How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage.\n
> \n
> > On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements.\n
> \n
> - The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy.\n
> \n
> [Source](https://threema.ch/en/blog/posts/privacy-checkup)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 18
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729550030 {#1353
date: 2024-10-22 00:33:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1357 …}
+votes: Doctrine\ORM\PersistentCollection {#2492 …}
+reports: Doctrine\ORM\PersistentCollection {#2494 …}
+favourites: Doctrine\ORM\PersistentCollection {#2496 …}
+notifications: Doctrine\ORM\PersistentCollection {#2498 …}
+badges: Doctrine\ORM\PersistentCollection {#2500 …}
+children: []
-id: 33587
-titleTs: "'checkup':2 'privaci':1,10 'protect':8 'quiz':3 'secur':12 'well':5"
-bodyTs: "'/en)':13,166 '/en/blog/posts/open-letter-csa-regulation),':202 '/en/blog/posts/privacy-checkup)':234 '/en/recommendations)':150 '/post/11275170](https://lemmy.world/post/11275170)':7 '2024':210 '28':209 'ad':110 'annual':217 'answer':55,64,88 'awar':227 'base':47 'behavior':28 'better':142 'calcul':43,45 'categori':50 'celebr':169 'chat':198 'checkup':10,124,126,157 'combin':114 'complet':121 'consequ':25 'control':199 'council':224 'creat':116 'cross':2 'cross-post':1 'data':39,170,179,213 'day':215 'develop':159 'eu':197 'european':223 'even':141 'event':218 'everyday':20 'exampl':21,61 'explain':129 'fulfil':152 'independ':175 'initi':220 'interact':16 'januari':208 'lemmy.world':6 'lemmy.world/post/11275170](https://lemmy.world/post/11275170)':5 'less':71 'letter':190 'list':131 'one':83 'onlin':27,229 'open':189 'particular':66 'percentag':119 'perspect':98 'point':79,103,107 'post':3 'privaci':9,33,51,69,81,94,123,140,156,162,171,180,214,230 'privacy-checkup.info':12,149 'privacy-checkup.info/en)':11 'privacy-checkup.info/en/recommendations)':148 'privacy-training.info':165 'privacy-training.info/en)':164 'project':167 'propos':196 'protect':37,138 'publish':187 'questionnair':17 'rais':226 'recommend':147 'regard':31 'relev':67 'report':127 'requir':154 'result':42 'round':205 'secur':53,74,85,97 'show':23 'singl':118 'softwar':146 'sourc':231 'start':184 'step':133 'strict':153 'support':176 'take':136 'therefor':56 'three':78 'threema':178 'threema.ch':201,233 'threema.ch/en/blog/posts/open-letter-csa-regulation),':200 'threema.ch/en/blog/posts/privacy-checkup)':232 'topic':193 'train':163 'two':49,58 'unfavor':90 'use':19 'valu':59 'week':172,181 'weight':112 'well':144 'zero':102"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706494194
+visibility: "visible "
+apId: "https://lemmy.world/post/11275213"
+editedAt: null
+createdAt: DateTimeImmutable @1706426194 {#1354
date: 2024-01-28 08:16:34.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#1358
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#1356 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1355 …}
+slug: "Privacy-Checkup-Quiz-How-well-do-you-protect-your-privacy"
+title: "Privacy Checkup Quiz: How well do you protect your privacy and security?"
+url: "https://privacy-checkup.info/en"
+body: """
cross-posted from: [lemmy.world/post/11275170](https://lemmy.world/post/11275170)\n
\n
> > The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data.\n
> \n
> > How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage.\n
> \n
> > On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements.\n
> \n
> - The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy.\n
> \n
> [Source](https://threema.ch/en/blog/posts/privacy-checkup)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 18
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729550030 {#1353
date: 2024-10-22 00:33:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1357 …}
+votes: Doctrine\ORM\PersistentCollection {#2492 …}
+reports: Doctrine\ORM\PersistentCollection {#2494 …}
+favourites: Doctrine\ORM\PersistentCollection {#2496 …}
+notifications: Doctrine\ORM\PersistentCollection {#2498 …}
+badges: Doctrine\ORM\PersistentCollection {#2500 …}
+children: []
-id: 33587
-titleTs: "'checkup':2 'privaci':1,10 'protect':8 'quiz':3 'secur':12 'well':5"
-bodyTs: "'/en)':13,166 '/en/blog/posts/open-letter-csa-regulation),':202 '/en/blog/posts/privacy-checkup)':234 '/en/recommendations)':150 '/post/11275170](https://lemmy.world/post/11275170)':7 '2024':210 '28':209 'ad':110 'annual':217 'answer':55,64,88 'awar':227 'base':47 'behavior':28 'better':142 'calcul':43,45 'categori':50 'celebr':169 'chat':198 'checkup':10,124,126,157 'combin':114 'complet':121 'consequ':25 'control':199 'council':224 'creat':116 'cross':2 'cross-post':1 'data':39,170,179,213 'day':215 'develop':159 'eu':197 'european':223 'even':141 'event':218 'everyday':20 'exampl':21,61 'explain':129 'fulfil':152 'independ':175 'initi':220 'interact':16 'januari':208 'lemmy.world':6 'lemmy.world/post/11275170](https://lemmy.world/post/11275170)':5 'less':71 'letter':190 'list':131 'one':83 'onlin':27,229 'open':189 'particular':66 'percentag':119 'perspect':98 'point':79,103,107 'post':3 'privaci':9,33,51,69,81,94,123,140,156,162,171,180,214,230 'privacy-checkup.info':12,149 'privacy-checkup.info/en)':11 'privacy-checkup.info/en/recommendations)':148 'privacy-training.info':165 'privacy-training.info/en)':164 'project':167 'propos':196 'protect':37,138 'publish':187 'questionnair':17 'rais':226 'recommend':147 'regard':31 'relev':67 'report':127 'requir':154 'result':42 'round':205 'secur':53,74,85,97 'show':23 'singl':118 'softwar':146 'sourc':231 'start':184 'step':133 'strict':153 'support':176 'take':136 'therefor':56 'three':78 'threema':178 'threema.ch':201,233 'threema.ch/en/blog/posts/open-letter-csa-regulation),':200 'threema.ch/en/blog/posts/privacy-checkup)':232 'topic':193 'train':163 'two':49,58 'unfavor':90 'use':19 'valu':59 'week':172,181 'weight':112 'well':144 'zero':102"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706494194
+visibility: "visible "
+apId: "https://lemmy.world/post/11275213"
+editedAt: null
+createdAt: DateTimeImmutable @1706426194 {#1354
date: 2024-01-28 08:16:34.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1358
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#1356 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1355 …}
+slug: "Privacy-Checkup-Quiz-How-well-do-you-protect-your-privacy"
+title: "Privacy Checkup Quiz: How well do you protect your privacy and security?"
+url: "https://privacy-checkup.info/en"
+body: """
cross-posted from: [lemmy.world/post/11275170](https://lemmy.world/post/11275170)\n
\n
> > The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data.\n
> \n
> > How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage.\n
> \n
> > On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements.\n
> \n
> - The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy.\n
> \n
> [Source](https://threema.ch/en/blog/posts/privacy-checkup)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 18
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729550030 {#1353
date: 2024-10-22 00:33:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1357 …}
+votes: Doctrine\ORM\PersistentCollection {#2492 …}
+reports: Doctrine\ORM\PersistentCollection {#2494 …}
+favourites: Doctrine\ORM\PersistentCollection {#2496 …}
+notifications: Doctrine\ORM\PersistentCollection {#2498 …}
+badges: Doctrine\ORM\PersistentCollection {#2500 …}
+children: []
-id: 33587
-titleTs: "'checkup':2 'privaci':1,10 'protect':8 'quiz':3 'secur':12 'well':5"
-bodyTs: "'/en)':13,166 '/en/blog/posts/open-letter-csa-regulation),':202 '/en/blog/posts/privacy-checkup)':234 '/en/recommendations)':150 '/post/11275170](https://lemmy.world/post/11275170)':7 '2024':210 '28':209 'ad':110 'annual':217 'answer':55,64,88 'awar':227 'base':47 'behavior':28 'better':142 'calcul':43,45 'categori':50 'celebr':169 'chat':198 'checkup':10,124,126,157 'combin':114 'complet':121 'consequ':25 'control':199 'council':224 'creat':116 'cross':2 'cross-post':1 'data':39,170,179,213 'day':215 'develop':159 'eu':197 'european':223 'even':141 'event':218 'everyday':20 'exampl':21,61 'explain':129 'fulfil':152 'independ':175 'initi':220 'interact':16 'januari':208 'lemmy.world':6 'lemmy.world/post/11275170](https://lemmy.world/post/11275170)':5 'less':71 'letter':190 'list':131 'one':83 'onlin':27,229 'open':189 'particular':66 'percentag':119 'perspect':98 'point':79,103,107 'post':3 'privaci':9,33,51,69,81,94,123,140,156,162,171,180,214,230 'privacy-checkup.info':12,149 'privacy-checkup.info/en)':11 'privacy-checkup.info/en/recommendations)':148 'privacy-training.info':165 'privacy-training.info/en)':164 'project':167 'propos':196 'protect':37,138 'publish':187 'questionnair':17 'rais':226 'recommend':147 'regard':31 'relev':67 'report':127 'requir':154 'result':42 'round':205 'secur':53,74,85,97 'show':23 'singl':118 'softwar':146 'sourc':231 'start':184 'step':133 'strict':153 'support':176 'take':136 'therefor':56 'three':78 'threema':178 'threema.ch':201,233 'threema.ch/en/blog/posts/open-letter-csa-regulation),':200 'threema.ch/en/blog/posts/privacy-checkup)':232 'topic':193 'train':163 'two':49,58 'unfavor':90 'use':19 'valu':59 'week':172,181 'weight':112 'well':144 'zero':102"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706494194
+visibility: "visible "
+apId: "https://lemmy.world/post/11275213"
+editedAt: null
+createdAt: DateTimeImmutable @1706426194 {#1354
date: 2024-01-28 08:16:34.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\Entry {#2521
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#1356 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1355 …}
+slug: "Privacy-Checkup-Quiz-How-well-do-you-protect-your-privacy"
+title: "Privacy Checkup Quiz: How well do you protect your privacy and security?"
+url: "https://privacy-checkup.info/en"
+body: """
> The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data.\n
\n
> How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage.\n
\n
> On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements.\n
\n
- The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy.\n
\n
[Source](https://threema.ch/en/blog/posts/privacy-checkup)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 32
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729126310 {#2519
date: 2024-10-17 02:51:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2522 …}
+votes: Doctrine\ORM\PersistentCollection {#2524 …}
+reports: Doctrine\ORM\PersistentCollection {#2526 …}
+favourites: Doctrine\ORM\PersistentCollection {#2528 …}
+notifications: Doctrine\ORM\PersistentCollection {#2530 …}
+badges: Doctrine\ORM\PersistentCollection {#2532 …}
+children: []
-id: 33586
-titleTs: "'checkup':2 'privaci':1,10 'protect':8 'quiz':3 'secur':12 'well':5"
-bodyTs: "'/en)':6,159 '/en/blog/posts/open-letter-csa-regulation),':195 '/en/blog/posts/privacy-checkup)':227 '/en/recommendations)':143 '2024':203 '28':202 'ad':103 'annual':210 'answer':48,57,81 'awar':220 'base':40 'behavior':21 'better':135 'calcul':36,38 'categori':43 'celebr':162 'chat':191 'checkup':3,117,119,150 'combin':107 'complet':114 'consequ':18 'control':192 'council':217 'creat':109 'data':32,163,172,206 'day':208 'develop':152 'eu':190 'european':216 'even':134 'event':211 'everyday':13 'exampl':14,54 'explain':122 'fulfil':145 'independ':168 'initi':213 'interact':9 'januari':201 'less':64 'letter':183 'list':124 'one':76 'onlin':20,222 'open':182 'particular':59 'percentag':112 'perspect':91 'point':72,96,100 'privaci':2,26,44,62,74,87,116,133,149,155,164,173,207,223 'privacy-checkup.info':5,142 'privacy-checkup.info/en)':4 'privacy-checkup.info/en/recommendations)':141 'privacy-training.info':158 'privacy-training.info/en)':157 'project':160 'propos':189 'protect':30,131 'publish':180 'questionnair':10 'rais':219 'recommend':140 'regard':24 'relev':60 'report':120 'requir':147 'result':35 'round':198 'secur':46,67,78,90 'show':16 'singl':111 'softwar':139 'sourc':224 'start':177 'step':126 'strict':146 'support':169 'take':129 'therefor':49 'three':71 'threema':171 'threema.ch':194,226 'threema.ch/en/blog/posts/open-letter-csa-regulation),':193 'threema.ch/en/blog/posts/privacy-checkup)':225 'topic':186 'train':156 'two':42,51 'unfavor':83 'use':12 'valu':52 'week':165,174 'weight':105 'well':137 'zero':95"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706512540
+visibility: "visible "
+apId: "https://lemmy.world/post/11275170"
+editedAt: null
+createdAt: DateTimeImmutable @1706426140 {#2520
date: 2024-01-28 08:15:40.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\Entry {#2521
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#1356 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1355 …}
+slug: "Privacy-Checkup-Quiz-How-well-do-you-protect-your-privacy"
+title: "Privacy Checkup Quiz: How well do you protect your privacy and security?"
+url: "https://privacy-checkup.info/en"
+body: """
> The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data.\n
\n
> How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage.\n
\n
> On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements.\n
\n
- The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy.\n
\n
[Source](https://threema.ch/en/blog/posts/privacy-checkup)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 32
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729126310 {#2519
date: 2024-10-17 02:51:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2522 …}
+votes: Doctrine\ORM\PersistentCollection {#2524 …}
+reports: Doctrine\ORM\PersistentCollection {#2526 …}
+favourites: Doctrine\ORM\PersistentCollection {#2528 …}
+notifications: Doctrine\ORM\PersistentCollection {#2530 …}
+badges: Doctrine\ORM\PersistentCollection {#2532 …}
+children: []
-id: 33586
-titleTs: "'checkup':2 'privaci':1,10 'protect':8 'quiz':3 'secur':12 'well':5"
-bodyTs: "'/en)':6,159 '/en/blog/posts/open-letter-csa-regulation),':195 '/en/blog/posts/privacy-checkup)':227 '/en/recommendations)':143 '2024':203 '28':202 'ad':103 'annual':210 'answer':48,57,81 'awar':220 'base':40 'behavior':21 'better':135 'calcul':36,38 'categori':43 'celebr':162 'chat':191 'checkup':3,117,119,150 'combin':107 'complet':114 'consequ':18 'control':192 'council':217 'creat':109 'data':32,163,172,206 'day':208 'develop':152 'eu':190 'european':216 'even':134 'event':211 'everyday':13 'exampl':14,54 'explain':122 'fulfil':145 'independ':168 'initi':213 'interact':9 'januari':201 'less':64 'letter':183 'list':124 'one':76 'onlin':20,222 'open':182 'particular':59 'percentag':112 'perspect':91 'point':72,96,100 'privaci':2,26,44,62,74,87,116,133,149,155,164,173,207,223 'privacy-checkup.info':5,142 'privacy-checkup.info/en)':4 'privacy-checkup.info/en/recommendations)':141 'privacy-training.info':158 'privacy-training.info/en)':157 'project':160 'propos':189 'protect':30,131 'publish':180 'questionnair':10 'rais':219 'recommend':140 'regard':24 'relev':60 'report':120 'requir':147 'result':35 'round':198 'secur':46,67,78,90 'show':16 'singl':111 'softwar':139 'sourc':224 'start':177 'step':126 'strict':146 'support':169 'take':129 'therefor':49 'three':71 'threema':171 'threema.ch':194,226 'threema.ch/en/blog/posts/open-letter-csa-regulation),':193 'threema.ch/en/blog/posts/privacy-checkup)':225 'topic':186 'train':156 'two':42,51 'unfavor':83 'use':12 'valu':52 'week':165,174 'weight':105 'well':137 'zero':95"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706512540
+visibility: "visible "
+apId: "https://lemmy.world/post/11275170"
+editedAt: null
+createdAt: DateTimeImmutable @1706426140 {#2520
date: 2024-01-28 08:15:40.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\Entry {#2521
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#1356 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1355 …}
+slug: "Privacy-Checkup-Quiz-How-well-do-you-protect-your-privacy"
+title: "Privacy Checkup Quiz: How well do you protect your privacy and security?"
+url: "https://privacy-checkup.info/en"
+body: """
> The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data.\n
\n
> How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage.\n
\n
> On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements.\n
\n
- The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy.\n
\n
[Source](https://threema.ch/en/blog/posts/privacy-checkup)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 32
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729126310 {#2519
date: 2024-10-17 02:51:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2522 …}
+votes: Doctrine\ORM\PersistentCollection {#2524 …}
+reports: Doctrine\ORM\PersistentCollection {#2526 …}
+favourites: Doctrine\ORM\PersistentCollection {#2528 …}
+notifications: Doctrine\ORM\PersistentCollection {#2530 …}
+badges: Doctrine\ORM\PersistentCollection {#2532 …}
+children: []
-id: 33586
-titleTs: "'checkup':2 'privaci':1,10 'protect':8 'quiz':3 'secur':12 'well':5"
-bodyTs: "'/en)':6,159 '/en/blog/posts/open-letter-csa-regulation),':195 '/en/blog/posts/privacy-checkup)':227 '/en/recommendations)':143 '2024':203 '28':202 'ad':103 'annual':210 'answer':48,57,81 'awar':220 'base':40 'behavior':21 'better':135 'calcul':36,38 'categori':43 'celebr':162 'chat':191 'checkup':3,117,119,150 'combin':107 'complet':114 'consequ':18 'control':192 'council':217 'creat':109 'data':32,163,172,206 'day':208 'develop':152 'eu':190 'european':216 'even':134 'event':211 'everyday':13 'exampl':14,54 'explain':122 'fulfil':145 'independ':168 'initi':213 'interact':9 'januari':201 'less':64 'letter':183 'list':124 'one':76 'onlin':20,222 'open':182 'particular':59 'percentag':112 'perspect':91 'point':72,96,100 'privaci':2,26,44,62,74,87,116,133,149,155,164,173,207,223 'privacy-checkup.info':5,142 'privacy-checkup.info/en)':4 'privacy-checkup.info/en/recommendations)':141 'privacy-training.info':158 'privacy-training.info/en)':157 'project':160 'propos':189 'protect':30,131 'publish':180 'questionnair':10 'rais':219 'recommend':140 'regard':24 'relev':60 'report':120 'requir':147 'result':35 'round':198 'secur':46,67,78,90 'show':16 'singl':111 'softwar':139 'sourc':224 'start':177 'step':126 'strict':146 'support':169 'take':129 'therefor':49 'three':71 'threema':171 'threema.ch':194,226 'threema.ch/en/blog/posts/open-letter-csa-regulation),':193 'threema.ch/en/blog/posts/privacy-checkup)':225 'topic':186 'train':156 'two':42,51 'unfavor':83 'use':12 'valu':52 'week':165,174 'weight':105 'well':137 'zero':95"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706512540
+visibility: "visible "
+apId: "https://lemmy.world/post/11275170"
+editedAt: null
+createdAt: DateTimeImmutable @1706426140 {#2520
date: 2024-01-28 08:15:40.0 +01:00
}
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
App\Entity\Entry {#2259
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1619 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 130
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706376247 {#2249
date: 2024-01-27 18:24:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2260 …}
+votes: Doctrine\ORM\PersistentCollection {#2254 …}
+reports: Doctrine\ORM\PersistentCollection {#2246 …}
+favourites: Doctrine\ORM\PersistentCollection {#2248 …}
+notifications: Doctrine\ORM\PersistentCollection {#2247 …}
+badges: Doctrine\ORM\PersistentCollection {#2256 …}
+children: []
-id: 33481
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462647
+visibility: "visible "
+apId: "https://lemmy.world/post/11253421"
+editedAt: null
+createdAt: DateTimeImmutable @1706376247 {#2258
date: 2024-01-27 18:24:07.0 +01:00
}
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
App\Entity\Entry {#2259
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1619 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 130
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706376247 {#2249
date: 2024-01-27 18:24:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2260 …}
+votes: Doctrine\ORM\PersistentCollection {#2254 …}
+reports: Doctrine\ORM\PersistentCollection {#2246 …}
+favourites: Doctrine\ORM\PersistentCollection {#2248 …}
+notifications: Doctrine\ORM\PersistentCollection {#2247 …}
+badges: Doctrine\ORM\PersistentCollection {#2256 …}
+children: []
-id: 33481
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462647
+visibility: "visible "
+apId: "https://lemmy.world/post/11253421"
+editedAt: null
+createdAt: DateTimeImmutable @1706376247 {#2258
date: 2024-01-27 18:24:07.0 +01:00
}
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
App\Entity\Entry {#2259
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1619 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 130
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706376247 {#2249
date: 2024-01-27 18:24:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2260 …}
+votes: Doctrine\ORM\PersistentCollection {#2254 …}
+reports: Doctrine\ORM\PersistentCollection {#2246 …}
+favourites: Doctrine\ORM\PersistentCollection {#2248 …}
+notifications: Doctrine\ORM\PersistentCollection {#2247 …}
+badges: Doctrine\ORM\PersistentCollection {#2256 …}
+children: []
-id: 33481
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462647
+visibility: "visible "
+apId: "https://lemmy.world/post/11253421"
+editedAt: null
+createdAt: DateTimeImmutable @1706376247 {#2258
date: 2024-01-27 18:24:07.0 +01:00
}
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\Entry {#1585
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1619 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 132
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729118540 {#1574
date: 2024-10-17 00:42:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1702 …}
+votes: Doctrine\ORM\PersistentCollection {#1683 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1724 …}
+notifications: Doctrine\ORM\PersistentCollection {#1727 …}
+badges: Doctrine\ORM\PersistentCollection {#2464 …}
+children: []
-id: 33480
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462591
+visibility: "visible "
+apId: "https://lemmy.world/post/11253371"
+editedAt: null
+createdAt: DateTimeImmutable @1706376191 {#1409
date: 2024-01-27 18:23:11.0 +01:00
}
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\Entry {#1585
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1619 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 132
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729118540 {#1574
date: 2024-10-17 00:42:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1702 …}
+votes: Doctrine\ORM\PersistentCollection {#1683 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1724 …}
+notifications: Doctrine\ORM\PersistentCollection {#1727 …}
+badges: Doctrine\ORM\PersistentCollection {#2464 …}
+children: []
-id: 33480
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462591
+visibility: "visible "
+apId: "https://lemmy.world/post/11253371"
+editedAt: null
+createdAt: DateTimeImmutable @1706376191 {#1409
date: 2024-01-27 18:23:11.0 +01:00
}
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\Entry {#1585
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1619 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 132
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729118540 {#1574
date: 2024-10-17 00:42:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1702 …}
+votes: Doctrine\ORM\PersistentCollection {#1683 …}
+reports: Doctrine\ORM\PersistentCollection {#1689 …}
+favourites: Doctrine\ORM\PersistentCollection {#1724 …}
+notifications: Doctrine\ORM\PersistentCollection {#1727 …}
+badges: Doctrine\ORM\PersistentCollection {#2464 …}
+children: []
-id: 33480
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462591
+visibility: "visible "
+apId: "https://lemmy.world/post/11253371"
+editedAt: null
+createdAt: DateTimeImmutable @1706376191 {#1409
date: 2024-01-27 18:23:11.0 +01:00
}
} |
|
Show voter details
|
17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
18 |
DENIED
|
moderate
|
App\Entity\Entry {#2552
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2374 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2376 …}
+slug: "iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications"
+title: "iPhone Apps Secretly Harvest Data When They Send You Notifications, Researchers Find"
+url: "https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537"
+body: """
cross-posted from: [lemmy.world/post/11219865](https://lemmy.world/post/11219865)\n
\n
> TL;DR version:\n
> \n
> Several popular iOS apps, including Facebook, LinkedIn, TikTok, and Twitter, have been found to be collecting user data through notifications, even when the app is closed, according to tests conducted by security researchers at Mysk Inc. The data collected includes IP addresses, device information, and other identifiable details, which can be used for targeted advertising and tracking purposes. While some of the companies involved have denied the allegations, the researchers claim that the data collection is unnecessary for notification processing and appears to be related to analytics and tracking. The issue is believed to be widespread among iOS apps, and Apple’s lack of enforcement of its own privacy rules has been criticized. Upcoming changes to the iPhone operating system’s rules may help address the problem, but it remains to be seen how effectively they will be enforced.\n
> \n
> Mitigating the issue:\n
> \n
> - According to a reply from the researchers under their [video](https://piped.video/watch?v=4ZPTjGG9t7s):\n
> \n
> > Disabling the notifications prevents this from happening, but you have to toggle the option “Allow Notifications” of the app off. Allowing the notifications while disabling the alerts isn’t enough.\n
> \n
> - Another [article](https://www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/) from BleepingComputer similarly notes that:\n
> \n
> > iPhone users who want to evade this fingerprinting should disable push notifications entirely. Unfortunately, making notifications silent will not prevent abuse. To disable notifications, open ‘Settings,’ head to ‘Notifications,’ select the app you want to manage notifications for and tap the toggle to disable ‘Allow Notifications.’\n
\n
Link to the researchers’ original post on Mastodon: [mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 156
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729508999 {#2549
date: 2024-10-21 13:09:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2553 …}
+votes: Doctrine\ORM\PersistentCollection {#2555 …}
+reports: Doctrine\ORM\PersistentCollection {#2557 …}
+favourites: Doctrine\ORM\PersistentCollection {#2559 …}
+notifications: Doctrine\ORM\PersistentCollection {#2561 …}
+badges: Doctrine\ORM\PersistentCollection {#2563 …}
+children: []
-id: 33289
-titleTs: "'app':2 'data':5 'find':12 'harvest':4 'iphon':1 'notif':10 'research':11 'secret':3 'send':8"
-bodyTs: "'/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':262 '/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':200 '/post/11219865](https://lemmy.world/post/11219865)':7 '/watch?v=4zptjgg9t7s):':165 'abus':226 'accord':37,153 'address':52,135 'advertis':65 'alert':192 'alleg':78 'allow':180,186,250 'among':107 'analyt':97 'anoth':196 'app':14,34,109,184,237 'appear':92 'appl':111 'articl':197 'believ':103 'bleepingcomput':202 'chang':125 'claim':81 'close':36 'collect':26,49,85 'compani':73 'conduct':40 'critic':123 'cross':2 'cross-post':1 'data':28,48,84 'deni':76 'detail':58 'devic':53 'disabl':166,190,215,228,249 'dr':9 'effect':145 'enforc':115,149 'enough':195 'entir':218 'evad':211 'even':31 'facebook':16 'fingerprint':213 'found':23 'happen':172 'head':232 'help':134 'identifi':57 'inc':46 'includ':15,50 'inform':54 'involv':74 'io':13,108 'ip':51 'iphon':128,206 'isn':193 'issu':101,152 'lack':113 'lemmy.world':6 'lemmy.world/post/11219865](https://lemmy.world/post/11219865)':5 'link':252 'linkedin':17 'make':220 'manag':241 'mastodon':259 'mastodon.social':261 'mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':260 'may':133 'mitig':150 'mysk':45 'note':204 'notif':30,89,168,181,188,217,221,229,234,242,251 'open':230 'oper':129 'option':179 'origin':256 'piped.video':164 'piped.video/watch?v=4zptjgg9t7s):':163 'popular':12 'post':3,257 'prevent':169,225 'privaci':119 'problem':137 'process':90 'purpos':68 'push':216 'relat':95 'remain':140 'repli':156 'research':43,80,159,255 'rule':120,132 'secur':42 'seen':143 'select':235 'set':231 'sever':11 'silent':222 'similar':203 'system':130 'tap':245 'target':64 'test':39 'tiktok':18 'tl':8 'toggl':177,247 'track':67,99 'twitter':20 'unfortun':219 'unnecessari':87 'upcom':124 'use':62 'user':27,207 'version':10 'video':162 'want':209,239 'widespread':106 'www.bleepingcomputer.com':199 'www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706381257
+visibility: "visible "
+apId: "https://lemmy.world/post/11219903"
+editedAt: DateTimeImmutable @1728825882 {#2550
date: 2024-10-13 15:24:42.0 +02:00
}
+createdAt: DateTimeImmutable @1706294857 {#2551
date: 2024-01-26 19:47:37.0 +01:00
}
} |
|
Show voter details
|
19 |
DENIED
|
edit
|
App\Entity\Entry {#2552
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2374 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2376 …}
+slug: "iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications"
+title: "iPhone Apps Secretly Harvest Data When They Send You Notifications, Researchers Find"
+url: "https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537"
+body: """
cross-posted from: [lemmy.world/post/11219865](https://lemmy.world/post/11219865)\n
\n
> TL;DR version:\n
> \n
> Several popular iOS apps, including Facebook, LinkedIn, TikTok, and Twitter, have been found to be collecting user data through notifications, even when the app is closed, according to tests conducted by security researchers at Mysk Inc. The data collected includes IP addresses, device information, and other identifiable details, which can be used for targeted advertising and tracking purposes. While some of the companies involved have denied the allegations, the researchers claim that the data collection is unnecessary for notification processing and appears to be related to analytics and tracking. The issue is believed to be widespread among iOS apps, and Apple’s lack of enforcement of its own privacy rules has been criticized. Upcoming changes to the iPhone operating system’s rules may help address the problem, but it remains to be seen how effectively they will be enforced.\n
> \n
> Mitigating the issue:\n
> \n
> - According to a reply from the researchers under their [video](https://piped.video/watch?v=4ZPTjGG9t7s):\n
> \n
> > Disabling the notifications prevents this from happening, but you have to toggle the option “Allow Notifications” of the app off. Allowing the notifications while disabling the alerts isn’t enough.\n
> \n
> - Another [article](https://www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/) from BleepingComputer similarly notes that:\n
> \n
> > iPhone users who want to evade this fingerprinting should disable push notifications entirely. Unfortunately, making notifications silent will not prevent abuse. To disable notifications, open ‘Settings,’ head to ‘Notifications,’ select the app you want to manage notifications for and tap the toggle to disable ‘Allow Notifications.’\n
\n
Link to the researchers’ original post on Mastodon: [mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 156
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729508999 {#2549
date: 2024-10-21 13:09:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2553 …}
+votes: Doctrine\ORM\PersistentCollection {#2555 …}
+reports: Doctrine\ORM\PersistentCollection {#2557 …}
+favourites: Doctrine\ORM\PersistentCollection {#2559 …}
+notifications: Doctrine\ORM\PersistentCollection {#2561 …}
+badges: Doctrine\ORM\PersistentCollection {#2563 …}
+children: []
-id: 33289
-titleTs: "'app':2 'data':5 'find':12 'harvest':4 'iphon':1 'notif':10 'research':11 'secret':3 'send':8"
-bodyTs: "'/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':262 '/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':200 '/post/11219865](https://lemmy.world/post/11219865)':7 '/watch?v=4zptjgg9t7s):':165 'abus':226 'accord':37,153 'address':52,135 'advertis':65 'alert':192 'alleg':78 'allow':180,186,250 'among':107 'analyt':97 'anoth':196 'app':14,34,109,184,237 'appear':92 'appl':111 'articl':197 'believ':103 'bleepingcomput':202 'chang':125 'claim':81 'close':36 'collect':26,49,85 'compani':73 'conduct':40 'critic':123 'cross':2 'cross-post':1 'data':28,48,84 'deni':76 'detail':58 'devic':53 'disabl':166,190,215,228,249 'dr':9 'effect':145 'enforc':115,149 'enough':195 'entir':218 'evad':211 'even':31 'facebook':16 'fingerprint':213 'found':23 'happen':172 'head':232 'help':134 'identifi':57 'inc':46 'includ':15,50 'inform':54 'involv':74 'io':13,108 'ip':51 'iphon':128,206 'isn':193 'issu':101,152 'lack':113 'lemmy.world':6 'lemmy.world/post/11219865](https://lemmy.world/post/11219865)':5 'link':252 'linkedin':17 'make':220 'manag':241 'mastodon':259 'mastodon.social':261 'mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':260 'may':133 'mitig':150 'mysk':45 'note':204 'notif':30,89,168,181,188,217,221,229,234,242,251 'open':230 'oper':129 'option':179 'origin':256 'piped.video':164 'piped.video/watch?v=4zptjgg9t7s):':163 'popular':12 'post':3,257 'prevent':169,225 'privaci':119 'problem':137 'process':90 'purpos':68 'push':216 'relat':95 'remain':140 'repli':156 'research':43,80,159,255 'rule':120,132 'secur':42 'seen':143 'select':235 'set':231 'sever':11 'silent':222 'similar':203 'system':130 'tap':245 'target':64 'test':39 'tiktok':18 'tl':8 'toggl':177,247 'track':67,99 'twitter':20 'unfortun':219 'unnecessari':87 'upcom':124 'use':62 'user':27,207 'version':10 'video':162 'want':209,239 'widespread':106 'www.bleepingcomputer.com':199 'www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706381257
+visibility: "visible "
+apId: "https://lemmy.world/post/11219903"
+editedAt: DateTimeImmutable @1728825882 {#2550
date: 2024-10-13 15:24:42.0 +02:00
}
+createdAt: DateTimeImmutable @1706294857 {#2551
date: 2024-01-26 19:47:37.0 +01:00
}
} |
|
Show voter details
|
20 |
DENIED
|
moderate
|
App\Entity\Entry {#2552
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2374 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2376 …}
+slug: "iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications"
+title: "iPhone Apps Secretly Harvest Data When They Send You Notifications, Researchers Find"
+url: "https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537"
+body: """
cross-posted from: [lemmy.world/post/11219865](https://lemmy.world/post/11219865)\n
\n
> TL;DR version:\n
> \n
> Several popular iOS apps, including Facebook, LinkedIn, TikTok, and Twitter, have been found to be collecting user data through notifications, even when the app is closed, according to tests conducted by security researchers at Mysk Inc. The data collected includes IP addresses, device information, and other identifiable details, which can be used for targeted advertising and tracking purposes. While some of the companies involved have denied the allegations, the researchers claim that the data collection is unnecessary for notification processing and appears to be related to analytics and tracking. The issue is believed to be widespread among iOS apps, and Apple’s lack of enforcement of its own privacy rules has been criticized. Upcoming changes to the iPhone operating system’s rules may help address the problem, but it remains to be seen how effectively they will be enforced.\n
> \n
> Mitigating the issue:\n
> \n
> - According to a reply from the researchers under their [video](https://piped.video/watch?v=4ZPTjGG9t7s):\n
> \n
> > Disabling the notifications prevents this from happening, but you have to toggle the option “Allow Notifications” of the app off. Allowing the notifications while disabling the alerts isn’t enough.\n
> \n
> - Another [article](https://www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/) from BleepingComputer similarly notes that:\n
> \n
> > iPhone users who want to evade this fingerprinting should disable push notifications entirely. Unfortunately, making notifications silent will not prevent abuse. To disable notifications, open ‘Settings,’ head to ‘Notifications,’ select the app you want to manage notifications for and tap the toggle to disable ‘Allow Notifications.’\n
\n
Link to the researchers’ original post on Mastodon: [mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 156
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729508999 {#2549
date: 2024-10-21 13:09:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2553 …}
+votes: Doctrine\ORM\PersistentCollection {#2555 …}
+reports: Doctrine\ORM\PersistentCollection {#2557 …}
+favourites: Doctrine\ORM\PersistentCollection {#2559 …}
+notifications: Doctrine\ORM\PersistentCollection {#2561 …}
+badges: Doctrine\ORM\PersistentCollection {#2563 …}
+children: []
-id: 33289
-titleTs: "'app':2 'data':5 'find':12 'harvest':4 'iphon':1 'notif':10 'research':11 'secret':3 'send':8"
-bodyTs: "'/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':262 '/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':200 '/post/11219865](https://lemmy.world/post/11219865)':7 '/watch?v=4zptjgg9t7s):':165 'abus':226 'accord':37,153 'address':52,135 'advertis':65 'alert':192 'alleg':78 'allow':180,186,250 'among':107 'analyt':97 'anoth':196 'app':14,34,109,184,237 'appear':92 'appl':111 'articl':197 'believ':103 'bleepingcomput':202 'chang':125 'claim':81 'close':36 'collect':26,49,85 'compani':73 'conduct':40 'critic':123 'cross':2 'cross-post':1 'data':28,48,84 'deni':76 'detail':58 'devic':53 'disabl':166,190,215,228,249 'dr':9 'effect':145 'enforc':115,149 'enough':195 'entir':218 'evad':211 'even':31 'facebook':16 'fingerprint':213 'found':23 'happen':172 'head':232 'help':134 'identifi':57 'inc':46 'includ':15,50 'inform':54 'involv':74 'io':13,108 'ip':51 'iphon':128,206 'isn':193 'issu':101,152 'lack':113 'lemmy.world':6 'lemmy.world/post/11219865](https://lemmy.world/post/11219865)':5 'link':252 'linkedin':17 'make':220 'manag':241 'mastodon':259 'mastodon.social':261 'mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':260 'may':133 'mitig':150 'mysk':45 'note':204 'notif':30,89,168,181,188,217,221,229,234,242,251 'open':230 'oper':129 'option':179 'origin':256 'piped.video':164 'piped.video/watch?v=4zptjgg9t7s):':163 'popular':12 'post':3,257 'prevent':169,225 'privaci':119 'problem':137 'process':90 'purpos':68 'push':216 'relat':95 'remain':140 'repli':156 'research':43,80,159,255 'rule':120,132 'secur':42 'seen':143 'select':235 'set':231 'sever':11 'silent':222 'similar':203 'system':130 'tap':245 'target':64 'test':39 'tiktok':18 'tl':8 'toggl':177,247 'track':67,99 'twitter':20 'unfortun':219 'unnecessari':87 'upcom':124 'use':62 'user':27,207 'version':10 'video':162 'want':209,239 'widespread':106 'www.bleepingcomputer.com':199 'www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706381257
+visibility: "visible "
+apId: "https://lemmy.world/post/11219903"
+editedAt: DateTimeImmutable @1728825882 {#2550
date: 2024-10-13 15:24:42.0 +02:00
}
+createdAt: DateTimeImmutable @1706294857 {#2551
date: 2024-01-26 19:47:37.0 +01:00
}
} |
|
Show voter details
|
21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
22 |
DENIED
|
moderate
|
App\Entity\Entry {#2373
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2374 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2376 …}
+slug: "iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications"
+title: "iPhone Apps Secretly Harvest Data When They Send You Notifications, Researchers Find"
+url: "https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537"
+body: """
TL;DR version:\n
\n
Several popular iOS apps, including Facebook, LinkedIn, TikTok, and Twitter, have been found to be collecting user data through notifications, even when the app is closed, according to tests conducted by security researchers at Mysk Inc. The data collected includes IP addresses, device information, and other identifiable details, which can be used for targeted advertising and tracking purposes. While some of the companies involved have denied the allegations, the researchers claim that the data collection is unnecessary for notification processing and appears to be related to analytics and tracking. The issue is believed to be widespread among iOS apps, and Apple’s lack of enforcement of its own privacy rules has been criticized. Upcoming changes to the iPhone operating system’s rules may help address the problem, but it remains to be seen how effectively they will be enforced.\n
\n
Mitigating the issue:\n
\n
- According to a reply from the researchers under their [video](https://piped.video/watch?v=4ZPTjGG9t7s):\n
\n
> Disabling the notifications prevents this from happening, but you have to toggle the option “Allow Notifications” of the app off. Allowing the notifications while disabling the alerts isn’t enough.\n
\n
- Another [article](https://www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/) from BleepingComputer similarly notes that:\n
\n
> iPhone users who want to evade this fingerprinting should disable push notifications entirely. Unfortunately, making notifications silent will not prevent abuse. To disable notifications, open ‘Settings,’ head to ‘Notifications,’ select the app you want to manage notifications for and tap the toggle to disable ‘Allow Notifications.’\n
\n
Link to the researchers’ original post on Mastodon: [mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 59
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728876530 {#1980
date: 2024-10-14 05:28:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2362 …}
+votes: Doctrine\ORM\PersistentCollection {#2367 …}
+reports: Doctrine\ORM\PersistentCollection {#2269 …}
+favourites: Doctrine\ORM\PersistentCollection {#1347 …}
+notifications: Doctrine\ORM\PersistentCollection {#1350 …}
+badges: Doctrine\ORM\PersistentCollection {#1351 …}
+children: []
-id: 33288
-titleTs: "'app':2 'data':5 'find':12 'harvest':4 'iphon':1 'notif':10 'research':11 'secret':3 'send':8"
-bodyTs: "'/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':255 '/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':193 '/watch?v=4zptjgg9t7s):':158 'abus':219 'accord':30,146 'address':45,128 'advertis':58 'alert':185 'alleg':71 'allow':173,179,243 'among':100 'analyt':90 'anoth':189 'app':7,27,102,177,230 'appear':85 'appl':104 'articl':190 'believ':96 'bleepingcomput':195 'chang':118 'claim':74 'close':29 'collect':19,42,78 'compani':66 'conduct':33 'critic':116 'data':21,41,77 'deni':69 'detail':51 'devic':46 'disabl':159,183,208,221,242 'dr':2 'effect':138 'enforc':108,142 'enough':188 'entir':211 'evad':204 'even':24 'facebook':9 'fingerprint':206 'found':16 'happen':165 'head':225 'help':127 'identifi':50 'inc':39 'includ':8,43 'inform':47 'involv':67 'io':6,101 'ip':44 'iphon':121,199 'isn':186 'issu':94,145 'lack':106 'link':245 'linkedin':10 'make':213 'manag':234 'mastodon':252 'mastodon.social':254 'mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':253 'may':126 'mitig':143 'mysk':38 'note':197 'notif':23,82,161,174,181,210,214,222,227,235,244 'open':223 'oper':122 'option':172 'origin':249 'piped.video':157 'piped.video/watch?v=4zptjgg9t7s):':156 'popular':5 'post':250 'prevent':162,218 'privaci':112 'problem':130 'process':83 'purpos':61 'push':209 'relat':88 'remain':133 'repli':149 'research':36,73,152,248 'rule':113,125 'secur':35 'seen':136 'select':228 'set':224 'sever':4 'silent':215 'similar':196 'system':123 'tap':238 'target':57 'test':32 'tiktok':11 'tl':1 'toggl':170,240 'track':60,92 'twitter':13 'unfortun':212 'unnecessari':80 'upcom':117 'use':55 'user':20,200 'version':3 'video':155 'want':202,232 'widespread':99 'www.bleepingcomputer.com':192 'www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':191"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706381220
+visibility: "visible "
+apId: "https://lemmy.world/post/11219865"
+editedAt: DateTimeImmutable @1728825740 {#2368
date: 2024-10-13 15:22:20.0 +02:00
}
+createdAt: DateTimeImmutable @1706294820 {#2375
date: 2024-01-26 19:47:00.0 +01:00
}
} |
|
Show voter details
|
23 |
DENIED
|
edit
|
App\Entity\Entry {#2373
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2374 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2376 …}
+slug: "iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications"
+title: "iPhone Apps Secretly Harvest Data When They Send You Notifications, Researchers Find"
+url: "https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537"
+body: """
TL;DR version:\n
\n
Several popular iOS apps, including Facebook, LinkedIn, TikTok, and Twitter, have been found to be collecting user data through notifications, even when the app is closed, according to tests conducted by security researchers at Mysk Inc. The data collected includes IP addresses, device information, and other identifiable details, which can be used for targeted advertising and tracking purposes. While some of the companies involved have denied the allegations, the researchers claim that the data collection is unnecessary for notification processing and appears to be related to analytics and tracking. The issue is believed to be widespread among iOS apps, and Apple’s lack of enforcement of its own privacy rules has been criticized. Upcoming changes to the iPhone operating system’s rules may help address the problem, but it remains to be seen how effectively they will be enforced.\n
\n
Mitigating the issue:\n
\n
- According to a reply from the researchers under their [video](https://piped.video/watch?v=4ZPTjGG9t7s):\n
\n
> Disabling the notifications prevents this from happening, but you have to toggle the option “Allow Notifications” of the app off. Allowing the notifications while disabling the alerts isn’t enough.\n
\n
- Another [article](https://www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/) from BleepingComputer similarly notes that:\n
\n
> iPhone users who want to evade this fingerprinting should disable push notifications entirely. Unfortunately, making notifications silent will not prevent abuse. To disable notifications, open ‘Settings,’ head to ‘Notifications,’ select the app you want to manage notifications for and tap the toggle to disable ‘Allow Notifications.’\n
\n
Link to the researchers’ original post on Mastodon: [mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 59
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728876530 {#1980
date: 2024-10-14 05:28:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2362 …}
+votes: Doctrine\ORM\PersistentCollection {#2367 …}
+reports: Doctrine\ORM\PersistentCollection {#2269 …}
+favourites: Doctrine\ORM\PersistentCollection {#1347 …}
+notifications: Doctrine\ORM\PersistentCollection {#1350 …}
+badges: Doctrine\ORM\PersistentCollection {#1351 …}
+children: []
-id: 33288
-titleTs: "'app':2 'data':5 'find':12 'harvest':4 'iphon':1 'notif':10 'research':11 'secret':3 'send':8"
-bodyTs: "'/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':255 '/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':193 '/watch?v=4zptjgg9t7s):':158 'abus':219 'accord':30,146 'address':45,128 'advertis':58 'alert':185 'alleg':71 'allow':173,179,243 'among':100 'analyt':90 'anoth':189 'app':7,27,102,177,230 'appear':85 'appl':104 'articl':190 'believ':96 'bleepingcomput':195 'chang':118 'claim':74 'close':29 'collect':19,42,78 'compani':66 'conduct':33 'critic':116 'data':21,41,77 'deni':69 'detail':51 'devic':46 'disabl':159,183,208,221,242 'dr':2 'effect':138 'enforc':108,142 'enough':188 'entir':211 'evad':204 'even':24 'facebook':9 'fingerprint':206 'found':16 'happen':165 'head':225 'help':127 'identifi':50 'inc':39 'includ':8,43 'inform':47 'involv':67 'io':6,101 'ip':44 'iphon':121,199 'isn':186 'issu':94,145 'lack':106 'link':245 'linkedin':10 'make':213 'manag':234 'mastodon':252 'mastodon.social':254 'mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':253 'may':126 'mitig':143 'mysk':38 'note':197 'notif':23,82,161,174,181,210,214,222,227,235,244 'open':223 'oper':122 'option':172 'origin':249 'piped.video':157 'piped.video/watch?v=4zptjgg9t7s):':156 'popular':5 'post':250 'prevent':162,218 'privaci':112 'problem':130 'process':83 'purpos':61 'push':209 'relat':88 'remain':133 'repli':149 'research':36,73,152,248 'rule':113,125 'secur':35 'seen':136 'select':228 'set':224 'sever':4 'silent':215 'similar':196 'system':123 'tap':238 'target':57 'test':32 'tiktok':11 'tl':1 'toggl':170,240 'track':60,92 'twitter':13 'unfortun':212 'unnecessari':80 'upcom':117 'use':55 'user':20,200 'version':3 'video':155 'want':202,232 'widespread':99 'www.bleepingcomputer.com':192 'www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':191"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706381220
+visibility: "visible "
+apId: "https://lemmy.world/post/11219865"
+editedAt: DateTimeImmutable @1728825740 {#2368
date: 2024-10-13 15:22:20.0 +02:00
}
+createdAt: DateTimeImmutable @1706294820 {#2375
date: 2024-01-26 19:47:00.0 +01:00
}
} |
|
Show voter details
|
24 |
DENIED
|
moderate
|
App\Entity\Entry {#2373
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2374 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2376 …}
+slug: "iPhone-Apps-Secretly-Harvest-Data-When-They-Send-You-Notifications"
+title: "iPhone Apps Secretly Harvest Data When They Send You Notifications, Researchers Find"
+url: "https://gizmodo.com/iphone-apps-can-harvest-data-from-notifications-1851194537"
+body: """
TL;DR version:\n
\n
Several popular iOS apps, including Facebook, LinkedIn, TikTok, and Twitter, have been found to be collecting user data through notifications, even when the app is closed, according to tests conducted by security researchers at Mysk Inc. The data collected includes IP addresses, device information, and other identifiable details, which can be used for targeted advertising and tracking purposes. While some of the companies involved have denied the allegations, the researchers claim that the data collection is unnecessary for notification processing and appears to be related to analytics and tracking. The issue is believed to be widespread among iOS apps, and Apple’s lack of enforcement of its own privacy rules has been criticized. Upcoming changes to the iPhone operating system’s rules may help address the problem, but it remains to be seen how effectively they will be enforced.\n
\n
Mitigating the issue:\n
\n
- According to a reply from the researchers under their [video](https://piped.video/watch?v=4ZPTjGG9t7s):\n
\n
> Disabling the notifications prevents this from happening, but you have to toggle the option “Allow Notifications” of the app off. Allowing the notifications while disabling the alerts isn’t enough.\n
\n
- Another [article](https://www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/) from BleepingComputer similarly notes that:\n
\n
> iPhone users who want to evade this fingerprinting should disable push notifications entirely. Unfortunately, making notifications silent will not prevent abuse. To disable notifications, open ‘Settings,’ head to ‘Notifications,’ select the app you want to manage notifications for and tap the toggle to disable ‘Allow Notifications.’\n
\n
Link to the researchers’ original post on Mastodon: [mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 59
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728876530 {#1980
date: 2024-10-14 05:28:50.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2362 …}
+votes: Doctrine\ORM\PersistentCollection {#2367 …}
+reports: Doctrine\ORM\PersistentCollection {#2269 …}
+favourites: Doctrine\ORM\PersistentCollection {#1347 …}
+notifications: Doctrine\ORM\PersistentCollection {#1350 …}
+badges: Doctrine\ORM\PersistentCollection {#1351 …}
+children: []
-id: 33288
-titleTs: "'app':2 'data':5 'find':12 'harvest':4 'iphon':1 'notif':10 'research':11 'secret':3 'send':8"
-bodyTs: "'/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':255 '/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':193 '/watch?v=4zptjgg9t7s):':158 'abus':219 'accord':30,146 'address':45,128 'advertis':58 'alert':185 'alleg':71 'allow':173,179,243 'among':100 'analyt':90 'anoth':189 'app':7,27,102,177,230 'appear':85 'appl':104 'articl':190 'believ':96 'bleepingcomput':195 'chang':118 'claim':74 'close':29 'collect':19,42,78 'compani':66 'conduct':33 'critic':116 'data':21,41,77 'deni':69 'detail':51 'devic':46 'disabl':159,183,208,221,242 'dr':2 'effect':138 'enforc':108,142 'enough':188 'entir':211 'evad':204 'even':24 'facebook':9 'fingerprint':206 'found':16 'happen':165 'head':225 'help':127 'identifi':50 'inc':39 'includ':8,43 'inform':47 'involv':67 'io':6,101 'ip':44 'iphon':121,199 'isn':186 'issu':94,145 'lack':106 'link':245 'linkedin':10 'make':213 'manag':234 'mastodon':252 'mastodon.social':254 'mastodon.social/@mysk/111816751385137545](https://mastodon.social/@mysk/111816751385137545)':253 'may':126 'mitig':143 'mysk':38 'note':197 'notif':23,82,161,174,181,210,214,222,227,235,244 'open':223 'oper':122 'option':172 'origin':249 'piped.video':157 'piped.video/watch?v=4zptjgg9t7s):':156 'popular':5 'post':250 'prevent':162,218 'privaci':112 'problem':130 'process':83 'purpos':61 'push':209 'relat':88 'remain':133 'repli':149 'research':36,73,152,248 'rule':113,125 'secur':35 'seen':136 'select':228 'set':224 'sever':4 'silent':215 'similar':196 'system':123 'tap':238 'target':57 'test':32 'tiktok':11 'tl':1 'toggl':170,240 'track':60,92 'twitter':13 'unfortun':212 'unnecessari':80 'upcom':117 'use':55 'user':20,200 'version':3 'video':155 'want':202,232 'widespread':99 'www.bleepingcomputer.com':192 'www.bleepingcomputer.com/news/security/iphone-apps-abuse-ios-push-notifications-to-collect-user-data/)':191"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706381220
+visibility: "visible "
+apId: "https://lemmy.world/post/11219865"
+editedAt: DateTimeImmutable @1728825740 {#2368
date: 2024-10-13 15:22:20.0 +02:00
}
+createdAt: DateTimeImmutable @1706294820 {#2375
date: 2024-01-26 19:47:00.0 +01:00
}
} |
|
Show voter details
|
25 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
26 |
DENIED
|
moderate
|
App\Entity\Entry {#2504
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: Proxies\__CG__\App\Entity\Image {#2505 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2506 …}
+slug: "New-release-Open-Video-Editor-FOSS-Android"
+title: "New release: Open Video Editor (FOSS; Android)"
+url: "https://f-droid.org/en/packages/io.github.devhyper.openvideoeditor/"
+body: """
cross-posted from: [lemmy.world/post/11182062](https://lemmy.world/post/11182062)\n
\n
> [Open Video Editor](https://f-droid.org/en/packages/io.github.devhyper.openvideoeditor/) is an open source Android video editor, built with Media3 and Jetpack Compose.\n
> \n
> Features:\n
> \n
> - Trim\n
> - Grayscale\n
> - Resolution\n
> - Scale\n
> - Rotate\n
> \n
> Note: Those looking for FOSS video editors on Android might also want to check out [FFShare](https://f-droid.org/en/packages/com.caydey.ffshare/) and [Video Transcoder](https://f-droid.org/en/packages/protect.videoeditor/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728838246 {#2502
date: 2024-10-13 18:50:46.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2507 …}
+votes: Doctrine\ORM\PersistentCollection {#2509 …}
+reports: Doctrine\ORM\PersistentCollection {#2511 …}
+favourites: Doctrine\ORM\PersistentCollection {#2513 …}
+notifications: Doctrine\ORM\PersistentCollection {#2515 …}
+badges: Doctrine\ORM\PersistentCollection {#2517 …}
+children: []
-id: 33055
-titleTs: "'android':7 'editor':5 'foss':6 'new':1 'open':3 'releas':2 'video':4"
-bodyTs: "'/en/packages/com.caydey.ffshare/)':51 '/en/packages/io.github.devhyper.openvideoeditor/)':13 '/en/packages/protect.videoeditor/)':57 '/post/11182062](https://lemmy.world/post/11182062)':7 'also':43 'android':18,41 'built':21 'check':46 'compos':26 'cross':2 'cross-post':1 'editor':10,20,39 'f-droid.org':12,50,56 'f-droid.org/en/packages/com.caydey.ffshare/)':49 'f-droid.org/en/packages/io.github.devhyper.openvideoeditor/)':11 'f-droid.org/en/packages/protect.videoeditor/)':55 'featur':27 'ffshare':48 'foss':37 'grayscal':29 'jetpack':25 'lemmy.world':6 'lemmy.world/post/11182062](https://lemmy.world/post/11182062)':5 'look':35 'media3':23 'might':42 'note':33 'open':8,16 'post':3 'resolut':30 'rotat':32 'scale':31 'sourc':17 'transcod':54 'trim':28 'video':9,19,38,53 'want':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706297666
+visibility: "visible "
+apId: "https://lemmy.world/post/11182066"
+editedAt: null
+createdAt: DateTimeImmutable @1706211266 {#2503
date: 2024-01-25 20:34:26.0 +01:00
}
} |
|
Show voter details
|
27 |
DENIED
|
edit
|
App\Entity\Entry {#2504
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: Proxies\__CG__\App\Entity\Image {#2505 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2506 …}
+slug: "New-release-Open-Video-Editor-FOSS-Android"
+title: "New release: Open Video Editor (FOSS; Android)"
+url: "https://f-droid.org/en/packages/io.github.devhyper.openvideoeditor/"
+body: """
cross-posted from: [lemmy.world/post/11182062](https://lemmy.world/post/11182062)\n
\n
> [Open Video Editor](https://f-droid.org/en/packages/io.github.devhyper.openvideoeditor/) is an open source Android video editor, built with Media3 and Jetpack Compose.\n
> \n
> Features:\n
> \n
> - Trim\n
> - Grayscale\n
> - Resolution\n
> - Scale\n
> - Rotate\n
> \n
> Note: Those looking for FOSS video editors on Android might also want to check out [FFShare](https://f-droid.org/en/packages/com.caydey.ffshare/) and [Video Transcoder](https://f-droid.org/en/packages/protect.videoeditor/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728838246 {#2502
date: 2024-10-13 18:50:46.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2507 …}
+votes: Doctrine\ORM\PersistentCollection {#2509 …}
+reports: Doctrine\ORM\PersistentCollection {#2511 …}
+favourites: Doctrine\ORM\PersistentCollection {#2513 …}
+notifications: Doctrine\ORM\PersistentCollection {#2515 …}
+badges: Doctrine\ORM\PersistentCollection {#2517 …}
+children: []
-id: 33055
-titleTs: "'android':7 'editor':5 'foss':6 'new':1 'open':3 'releas':2 'video':4"
-bodyTs: "'/en/packages/com.caydey.ffshare/)':51 '/en/packages/io.github.devhyper.openvideoeditor/)':13 '/en/packages/protect.videoeditor/)':57 '/post/11182062](https://lemmy.world/post/11182062)':7 'also':43 'android':18,41 'built':21 'check':46 'compos':26 'cross':2 'cross-post':1 'editor':10,20,39 'f-droid.org':12,50,56 'f-droid.org/en/packages/com.caydey.ffshare/)':49 'f-droid.org/en/packages/io.github.devhyper.openvideoeditor/)':11 'f-droid.org/en/packages/protect.videoeditor/)':55 'featur':27 'ffshare':48 'foss':37 'grayscal':29 'jetpack':25 'lemmy.world':6 'lemmy.world/post/11182062](https://lemmy.world/post/11182062)':5 'look':35 'media3':23 'might':42 'note':33 'open':8,16 'post':3 'resolut':30 'rotat':32 'scale':31 'sourc':17 'transcod':54 'trim':28 'video':9,19,38,53 'want':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706297666
+visibility: "visible "
+apId: "https://lemmy.world/post/11182066"
+editedAt: null
+createdAt: DateTimeImmutable @1706211266 {#2503
date: 2024-01-25 20:34:26.0 +01:00
}
} |
|
Show voter details
|
28 |
DENIED
|
moderate
|
App\Entity\Entry {#2504
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: Proxies\__CG__\App\Entity\Image {#2505 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2506 …}
+slug: "New-release-Open-Video-Editor-FOSS-Android"
+title: "New release: Open Video Editor (FOSS; Android)"
+url: "https://f-droid.org/en/packages/io.github.devhyper.openvideoeditor/"
+body: """
cross-posted from: [lemmy.world/post/11182062](https://lemmy.world/post/11182062)\n
\n
> [Open Video Editor](https://f-droid.org/en/packages/io.github.devhyper.openvideoeditor/) is an open source Android video editor, built with Media3 and Jetpack Compose.\n
> \n
> Features:\n
> \n
> - Trim\n
> - Grayscale\n
> - Resolution\n
> - Scale\n
> - Rotate\n
> \n
> Note: Those looking for FOSS video editors on Android might also want to check out [FFShare](https://f-droid.org/en/packages/com.caydey.ffshare/) and [Video Transcoder](https://f-droid.org/en/packages/protect.videoeditor/)
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728838246 {#2502
date: 2024-10-13 18:50:46.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2507 …}
+votes: Doctrine\ORM\PersistentCollection {#2509 …}
+reports: Doctrine\ORM\PersistentCollection {#2511 …}
+favourites: Doctrine\ORM\PersistentCollection {#2513 …}
+notifications: Doctrine\ORM\PersistentCollection {#2515 …}
+badges: Doctrine\ORM\PersistentCollection {#2517 …}
+children: []
-id: 33055
-titleTs: "'android':7 'editor':5 'foss':6 'new':1 'open':3 'releas':2 'video':4"
-bodyTs: "'/en/packages/com.caydey.ffshare/)':51 '/en/packages/io.github.devhyper.openvideoeditor/)':13 '/en/packages/protect.videoeditor/)':57 '/post/11182062](https://lemmy.world/post/11182062)':7 'also':43 'android':18,41 'built':21 'check':46 'compos':26 'cross':2 'cross-post':1 'editor':10,20,39 'f-droid.org':12,50,56 'f-droid.org/en/packages/com.caydey.ffshare/)':49 'f-droid.org/en/packages/io.github.devhyper.openvideoeditor/)':11 'f-droid.org/en/packages/protect.videoeditor/)':55 'featur':27 'ffshare':48 'foss':37 'grayscal':29 'jetpack':25 'lemmy.world':6 'lemmy.world/post/11182062](https://lemmy.world/post/11182062)':5 'look':35 'media3':23 'might':42 'note':33 'open':8,16 'post':3 'resolut':30 'rotat':32 'scale':31 'sourc':17 'transcod':54 'trim':28 'video':9,19,38,53 'want':44"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706297666
+visibility: "visible "
+apId: "https://lemmy.world/post/11182066"
+editedAt: null
+createdAt: DateTimeImmutable @1706211266 {#2503
date: 2024-01-25 20:34:26.0 +01:00
}
} |
|
Show voter details
|
29 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
30 |
DENIED
|
moderate
|
App\Entity\Entry {#2073
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706104555 {#2135
date: 2024-01-24 14:55:55.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2068 …}
+votes: Doctrine\ORM\PersistentCollection {#2069 …}
+reports: Doctrine\ORM\PersistentCollection {#2074 …}
+favourites: Doctrine\ORM\PersistentCollection {#2071 …}
+notifications: Doctrine\ORM\PersistentCollection {#2070 …}
+badges: Doctrine\ORM\PersistentCollection {#2048 …}
+children: []
-id: 32746
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172112
+visibility: "visible "
+apId: "https://lemmy.world/post/11118096"
+editedAt: DateTimeImmutable @1728258263 {#2136
date: 2024-10-07 01:44:23.0 +02:00
}
+createdAt: DateTimeImmutable @1706085712 {#2137
date: 2024-01-24 09:41:52.0 +01:00
}
} |
|
Show voter details
|
31 |
DENIED
|
edit
|
App\Entity\Entry {#2073
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706104555 {#2135
date: 2024-01-24 14:55:55.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2068 …}
+votes: Doctrine\ORM\PersistentCollection {#2069 …}
+reports: Doctrine\ORM\PersistentCollection {#2074 …}
+favourites: Doctrine\ORM\PersistentCollection {#2071 …}
+notifications: Doctrine\ORM\PersistentCollection {#2070 …}
+badges: Doctrine\ORM\PersistentCollection {#2048 …}
+children: []
-id: 32746
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172112
+visibility: "visible "
+apId: "https://lemmy.world/post/11118096"
+editedAt: DateTimeImmutable @1728258263 {#2136
date: 2024-10-07 01:44:23.0 +02:00
}
+createdAt: DateTimeImmutable @1706085712 {#2137
date: 2024-01-24 09:41:52.0 +01:00
}
} |
|
Show voter details
|
32 |
DENIED
|
moderate
|
App\Entity\Entry {#2073
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706104555 {#2135
date: 2024-01-24 14:55:55.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2068 …}
+votes: Doctrine\ORM\PersistentCollection {#2069 …}
+reports: Doctrine\ORM\PersistentCollection {#2074 …}
+favourites: Doctrine\ORM\PersistentCollection {#2071 …}
+notifications: Doctrine\ORM\PersistentCollection {#2070 …}
+badges: Doctrine\ORM\PersistentCollection {#2048 …}
+children: []
-id: 32746
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172112
+visibility: "visible "
+apId: "https://lemmy.world/post/11118096"
+editedAt: DateTimeImmutable @1728258263 {#2136
date: 2024-10-07 01:44:23.0 +02:00
}
+createdAt: DateTimeImmutable @1706085712 {#2137
date: 2024-01-24 09:41:52.0 +01:00
}
} |
|
Show voter details
|
33 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
34 |
DENIED
|
moderate
|
App\Entity\Entry {#2009
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 67
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728705107 {#1990
date: 2024-10-12 05:51:47.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2014 …}
+votes: Doctrine\ORM\PersistentCollection {#2016 …}
+reports: Doctrine\ORM\PersistentCollection {#2017 …}
+favourites: Doctrine\ORM\PersistentCollection {#1984 …}
+notifications: Doctrine\ORM\PersistentCollection {#1981 …}
+badges: Doctrine\ORM\PersistentCollection {#1982 …}
+children: []
-id: 32745
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172039
+visibility: "visible "
+apId: "https://lemmy.world/post/11117945"
+editedAt: DateTimeImmutable @1728258241 {#1986
date: 2024-10-07 01:44:01.0 +02:00
}
+createdAt: DateTimeImmutable @1706085639 {#2010
date: 2024-01-24 09:40:39.0 +01:00
}
} |
|
Show voter details
|
35 |
DENIED
|
edit
|
App\Entity\Entry {#2009
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 67
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728705107 {#1990
date: 2024-10-12 05:51:47.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2014 …}
+votes: Doctrine\ORM\PersistentCollection {#2016 …}
+reports: Doctrine\ORM\PersistentCollection {#2017 …}
+favourites: Doctrine\ORM\PersistentCollection {#1984 …}
+notifications: Doctrine\ORM\PersistentCollection {#1981 …}
+badges: Doctrine\ORM\PersistentCollection {#1982 …}
+children: []
-id: 32745
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172039
+visibility: "visible "
+apId: "https://lemmy.world/post/11117945"
+editedAt: DateTimeImmutable @1728258241 {#1986
date: 2024-10-07 01:44:01.0 +02:00
}
+createdAt: DateTimeImmutable @1706085639 {#2010
date: 2024-01-24 09:40:39.0 +01:00
}
} |
|
Show voter details
|
36 |
DENIED
|
moderate
|
App\Entity\Entry {#2009
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 67
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728705107 {#1990
date: 2024-10-12 05:51:47.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2014 …}
+votes: Doctrine\ORM\PersistentCollection {#2016 …}
+reports: Doctrine\ORM\PersistentCollection {#2017 …}
+favourites: Doctrine\ORM\PersistentCollection {#1984 …}
+notifications: Doctrine\ORM\PersistentCollection {#1981 …}
+badges: Doctrine\ORM\PersistentCollection {#1982 …}
+children: []
-id: 32745
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172039
+visibility: "visible "
+apId: "https://lemmy.world/post/11117945"
+editedAt: DateTimeImmutable @1728258241 {#1986
date: 2024-10-07 01:44:01.0 +02:00
}
+createdAt: DateTimeImmutable @1706085639 {#2010
date: 2024-01-24 09:40:39.0 +01:00
}
} |
|
Show voter details
|
37 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
38 |
DENIED
|
moderate
|
App\Entity\Entry {#2461
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 19
+favouriteCount: 330
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728824941 {#1740
date: 2024-10-13 15:09:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2448 …}
+votes: Doctrine\ORM\PersistentCollection {#2411 …}
+reports: Doctrine\ORM\PersistentCollection {#2457 …}
+favourites: Doctrine\ORM\PersistentCollection {#2455 …}
+notifications: Doctrine\ORM\PersistentCollection {#2468 …}
+badges: Doctrine\ORM\PersistentCollection {#2469 …}
+children: []
-id: 32744
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706171941
+visibility: "visible "
+apId: "https://lemmy.world/post/11117891"
+editedAt: DateTimeImmutable @1728258218 {#1717
date: 2024-10-07 01:43:38.0 +02:00
}
+createdAt: DateTimeImmutable @1706085541 {#2462
date: 2024-01-24 09:39:01.0 +01:00
}
} |
|
Show voter details
|
39 |
DENIED
|
edit
|
App\Entity\Entry {#2461
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 19
+favouriteCount: 330
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728824941 {#1740
date: 2024-10-13 15:09:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2448 …}
+votes: Doctrine\ORM\PersistentCollection {#2411 …}
+reports: Doctrine\ORM\PersistentCollection {#2457 …}
+favourites: Doctrine\ORM\PersistentCollection {#2455 …}
+notifications: Doctrine\ORM\PersistentCollection {#2468 …}
+badges: Doctrine\ORM\PersistentCollection {#2469 …}
+children: []
-id: 32744
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706171941
+visibility: "visible "
+apId: "https://lemmy.world/post/11117891"
+editedAt: DateTimeImmutable @1728258218 {#1717
date: 2024-10-07 01:43:38.0 +02:00
}
+createdAt: DateTimeImmutable @1706085541 {#2462
date: 2024-01-24 09:39:01.0 +01:00
}
} |
|
Show voter details
|
40 |
DENIED
|
moderate
|
App\Entity\Entry {#2461
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 19
+favouriteCount: 330
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728824941 {#1740
date: 2024-10-13 15:09:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2448 …}
+votes: Doctrine\ORM\PersistentCollection {#2411 …}
+reports: Doctrine\ORM\PersistentCollection {#2457 …}
+favourites: Doctrine\ORM\PersistentCollection {#2455 …}
+notifications: Doctrine\ORM\PersistentCollection {#2468 …}
+badges: Doctrine\ORM\PersistentCollection {#2469 …}
+children: []
-id: 32744
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706171941
+visibility: "visible "
+apId: "https://lemmy.world/post/11117891"
+editedAt: DateTimeImmutable @1728258218 {#1717
date: 2024-10-07 01:43:38.0 +02:00
}
+createdAt: DateTimeImmutable @1706085541 {#2462
date: 2024-01-24 09:39:01.0 +01:00
}
} |
|
Show voter details
|
41 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
42 |
DENIED
|
moderate
|
App\Entity\Entry {#2344
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2349 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2042 …}
+slug: "You-Need-to-Turn-on-Apple-s-New-Stolen-iPhone-Tool"
+title: "You Need to Turn on Apple’s New Stolen iPhone Tool"
+url: "https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/"
+body: """
cross-posted from: [lemmy.world/post/11099621](https://lemmy.world/post/11099621)\n
\n
> Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change sensitive settings on your device.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 27
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729120456 {#2351
date: 2024-10-17 01:14:16.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2141 …}
+votes: Doctrine\ORM\PersistentCollection {#2164 …}
+reports: Doctrine\ORM\PersistentCollection {#2314 …}
+favourites: Doctrine\ORM\PersistentCollection {#2328 …}
+notifications: Doctrine\ORM\PersistentCollection {#2191 …}
+badges: Doctrine\ORM\PersistentCollection {#2327 …}
+children: []
-id: 32696
-titleTs: "'appl':6 'iphon':10 'need':2 'new':8 'stolen':9 'tool':11 'turn':4"
-bodyTs: "'/post/11099621](https://lemmy.world/post/11099621)':7 'access':28,47 'add':35 'appl':8 'call':31 'chang':49 'cross':2 'cross-post':1 'devic':33,54 'extra':36 'featur':30 'help':17 'iphon':15,42 'launch':10 'layer':37 'lemmy.world':6 'lemmy.world/post/11099621](https://lemmy.world/post/11099621)':5 'new':12 'passcod':26 'phone':24 'post':3 'protect':34,39 'reduc':18 'sensit':50 'set':51 'someon':44 'stolen':32 'thief':21 'today':9 'tool':13 'tri':45"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706128661
+visibility: "visible "
+apId: "https://lemmy.world/post/11099623"
+editedAt: DateTimeImmutable @1728064339 {#2347
date: 2024-10-04 19:52:19.0 +02:00
}
+createdAt: DateTimeImmutable @1706044161 {#2332
date: 2024-01-23 22:09:21.0 +01:00
}
} |
|
Show voter details
|
43 |
DENIED
|
edit
|
App\Entity\Entry {#2344
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2349 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2042 …}
+slug: "You-Need-to-Turn-on-Apple-s-New-Stolen-iPhone-Tool"
+title: "You Need to Turn on Apple’s New Stolen iPhone Tool"
+url: "https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/"
+body: """
cross-posted from: [lemmy.world/post/11099621](https://lemmy.world/post/11099621)\n
\n
> Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change sensitive settings on your device.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 27
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729120456 {#2351
date: 2024-10-17 01:14:16.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2141 …}
+votes: Doctrine\ORM\PersistentCollection {#2164 …}
+reports: Doctrine\ORM\PersistentCollection {#2314 …}
+favourites: Doctrine\ORM\PersistentCollection {#2328 …}
+notifications: Doctrine\ORM\PersistentCollection {#2191 …}
+badges: Doctrine\ORM\PersistentCollection {#2327 …}
+children: []
-id: 32696
-titleTs: "'appl':6 'iphon':10 'need':2 'new':8 'stolen':9 'tool':11 'turn':4"
-bodyTs: "'/post/11099621](https://lemmy.world/post/11099621)':7 'access':28,47 'add':35 'appl':8 'call':31 'chang':49 'cross':2 'cross-post':1 'devic':33,54 'extra':36 'featur':30 'help':17 'iphon':15,42 'launch':10 'layer':37 'lemmy.world':6 'lemmy.world/post/11099621](https://lemmy.world/post/11099621)':5 'new':12 'passcod':26 'phone':24 'post':3 'protect':34,39 'reduc':18 'sensit':50 'set':51 'someon':44 'stolen':32 'thief':21 'today':9 'tool':13 'tri':45"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706128661
+visibility: "visible "
+apId: "https://lemmy.world/post/11099623"
+editedAt: DateTimeImmutable @1728064339 {#2347
date: 2024-10-04 19:52:19.0 +02:00
}
+createdAt: DateTimeImmutable @1706044161 {#2332
date: 2024-01-23 22:09:21.0 +01:00
}
} |
|
Show voter details
|
44 |
DENIED
|
moderate
|
App\Entity\Entry {#2344
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2349 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2042 …}
+slug: "You-Need-to-Turn-on-Apple-s-New-Stolen-iPhone-Tool"
+title: "You Need to Turn on Apple’s New Stolen iPhone Tool"
+url: "https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/"
+body: """
cross-posted from: [lemmy.world/post/11099621](https://lemmy.world/post/11099621)\n
\n
> Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change sensitive settings on your device.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 27
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1729120456 {#2351
date: 2024-10-17 01:14:16.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2141 …}
+votes: Doctrine\ORM\PersistentCollection {#2164 …}
+reports: Doctrine\ORM\PersistentCollection {#2314 …}
+favourites: Doctrine\ORM\PersistentCollection {#2328 …}
+notifications: Doctrine\ORM\PersistentCollection {#2191 …}
+badges: Doctrine\ORM\PersistentCollection {#2327 …}
+children: []
-id: 32696
-titleTs: "'appl':6 'iphon':10 'need':2 'new':8 'stolen':9 'tool':11 'turn':4"
-bodyTs: "'/post/11099621](https://lemmy.world/post/11099621)':7 'access':28,47 'add':35 'appl':8 'call':31 'chang':49 'cross':2 'cross-post':1 'devic':33,54 'extra':36 'featur':30 'help':17 'iphon':15,42 'launch':10 'layer':37 'lemmy.world':6 'lemmy.world/post/11099621](https://lemmy.world/post/11099621)':5 'new':12 'passcod':26 'phone':24 'post':3 'protect':34,39 'reduc':18 'sensit':50 'set':51 'someon':44 'stolen':32 'thief':21 'today':9 'tool':13 'tri':45"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706128661
+visibility: "visible "
+apId: "https://lemmy.world/post/11099623"
+editedAt: DateTimeImmutable @1728064339 {#2347
date: 2024-10-04 19:52:19.0 +02:00
}
+createdAt: DateTimeImmutable @1706044161 {#2332
date: 2024-01-23 22:09:21.0 +01:00
}
} |
|
Show voter details
|
45 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
46 |
DENIED
|
moderate
|
App\Entity\Entry {#2286
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2349 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2042 …}
+slug: "You-Need-to-Turn-on-Apple-s-New-Stolen-iPhone-Tool"
+title: "You Need to Turn on Apple’s New Stolen iPhone Tool"
+url: "https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/"
+body: "> Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change sensitive settings on your device."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 16
+favouriteCount: 20
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728462119 {#2284
date: 2024-10-09 10:21:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2287 …}
+votes: Doctrine\ORM\PersistentCollection {#2142 …}
+reports: Doctrine\ORM\PersistentCollection {#2039 …}
+favourites: Doctrine\ORM\PersistentCollection {#2155 …}
+notifications: Doctrine\ORM\PersistentCollection {#2158 …}
+badges: Doctrine\ORM\PersistentCollection {#2151 …}
+children: []
-id: 32694
-titleTs: "'appl':6 'iphon':10 'need':2 'new':8 'stolen':9 'tool':11 'turn':4"
-bodyTs: "'access':21,40 'add':28 'appl':1 'call':24 'chang':42 'devic':26,47 'extra':29 'featur':23 'help':10 'iphon':8,35 'launch':3 'layer':30 'new':5 'passcod':19 'phone':17 'protect':27,32 'reduc':11 'sensit':43 'set':44 'someon':37 'stolen':25 'thief':14 'today':2 'tool':6 'tri':38"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706130528
+visibility: "visible "
+apId: "https://lemmy.world/post/11099621"
+editedAt: null
+createdAt: DateTimeImmutable @1706044128 {#2285
date: 2024-01-23 22:08:48.0 +01:00
}
} |
|
Show voter details
|
47 |
DENIED
|
edit
|
App\Entity\Entry {#2286
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2349 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2042 …}
+slug: "You-Need-to-Turn-on-Apple-s-New-Stolen-iPhone-Tool"
+title: "You Need to Turn on Apple’s New Stolen iPhone Tool"
+url: "https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/"
+body: "> Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change sensitive settings on your device."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 16
+favouriteCount: 20
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728462119 {#2284
date: 2024-10-09 10:21:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2287 …}
+votes: Doctrine\ORM\PersistentCollection {#2142 …}
+reports: Doctrine\ORM\PersistentCollection {#2039 …}
+favourites: Doctrine\ORM\PersistentCollection {#2155 …}
+notifications: Doctrine\ORM\PersistentCollection {#2158 …}
+badges: Doctrine\ORM\PersistentCollection {#2151 …}
+children: []
-id: 32694
-titleTs: "'appl':6 'iphon':10 'need':2 'new':8 'stolen':9 'tool':11 'turn':4"
-bodyTs: "'access':21,40 'add':28 'appl':1 'call':24 'chang':42 'devic':26,47 'extra':29 'featur':23 'help':10 'iphon':8,35 'launch':3 'layer':30 'new':5 'passcod':19 'phone':17 'protect':27,32 'reduc':11 'sensit':43 'set':44 'someon':37 'stolen':25 'thief':14 'today':2 'tool':6 'tri':38"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706130528
+visibility: "visible "
+apId: "https://lemmy.world/post/11099621"
+editedAt: null
+createdAt: DateTimeImmutable @1706044128 {#2285
date: 2024-01-23 22:08:48.0 +01:00
}
} |
|
Show voter details
|
48 |
DENIED
|
moderate
|
App\Entity\Entry {#2286
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2349 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2042 …}
+slug: "You-Need-to-Turn-on-Apple-s-New-Stolen-iPhone-Tool"
+title: "You Need to Turn on Apple’s New Stolen iPhone Tool"
+url: "https://www.wired.com/story/apple-ios-17-3-iphone-stolen-device-protection/"
+body: "> Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change sensitive settings on your device."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 16
+favouriteCount: 20
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728462119 {#2284
date: 2024-10-09 10:21:59.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2287 …}
+votes: Doctrine\ORM\PersistentCollection {#2142 …}
+reports: Doctrine\ORM\PersistentCollection {#2039 …}
+favourites: Doctrine\ORM\PersistentCollection {#2155 …}
+notifications: Doctrine\ORM\PersistentCollection {#2158 …}
+badges: Doctrine\ORM\PersistentCollection {#2151 …}
+children: []
-id: 32694
-titleTs: "'appl':6 'iphon':10 'need':2 'new':8 'stolen':9 'tool':11 'turn':4"
-bodyTs: "'access':21,40 'add':28 'appl':1 'call':24 'chang':42 'devic':26,47 'extra':29 'featur':23 'help':10 'iphon':8,35 'launch':3 'layer':30 'new':5 'passcod':19 'phone':17 'protect':27,32 'reduc':11 'sensit':43 'set':44 'someon':37 'stolen':25 'thief':14 'today':2 'tool':6 'tri':38"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706130528
+visibility: "visible "
+apId: "https://lemmy.world/post/11099621"
+editedAt: null
+createdAt: DateTimeImmutable @1706044128 {#2285
date: 2024-01-23 22:08:48.0 +01:00
}
} |
|
Show voter details
|
49 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
50 |
DENIED
|
moderate
|
App\Entity\Entry {#2006
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2177 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Firefox-122-released-Here-s-what-s-new"
+title: "Firefox 122 released: Here's what's new"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11090267](https://lemmy.world/post/11090267)\n
\n
> • Firefox now displays images and descriptions for search suggestions when provided by the search engine.\n
> \n
> • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.\n
> \n
> • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.\n
> \n
> • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.\n
> \n
> • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.\n
> \n
> • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/122.0/releasenotes/)\n
> \n
> Firefox for Android\n
> \n
> • Firefox for Android can now be set as the default PDF reader.\n
> \n
> • Firefox for Android now supports enabling Global Privacy Control. With this feature, Firefox informs websites that the user doesn’t want their data to be shared or sold. This feature is enabled by default in private browsing mode and can be enabled in normal browsing in Settings → Enhanced Tracking Protection -> Tell websites not to share & sell data toggle.\n
> \n
> • To reduce user fingerprinting information and the risk of some website compatibility issues, the OS version is now always reported as “Android 10” in Firefox for Android’s User-Agent string.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/android/122.0/releasenotes/)
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 63
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728140761 {#1995
date: 2024-10-05 17:06:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1996 …}
+votes: Doctrine\ORM\PersistentCollection {#1993 …}
+reports: Doctrine\ORM\PersistentCollection {#1992 …}
+favourites: Doctrine\ORM\PersistentCollection {#2002 …}
+notifications: Doctrine\ORM\PersistentCollection {#2000 …}
+badges: Doctrine\ORM\PersistentCollection {#2007 …}
+children: []
-id: 32655
-titleTs: "'122':2 'firefox':1 'new':8 'releas':3"
-bodyTs: "'/en-us/firefox/':181,300 '/en-us/firefox/122.0/releasenotes/)':185 '/en-us/firefox/android/122.0/releasenotes/)':304 '/post/11090267](https://lemmy.world/post/11090267)':7 '/releasenotes':182,301 '10':281 'addit':119 'address':87 'agent':289 'alway':277 'android':188,191,203,280,285 'articl':77 'asian':123,127 'avail':84 'awar':136 'bar':88 'break':59,100,117 'brows':237,245 'browser':113 'burmes':150 'chines':148 'click':142 'compat':114,270 'content':47,104 'control':209 'could':51,58 'creat':63 'cross':2 'cross-post':1 'data':223,257 'deb':161 'debian':168 'default':198,234 'descript':13 'develop':95 'development-rel':94 'disappear':52 'display':10 'doc':76 'doesn':219 'doubl':141 'double-click':140 'east':122,126 'enabl':206,232,242 'end':128 'engin':22 'enhanc':248 'featur':25,212,230 'fingerprint':262 'firefox':8,60,80,130,155,186,189,201,213,283 'fix':43,174,293 'global':207 'icloud':70 'imag':11 'improv':28,111,120 'includ':147 'inform':97,177,214,263,296 'interact':56 'issu':44,271 'japanes':149 'keychain':71 'khmer':152 'languag':135,146 'language-awar':134 'lao':151 'lemmy.world':6 'lemmy.world/post/11090267](https://lemmy.world/post/11090267)':5 'line':99,116 'linux':164,170 'maco':73 'match':106 'mdn':74 'mint':171 'mode':238 'much':39 'new':160 'normal':244 'os':273 'packag':162 'page':50 'passkey':66 'pdf':199 'post':3 'privaci':208 'privat':236 'proper':133 'protect':250 'provid':18 'qualiti':31 'reader':200 'receiv':26 'reduc':260 'relat':96 'report':278 'result':36 'risk':266 'rule':101 'search':15,21,91 'secur':173,292 'select':138 'sell':256 'set':195,247 'share':226,255 'ship':157 'sold':228 'south':125 'stabl':41 'standard':109 'store':67 'string':290 'suggest':16,78,81 'support':62,132,205 'tell':251 'text':144 'thai':154 'toggl':258 'track':249 'translat':24,33,54 'ubuntu':167 'unicod':108 'use':65 'user':90,129,165,218,261,288 'user-ag':287 'various':172,291 'version':274 'visit':178,297 'want':221 'web':75,93,103,112 'webpag':34 'websit':215,252,269 'widget':57 'word':137 'www.mozilla.org':180,184,299,303 'www.mozilla.org/en-us/firefox/':179,298 'www.mozilla.org/en-us/firefox/122.0/releasenotes/)':183 'www.mozilla.org/en-us/firefox/android/122.0/releasenotes/)':302"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706116319
+visibility: "visible "
+apId: "https://lemmy.world/post/11090383"
+editedAt: null
+createdAt: DateTimeImmutable @1706029919 {#2005
date: 2024-01-23 18:11:59.0 +01:00
}
} |
|
Show voter details
|
51 |
DENIED
|
edit
|
App\Entity\Entry {#2006
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2177 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Firefox-122-released-Here-s-what-s-new"
+title: "Firefox 122 released: Here's what's new"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11090267](https://lemmy.world/post/11090267)\n
\n
> • Firefox now displays images and descriptions for search suggestions when provided by the search engine.\n
> \n
> • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.\n
> \n
> • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.\n
> \n
> • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.\n
> \n
> • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.\n
> \n
> • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/122.0/releasenotes/)\n
> \n
> Firefox for Android\n
> \n
> • Firefox for Android can now be set as the default PDF reader.\n
> \n
> • Firefox for Android now supports enabling Global Privacy Control. With this feature, Firefox informs websites that the user doesn’t want their data to be shared or sold. This feature is enabled by default in private browsing mode and can be enabled in normal browsing in Settings → Enhanced Tracking Protection -> Tell websites not to share & sell data toggle.\n
> \n
> • To reduce user fingerprinting information and the risk of some website compatibility issues, the OS version is now always reported as “Android 10” in Firefox for Android’s User-Agent string.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/android/122.0/releasenotes/)
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 63
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728140761 {#1995
date: 2024-10-05 17:06:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1996 …}
+votes: Doctrine\ORM\PersistentCollection {#1993 …}
+reports: Doctrine\ORM\PersistentCollection {#1992 …}
+favourites: Doctrine\ORM\PersistentCollection {#2002 …}
+notifications: Doctrine\ORM\PersistentCollection {#2000 …}
+badges: Doctrine\ORM\PersistentCollection {#2007 …}
+children: []
-id: 32655
-titleTs: "'122':2 'firefox':1 'new':8 'releas':3"
-bodyTs: "'/en-us/firefox/':181,300 '/en-us/firefox/122.0/releasenotes/)':185 '/en-us/firefox/android/122.0/releasenotes/)':304 '/post/11090267](https://lemmy.world/post/11090267)':7 '/releasenotes':182,301 '10':281 'addit':119 'address':87 'agent':289 'alway':277 'android':188,191,203,280,285 'articl':77 'asian':123,127 'avail':84 'awar':136 'bar':88 'break':59,100,117 'brows':237,245 'browser':113 'burmes':150 'chines':148 'click':142 'compat':114,270 'content':47,104 'control':209 'could':51,58 'creat':63 'cross':2 'cross-post':1 'data':223,257 'deb':161 'debian':168 'default':198,234 'descript':13 'develop':95 'development-rel':94 'disappear':52 'display':10 'doc':76 'doesn':219 'doubl':141 'double-click':140 'east':122,126 'enabl':206,232,242 'end':128 'engin':22 'enhanc':248 'featur':25,212,230 'fingerprint':262 'firefox':8,60,80,130,155,186,189,201,213,283 'fix':43,174,293 'global':207 'icloud':70 'imag':11 'improv':28,111,120 'includ':147 'inform':97,177,214,263,296 'interact':56 'issu':44,271 'japanes':149 'keychain':71 'khmer':152 'languag':135,146 'language-awar':134 'lao':151 'lemmy.world':6 'lemmy.world/post/11090267](https://lemmy.world/post/11090267)':5 'line':99,116 'linux':164,170 'maco':73 'match':106 'mdn':74 'mint':171 'mode':238 'much':39 'new':160 'normal':244 'os':273 'packag':162 'page':50 'passkey':66 'pdf':199 'post':3 'privaci':208 'privat':236 'proper':133 'protect':250 'provid':18 'qualiti':31 'reader':200 'receiv':26 'reduc':260 'relat':96 'report':278 'result':36 'risk':266 'rule':101 'search':15,21,91 'secur':173,292 'select':138 'sell':256 'set':195,247 'share':226,255 'ship':157 'sold':228 'south':125 'stabl':41 'standard':109 'store':67 'string':290 'suggest':16,78,81 'support':62,132,205 'tell':251 'text':144 'thai':154 'toggl':258 'track':249 'translat':24,33,54 'ubuntu':167 'unicod':108 'use':65 'user':90,129,165,218,261,288 'user-ag':287 'various':172,291 'version':274 'visit':178,297 'want':221 'web':75,93,103,112 'webpag':34 'websit':215,252,269 'widget':57 'word':137 'www.mozilla.org':180,184,299,303 'www.mozilla.org/en-us/firefox/':179,298 'www.mozilla.org/en-us/firefox/122.0/releasenotes/)':183 'www.mozilla.org/en-us/firefox/android/122.0/releasenotes/)':302"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706116319
+visibility: "visible "
+apId: "https://lemmy.world/post/11090383"
+editedAt: null
+createdAt: DateTimeImmutable @1706029919 {#2005
date: 2024-01-23 18:11:59.0 +01:00
}
} |
|
Show voter details
|
52 |
DENIED
|
moderate
|
App\Entity\Entry {#2006
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2177 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Firefox-122-released-Here-s-what-s-new"
+title: "Firefox 122 released: Here's what's new"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11090267](https://lemmy.world/post/11090267)\n
\n
> • Firefox now displays images and descriptions for search suggestions when provided by the search engine.\n
> \n
> • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.\n
> \n
> • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.\n
> \n
> • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.\n
> \n
> • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.\n
> \n
> • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/122.0/releasenotes/)\n
> \n
> Firefox for Android\n
> \n
> • Firefox for Android can now be set as the default PDF reader.\n
> \n
> • Firefox for Android now supports enabling Global Privacy Control. With this feature, Firefox informs websites that the user doesn’t want their data to be shared or sold. This feature is enabled by default in private browsing mode and can be enabled in normal browsing in Settings → Enhanced Tracking Protection -> Tell websites not to share & sell data toggle.\n
> \n
> • To reduce user fingerprinting information and the risk of some website compatibility issues, the OS version is now always reported as “Android 10” in Firefox for Android’s User-Agent string.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/android/122.0/releasenotes/)
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 63
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728140761 {#1995
date: 2024-10-05 17:06:01.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1996 …}
+votes: Doctrine\ORM\PersistentCollection {#1993 …}
+reports: Doctrine\ORM\PersistentCollection {#1992 …}
+favourites: Doctrine\ORM\PersistentCollection {#2002 …}
+notifications: Doctrine\ORM\PersistentCollection {#2000 …}
+badges: Doctrine\ORM\PersistentCollection {#2007 …}
+children: []
-id: 32655
-titleTs: "'122':2 'firefox':1 'new':8 'releas':3"
-bodyTs: "'/en-us/firefox/':181,300 '/en-us/firefox/122.0/releasenotes/)':185 '/en-us/firefox/android/122.0/releasenotes/)':304 '/post/11090267](https://lemmy.world/post/11090267)':7 '/releasenotes':182,301 '10':281 'addit':119 'address':87 'agent':289 'alway':277 'android':188,191,203,280,285 'articl':77 'asian':123,127 'avail':84 'awar':136 'bar':88 'break':59,100,117 'brows':237,245 'browser':113 'burmes':150 'chines':148 'click':142 'compat':114,270 'content':47,104 'control':209 'could':51,58 'creat':63 'cross':2 'cross-post':1 'data':223,257 'deb':161 'debian':168 'default':198,234 'descript':13 'develop':95 'development-rel':94 'disappear':52 'display':10 'doc':76 'doesn':219 'doubl':141 'double-click':140 'east':122,126 'enabl':206,232,242 'end':128 'engin':22 'enhanc':248 'featur':25,212,230 'fingerprint':262 'firefox':8,60,80,130,155,186,189,201,213,283 'fix':43,174,293 'global':207 'icloud':70 'imag':11 'improv':28,111,120 'includ':147 'inform':97,177,214,263,296 'interact':56 'issu':44,271 'japanes':149 'keychain':71 'khmer':152 'languag':135,146 'language-awar':134 'lao':151 'lemmy.world':6 'lemmy.world/post/11090267](https://lemmy.world/post/11090267)':5 'line':99,116 'linux':164,170 'maco':73 'match':106 'mdn':74 'mint':171 'mode':238 'much':39 'new':160 'normal':244 'os':273 'packag':162 'page':50 'passkey':66 'pdf':199 'post':3 'privaci':208 'privat':236 'proper':133 'protect':250 'provid':18 'qualiti':31 'reader':200 'receiv':26 'reduc':260 'relat':96 'report':278 'result':36 'risk':266 'rule':101 'search':15,21,91 'secur':173,292 'select':138 'sell':256 'set':195,247 'share':226,255 'ship':157 'sold':228 'south':125 'stabl':41 'standard':109 'store':67 'string':290 'suggest':16,78,81 'support':62,132,205 'tell':251 'text':144 'thai':154 'toggl':258 'track':249 'translat':24,33,54 'ubuntu':167 'unicod':108 'use':65 'user':90,129,165,218,261,288 'user-ag':287 'various':172,291 'version':274 'visit':178,297 'want':221 'web':75,93,103,112 'webpag':34 'websit':215,252,269 'widget':57 'word':137 'www.mozilla.org':180,184,299,303 'www.mozilla.org/en-us/firefox/':179,298 'www.mozilla.org/en-us/firefox/122.0/releasenotes/)':183 'www.mozilla.org/en-us/firefox/android/122.0/releasenotes/)':302"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706116319
+visibility: "visible "
+apId: "https://lemmy.world/post/11090383"
+editedAt: null
+createdAt: DateTimeImmutable @1706029919 {#2005
date: 2024-01-23 18:11:59.0 +01:00
}
} |
|
Show voter details
|
53 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
54 |
DENIED
|
moderate
|
App\Entity\Entry {#2536
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Firefox-122-released-Here-s-what-s-new"
+title: "Firefox 122 released: Here's what's new"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11090267](https://lemmy.world/post/11090267)\n
\n
> • Firefox now displays images and descriptions for search suggestions when provided by the search engine.\n
> \n
> • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.\n
> \n
> • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.\n
> \n
> • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.\n
> \n
> • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.\n
> \n
> • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/122.0/releasenotes/)\n
> \n
> Firefox for Android\n
> \n
> • Firefox for Android can now be set as the default PDF reader.\n
> \n
> • Firefox for Android now supports enabling Global Privacy Control. With this feature, Firefox informs websites that the user doesn’t want their data to be shared or sold. This feature is enabled by default in private browsing mode and can be enabled in normal browsing in Settings → Enhanced Tracking Protection -> Tell websites not to share & sell data toggle.\n
> \n
> • To reduce user fingerprinting information and the risk of some website compatibility issues, the OS version is now always reported as “Android 10” in Firefox for Android’s User-Agent string.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/android/122.0/releasenotes/)
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 7
+favouriteCount: 54
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728145630 {#2534
date: 2024-10-05 18:27:10.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2537 …}
+votes: Doctrine\ORM\PersistentCollection {#2539 …}
+reports: Doctrine\ORM\PersistentCollection {#2541 …}
+favourites: Doctrine\ORM\PersistentCollection {#2543 …}
+notifications: Doctrine\ORM\PersistentCollection {#2545 …}
+badges: Doctrine\ORM\PersistentCollection {#2547 …}
+children: []
-id: 32652
-titleTs: "'122':2 'firefox':1 'new':8 'releas':3"
-bodyTs: "'/en-us/firefox/':181,300 '/en-us/firefox/122.0/releasenotes/)':185 '/en-us/firefox/android/122.0/releasenotes/)':304 '/post/11090267](https://lemmy.world/post/11090267)':7 '/releasenotes':182,301 '10':281 'addit':119 'address':87 'agent':289 'alway':277 'android':188,191,203,280,285 'articl':77 'asian':123,127 'avail':84 'awar':136 'bar':88 'break':59,100,117 'brows':237,245 'browser':113 'burmes':150 'chines':148 'click':142 'compat':114,270 'content':47,104 'control':209 'could':51,58 'creat':63 'cross':2 'cross-post':1 'data':223,257 'deb':161 'debian':168 'default':198,234 'descript':13 'develop':95 'development-rel':94 'disappear':52 'display':10 'doc':76 'doesn':219 'doubl':141 'double-click':140 'east':122,126 'enabl':206,232,242 'end':128 'engin':22 'enhanc':248 'featur':25,212,230 'fingerprint':262 'firefox':8,60,80,130,155,186,189,201,213,283 'fix':43,174,293 'global':207 'icloud':70 'imag':11 'improv':28,111,120 'includ':147 'inform':97,177,214,263,296 'interact':56 'issu':44,271 'japanes':149 'keychain':71 'khmer':152 'languag':135,146 'language-awar':134 'lao':151 'lemmy.world':6 'lemmy.world/post/11090267](https://lemmy.world/post/11090267)':5 'line':99,116 'linux':164,170 'maco':73 'match':106 'mdn':74 'mint':171 'mode':238 'much':39 'new':160 'normal':244 'os':273 'packag':162 'page':50 'passkey':66 'pdf':199 'post':3 'privaci':208 'privat':236 'proper':133 'protect':250 'provid':18 'qualiti':31 'reader':200 'receiv':26 'reduc':260 'relat':96 'report':278 'result':36 'risk':266 'rule':101 'search':15,21,91 'secur':173,292 'select':138 'sell':256 'set':195,247 'share':226,255 'ship':157 'sold':228 'south':125 'stabl':41 'standard':109 'store':67 'string':290 'suggest':16,78,81 'support':62,132,205 'tell':251 'text':144 'thai':154 'toggl':258 'track':249 'translat':24,33,54 'ubuntu':167 'unicod':108 'use':65 'user':90,129,165,218,261,288 'user-ag':287 'various':172,291 'version':274 'visit':178,297 'want':221 'web':75,93,103,112 'webpag':34 'websit':215,252,269 'widget':57 'word':137 'www.mozilla.org':180,184,299,303 'www.mozilla.org/en-us/firefox/':179,298 'www.mozilla.org/en-us/firefox/122.0/releasenotes/)':183 'www.mozilla.org/en-us/firefox/android/122.0/releasenotes/)':302"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706116006
+visibility: "visible "
+apId: "https://lemmy.world/post/11090269"
+editedAt: null
+createdAt: DateTimeImmutable @1706029606 {#2535
date: 2024-01-23 18:06:46.0 +01:00
}
} |
|
Show voter details
|
55 |
DENIED
|
edit
|
App\Entity\Entry {#2536
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Firefox-122-released-Here-s-what-s-new"
+title: "Firefox 122 released: Here's what's new"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11090267](https://lemmy.world/post/11090267)\n
\n
> • Firefox now displays images and descriptions for search suggestions when provided by the search engine.\n
> \n
> • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.\n
> \n
> • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.\n
> \n
> • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.\n
> \n
> • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.\n
> \n
> • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/122.0/releasenotes/)\n
> \n
> Firefox for Android\n
> \n
> • Firefox for Android can now be set as the default PDF reader.\n
> \n
> • Firefox for Android now supports enabling Global Privacy Control. With this feature, Firefox informs websites that the user doesn’t want their data to be shared or sold. This feature is enabled by default in private browsing mode and can be enabled in normal browsing in Settings → Enhanced Tracking Protection -> Tell websites not to share & sell data toggle.\n
> \n
> • To reduce user fingerprinting information and the risk of some website compatibility issues, the OS version is now always reported as “Android 10” in Firefox for Android’s User-Agent string.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/android/122.0/releasenotes/)
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 7
+favouriteCount: 54
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728145630 {#2534
date: 2024-10-05 18:27:10.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2537 …}
+votes: Doctrine\ORM\PersistentCollection {#2539 …}
+reports: Doctrine\ORM\PersistentCollection {#2541 …}
+favourites: Doctrine\ORM\PersistentCollection {#2543 …}
+notifications: Doctrine\ORM\PersistentCollection {#2545 …}
+badges: Doctrine\ORM\PersistentCollection {#2547 …}
+children: []
-id: 32652
-titleTs: "'122':2 'firefox':1 'new':8 'releas':3"
-bodyTs: "'/en-us/firefox/':181,300 '/en-us/firefox/122.0/releasenotes/)':185 '/en-us/firefox/android/122.0/releasenotes/)':304 '/post/11090267](https://lemmy.world/post/11090267)':7 '/releasenotes':182,301 '10':281 'addit':119 'address':87 'agent':289 'alway':277 'android':188,191,203,280,285 'articl':77 'asian':123,127 'avail':84 'awar':136 'bar':88 'break':59,100,117 'brows':237,245 'browser':113 'burmes':150 'chines':148 'click':142 'compat':114,270 'content':47,104 'control':209 'could':51,58 'creat':63 'cross':2 'cross-post':1 'data':223,257 'deb':161 'debian':168 'default':198,234 'descript':13 'develop':95 'development-rel':94 'disappear':52 'display':10 'doc':76 'doesn':219 'doubl':141 'double-click':140 'east':122,126 'enabl':206,232,242 'end':128 'engin':22 'enhanc':248 'featur':25,212,230 'fingerprint':262 'firefox':8,60,80,130,155,186,189,201,213,283 'fix':43,174,293 'global':207 'icloud':70 'imag':11 'improv':28,111,120 'includ':147 'inform':97,177,214,263,296 'interact':56 'issu':44,271 'japanes':149 'keychain':71 'khmer':152 'languag':135,146 'language-awar':134 'lao':151 'lemmy.world':6 'lemmy.world/post/11090267](https://lemmy.world/post/11090267)':5 'line':99,116 'linux':164,170 'maco':73 'match':106 'mdn':74 'mint':171 'mode':238 'much':39 'new':160 'normal':244 'os':273 'packag':162 'page':50 'passkey':66 'pdf':199 'post':3 'privaci':208 'privat':236 'proper':133 'protect':250 'provid':18 'qualiti':31 'reader':200 'receiv':26 'reduc':260 'relat':96 'report':278 'result':36 'risk':266 'rule':101 'search':15,21,91 'secur':173,292 'select':138 'sell':256 'set':195,247 'share':226,255 'ship':157 'sold':228 'south':125 'stabl':41 'standard':109 'store':67 'string':290 'suggest':16,78,81 'support':62,132,205 'tell':251 'text':144 'thai':154 'toggl':258 'track':249 'translat':24,33,54 'ubuntu':167 'unicod':108 'use':65 'user':90,129,165,218,261,288 'user-ag':287 'various':172,291 'version':274 'visit':178,297 'want':221 'web':75,93,103,112 'webpag':34 'websit':215,252,269 'widget':57 'word':137 'www.mozilla.org':180,184,299,303 'www.mozilla.org/en-us/firefox/':179,298 'www.mozilla.org/en-us/firefox/122.0/releasenotes/)':183 'www.mozilla.org/en-us/firefox/android/122.0/releasenotes/)':302"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706116006
+visibility: "visible "
+apId: "https://lemmy.world/post/11090269"
+editedAt: null
+createdAt: DateTimeImmutable @1706029606 {#2535
date: 2024-01-23 18:06:46.0 +01:00
}
} |
|
Show voter details
|
56 |
DENIED
|
moderate
|
App\Entity\Entry {#2536
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1731 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2458 …}
+slug: "Firefox-122-released-Here-s-what-s-new"
+title: "Firefox 122 released: Here's what's new"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11090267](https://lemmy.world/post/11090267)\n
\n
> • Firefox now displays images and descriptions for search suggestions when provided by the search engine.\n
> \n
> • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.\n
> \n
> • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.\n
> \n
> • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.\n
> \n
> • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.\n
> \n
> • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/122.0/releasenotes/)\n
> \n
> Firefox for Android\n
> \n
> • Firefox for Android can now be set as the default PDF reader.\n
> \n
> • Firefox for Android now supports enabling Global Privacy Control. With this feature, Firefox informs websites that the user doesn’t want their data to be shared or sold. This feature is enabled by default in private browsing mode and can be enabled in normal browsing in Settings → Enhanced Tracking Protection -> Tell websites not to share & sell data toggle.\n
> \n
> • To reduce user fingerprinting information and the risk of some website compatibility issues, the OS version is now always reported as “Android 10” in Firefox for Android’s User-Agent string.\n
> \n
> • Various security fixes.\n
> \n
> For more information, visit [www.mozilla.org/en-US/firefox/…/releasenotes/](https://www.mozilla.org/en-US/firefox/android/122.0/releasenotes/)
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 7
+favouriteCount: 54
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728145630 {#2534
date: 2024-10-05 18:27:10.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2537 …}
+votes: Doctrine\ORM\PersistentCollection {#2539 …}
+reports: Doctrine\ORM\PersistentCollection {#2541 …}
+favourites: Doctrine\ORM\PersistentCollection {#2543 …}
+notifications: Doctrine\ORM\PersistentCollection {#2545 …}
+badges: Doctrine\ORM\PersistentCollection {#2547 …}
+children: []
-id: 32652
-titleTs: "'122':2 'firefox':1 'new':8 'releas':3"
-bodyTs: "'/en-us/firefox/':181,300 '/en-us/firefox/122.0/releasenotes/)':185 '/en-us/firefox/android/122.0/releasenotes/)':304 '/post/11090267](https://lemmy.world/post/11090267)':7 '/releasenotes':182,301 '10':281 'addit':119 'address':87 'agent':289 'alway':277 'android':188,191,203,280,285 'articl':77 'asian':123,127 'avail':84 'awar':136 'bar':88 'break':59,100,117 'brows':237,245 'browser':113 'burmes':150 'chines':148 'click':142 'compat':114,270 'content':47,104 'control':209 'could':51,58 'creat':63 'cross':2 'cross-post':1 'data':223,257 'deb':161 'debian':168 'default':198,234 'descript':13 'develop':95 'development-rel':94 'disappear':52 'display':10 'doc':76 'doesn':219 'doubl':141 'double-click':140 'east':122,126 'enabl':206,232,242 'end':128 'engin':22 'enhanc':248 'featur':25,212,230 'fingerprint':262 'firefox':8,60,80,130,155,186,189,201,213,283 'fix':43,174,293 'global':207 'icloud':70 'imag':11 'improv':28,111,120 'includ':147 'inform':97,177,214,263,296 'interact':56 'issu':44,271 'japanes':149 'keychain':71 'khmer':152 'languag':135,146 'language-awar':134 'lao':151 'lemmy.world':6 'lemmy.world/post/11090267](https://lemmy.world/post/11090267)':5 'line':99,116 'linux':164,170 'maco':73 'match':106 'mdn':74 'mint':171 'mode':238 'much':39 'new':160 'normal':244 'os':273 'packag':162 'page':50 'passkey':66 'pdf':199 'post':3 'privaci':208 'privat':236 'proper':133 'protect':250 'provid':18 'qualiti':31 'reader':200 'receiv':26 'reduc':260 'relat':96 'report':278 'result':36 'risk':266 'rule':101 'search':15,21,91 'secur':173,292 'select':138 'sell':256 'set':195,247 'share':226,255 'ship':157 'sold':228 'south':125 'stabl':41 'standard':109 'store':67 'string':290 'suggest':16,78,81 'support':62,132,205 'tell':251 'text':144 'thai':154 'toggl':258 'track':249 'translat':24,33,54 'ubuntu':167 'unicod':108 'use':65 'user':90,129,165,218,261,288 'user-ag':287 'various':172,291 'version':274 'visit':178,297 'want':221 'web':75,93,103,112 'webpag':34 'websit':215,252,269 'widget':57 'word':137 'www.mozilla.org':180,184,299,303 'www.mozilla.org/en-us/firefox/':179,298 'www.mozilla.org/en-us/firefox/122.0/releasenotes/)':183 'www.mozilla.org/en-us/firefox/android/122.0/releasenotes/)':302"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706116006
+visibility: "visible "
+apId: "https://lemmy.world/post/11090269"
+editedAt: null
+createdAt: DateTimeImmutable @1706029606 {#2535
date: 2024-01-23 18:06:46.0 +01:00
}
} |
|
Show voter details
|
57 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
58 |
DENIED
|
moderate
|
App\Entity\Entry {#2175
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2177 …}
+image: Proxies\__CG__\App\Entity\Image {#2176 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2174 …}
+slug: "4-reasons-to-try-Mozilla-s-new-Firefox-Linux-package-for"
+title: "4 reasons to try Mozilla’s new Firefox Linux package for Ubuntu and Debian derivatives | The Mozilla Blog"
+url: "https://blog.mozilla.org/en/products/4-reasons-to-try-mozillas-new-firefox-linux-package-for-ubuntu-and-debian-derivatives/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 33
+favouriteCount: 181
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728555713 {#2173
date: 2024-10-10 12:21:53.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2178 …}
+votes: Doctrine\ORM\PersistentCollection {#2183 …}
+reports: Doctrine\ORM\PersistentCollection {#2168 …}
+favourites: Doctrine\ORM\PersistentCollection {#2038 …}
+notifications: Doctrine\ORM\PersistentCollection {#1988 …}
+badges: Doctrine\ORM\PersistentCollection {#2003 …}
+children: []
-id: 32628
-titleTs: "'4':1 'blog':18 'debian':14 'deriv':15 'firefox':8 'linux':9 'mozilla':5,17 'new':7 'packag':10 'reason':2 'tri':4 'ubuntu':12"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706113434
+visibility: "visible "
+apId: "https://lemmy.world/post/11088313"
+editedAt: null
+createdAt: DateTimeImmutable @1706027034 {#2187
date: 2024-01-23 17:23:54.0 +01:00
}
} |
|
Show voter details
|
59 |
DENIED
|
edit
|
App\Entity\Entry {#2175
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2177 …}
+image: Proxies\__CG__\App\Entity\Image {#2176 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2174 …}
+slug: "4-reasons-to-try-Mozilla-s-new-Firefox-Linux-package-for"
+title: "4 reasons to try Mozilla’s new Firefox Linux package for Ubuntu and Debian derivatives | The Mozilla Blog"
+url: "https://blog.mozilla.org/en/products/4-reasons-to-try-mozillas-new-firefox-linux-package-for-ubuntu-and-debian-derivatives/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 33
+favouriteCount: 181
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728555713 {#2173
date: 2024-10-10 12:21:53.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2178 …}
+votes: Doctrine\ORM\PersistentCollection {#2183 …}
+reports: Doctrine\ORM\PersistentCollection {#2168 …}
+favourites: Doctrine\ORM\PersistentCollection {#2038 …}
+notifications: Doctrine\ORM\PersistentCollection {#1988 …}
+badges: Doctrine\ORM\PersistentCollection {#2003 …}
+children: []
-id: 32628
-titleTs: "'4':1 'blog':18 'debian':14 'deriv':15 'firefox':8 'linux':9 'mozilla':5,17 'new':7 'packag':10 'reason':2 'tri':4 'ubuntu':12"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706113434
+visibility: "visible "
+apId: "https://lemmy.world/post/11088313"
+editedAt: null
+createdAt: DateTimeImmutable @1706027034 {#2187
date: 2024-01-23 17:23:54.0 +01:00
}
} |
|
Show voter details
|
60 |
DENIED
|
moderate
|
App\Entity\Entry {#2175
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2177 …}
+image: Proxies\__CG__\App\Entity\Image {#2176 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2174 …}
+slug: "4-reasons-to-try-Mozilla-s-new-Firefox-Linux-package-for"
+title: "4 reasons to try Mozilla’s new Firefox Linux package for Ubuntu and Debian derivatives | The Mozilla Blog"
+url: "https://blog.mozilla.org/en/products/4-reasons-to-try-mozillas-new-firefox-linux-package-for-ubuntu-and-debian-derivatives/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 33
+favouriteCount: 181
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728555713 {#2173
date: 2024-10-10 12:21:53.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2178 …}
+votes: Doctrine\ORM\PersistentCollection {#2183 …}
+reports: Doctrine\ORM\PersistentCollection {#2168 …}
+favourites: Doctrine\ORM\PersistentCollection {#2038 …}
+notifications: Doctrine\ORM\PersistentCollection {#1988 …}
+badges: Doctrine\ORM\PersistentCollection {#2003 …}
+children: []
-id: 32628
-titleTs: "'4':1 'blog':18 'debian':14 'deriv':15 'firefox':8 'linux':9 'mozilla':5,17 'new':7 'packag':10 'reason':2 'tri':4 'ubuntu':12"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706113434
+visibility: "visible "
+apId: "https://lemmy.world/post/11088313"
+editedAt: null
+createdAt: DateTimeImmutable @1706027034 {#2187
date: 2024-01-23 17:23:54.0 +01:00
}
} |
|
Show voter details
|
61 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
62 |
DENIED
|
moderate
|
App\Entity\Entry {#2219
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2217 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2196 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
cross-posted from: [lemmy.world/post/11049489](https://lemmy.world/post/11049489)\n
\n
> The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
> \n
> The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
> \n
> It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
> \n
> Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728475178 {#2222
date: 2024-10-09 13:59:38.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2199 …}
+votes: Doctrine\ORM\PersistentCollection {#2195 …}
+reports: Doctrine\ORM\PersistentCollection {#2197 …}
+favourites: Doctrine\ORM\PersistentCollection {#2206 …}
+notifications: Doctrine\ORM\PersistentCollection {#2201 …}
+badges: Doctrine\ORM\PersistentCollection {#2203 …}
+children: []
-id: 32450
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'/post/11049489](https://lemmy.world/post/11049489)':7 'action':93 'ad':20,104,123,134,176 'adblock':109 'advertis':42,146 'advic':94 'also':65,125 'appear':39 'articl':9,64,89,160 'associ':17,106 'avoid':142 'block':103,120,133 'capabl':118 'carri':33 'case':57 'cautious':149 'cite':50 'clear':91 'click':143 'compani':60 'comprehens':12 'cross':2 'cross-post':1 'danger':68 'differ':28 'discuss':80 'display':145 'dns':116 'download':75 'emphas':138 'employ':115 'exampl':51 'good':153 'guidanc':127 'high':54 'high-profil':53 'highlight':66 'import':140 'includ':46 'inform':165 'insight':25 'interact':78 'involv':58 'lemmy.world':6 'lemmy.world/post/11049489](https://lemmy.world/post/11049489)':5 'like':111 'major':59 'malici':70 'malvertis':22,30,56,178 'malwar':121 'mitig':98 'offer':24,126,157 'one':48 'origin':113 'overal':158 'overview':13 'phish':87 'platform':62 'popular':47 'possibl':137 'post':3 'potenti':82 'profil':55 'provid':10,90,167 'research':164 'resolv':117 'resourc':169 'risk':16,83,100,173 'scam':85 'script':71,107 'softwar':110 'target':19,175 'too-good-to-be-tru':151 'true':156 'ublock':112 'understand':171 'use':108 'user':77 'way':29 'websit':45 'well':163 'well-research':162 'without':76"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034927
+visibility: "visible "
+apId: "https://lemmy.world/post/11049672"
+editedAt: null
+createdAt: DateTimeImmutable @1705948527 {#2221
date: 2024-01-22 19:35:27.0 +01:00
}
} |
|
Show voter details
|
63 |
DENIED
|
edit
|
App\Entity\Entry {#2219
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2217 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2196 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
cross-posted from: [lemmy.world/post/11049489](https://lemmy.world/post/11049489)\n
\n
> The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
> \n
> The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
> \n
> It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
> \n
> Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728475178 {#2222
date: 2024-10-09 13:59:38.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2199 …}
+votes: Doctrine\ORM\PersistentCollection {#2195 …}
+reports: Doctrine\ORM\PersistentCollection {#2197 …}
+favourites: Doctrine\ORM\PersistentCollection {#2206 …}
+notifications: Doctrine\ORM\PersistentCollection {#2201 …}
+badges: Doctrine\ORM\PersistentCollection {#2203 …}
+children: []
-id: 32450
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'/post/11049489](https://lemmy.world/post/11049489)':7 'action':93 'ad':20,104,123,134,176 'adblock':109 'advertis':42,146 'advic':94 'also':65,125 'appear':39 'articl':9,64,89,160 'associ':17,106 'avoid':142 'block':103,120,133 'capabl':118 'carri':33 'case':57 'cautious':149 'cite':50 'clear':91 'click':143 'compani':60 'comprehens':12 'cross':2 'cross-post':1 'danger':68 'differ':28 'discuss':80 'display':145 'dns':116 'download':75 'emphas':138 'employ':115 'exampl':51 'good':153 'guidanc':127 'high':54 'high-profil':53 'highlight':66 'import':140 'includ':46 'inform':165 'insight':25 'interact':78 'involv':58 'lemmy.world':6 'lemmy.world/post/11049489](https://lemmy.world/post/11049489)':5 'like':111 'major':59 'malici':70 'malvertis':22,30,56,178 'malwar':121 'mitig':98 'offer':24,126,157 'one':48 'origin':113 'overal':158 'overview':13 'phish':87 'platform':62 'popular':47 'possibl':137 'post':3 'potenti':82 'profil':55 'provid':10,90,167 'research':164 'resolv':117 'resourc':169 'risk':16,83,100,173 'scam':85 'script':71,107 'softwar':110 'target':19,175 'too-good-to-be-tru':151 'true':156 'ublock':112 'understand':171 'use':108 'user':77 'way':29 'websit':45 'well':163 'well-research':162 'without':76"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034927
+visibility: "visible "
+apId: "https://lemmy.world/post/11049672"
+editedAt: null
+createdAt: DateTimeImmutable @1705948527 {#2221
date: 2024-01-22 19:35:27.0 +01:00
}
} |
|
Show voter details
|
64 |
DENIED
|
moderate
|
App\Entity\Entry {#2219
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2217 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2196 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
cross-posted from: [lemmy.world/post/11049489](https://lemmy.world/post/11049489)\n
\n
> The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
> \n
> The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
> \n
> It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
> \n
> Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728475178 {#2222
date: 2024-10-09 13:59:38.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2199 …}
+votes: Doctrine\ORM\PersistentCollection {#2195 …}
+reports: Doctrine\ORM\PersistentCollection {#2197 …}
+favourites: Doctrine\ORM\PersistentCollection {#2206 …}
+notifications: Doctrine\ORM\PersistentCollection {#2201 …}
+badges: Doctrine\ORM\PersistentCollection {#2203 …}
+children: []
-id: 32450
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'/post/11049489](https://lemmy.world/post/11049489)':7 'action':93 'ad':20,104,123,134,176 'adblock':109 'advertis':42,146 'advic':94 'also':65,125 'appear':39 'articl':9,64,89,160 'associ':17,106 'avoid':142 'block':103,120,133 'capabl':118 'carri':33 'case':57 'cautious':149 'cite':50 'clear':91 'click':143 'compani':60 'comprehens':12 'cross':2 'cross-post':1 'danger':68 'differ':28 'discuss':80 'display':145 'dns':116 'download':75 'emphas':138 'employ':115 'exampl':51 'good':153 'guidanc':127 'high':54 'high-profil':53 'highlight':66 'import':140 'includ':46 'inform':165 'insight':25 'interact':78 'involv':58 'lemmy.world':6 'lemmy.world/post/11049489](https://lemmy.world/post/11049489)':5 'like':111 'major':59 'malici':70 'malvertis':22,30,56,178 'malwar':121 'mitig':98 'offer':24,126,157 'one':48 'origin':113 'overal':158 'overview':13 'phish':87 'platform':62 'popular':47 'possibl':137 'post':3 'potenti':82 'profil':55 'provid':10,90,167 'research':164 'resolv':117 'resourc':169 'risk':16,83,100,173 'scam':85 'script':71,107 'softwar':110 'target':19,175 'too-good-to-be-tru':151 'true':156 'ublock':112 'understand':171 'use':108 'user':77 'way':29 'websit':45 'well':163 'well-research':162 'without':76"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034927
+visibility: "visible "
+apId: "https://lemmy.world/post/11049672"
+editedAt: null
+createdAt: DateTimeImmutable @1705948527 {#2221
date: 2024-01-22 19:35:27.0 +01:00
}
} |
|
Show voter details
|
65 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
66 |
DENIED
|
moderate
|
App\Entity\Entry {#2262
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2217 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2196 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
\n
The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
\n
It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
\n
Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705948237 {#2253
date: 2024-01-22 19:30:37.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2263 …}
+votes: Doctrine\ORM\PersistentCollection {#2235 …}
+reports: Doctrine\ORM\PersistentCollection {#2239 …}
+favourites: Doctrine\ORM\PersistentCollection {#2236 …}
+notifications: Doctrine\ORM\PersistentCollection {#2226 …}
+badges: Doctrine\ORM\PersistentCollection {#2238 …}
+children: []
-id: 32446
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'action':86 'ad':13,97,116,127,169 'adblock':102 'advertis':35,139 'advic':87 'also':58,118 'appear':32 'articl':2,57,82,153 'associ':10,99 'avoid':135 'block':96,113,126 'capabl':111 'carri':26 'case':50 'cautious':142 'cite':43 'clear':84 'click':136 'compani':53 'comprehens':5 'danger':61 'differ':21 'discuss':73 'display':138 'dns':109 'download':68 'emphas':131 'employ':108 'exampl':44 'good':146 'guidanc':120 'high':47 'high-profil':46 'highlight':59 'import':133 'includ':39 'inform':158 'insight':18 'interact':71 'involv':51 'like':104 'major':52 'malici':63 'malvertis':15,23,49,171 'malwar':114 'mitig':91 'offer':17,119,150 'one':41 'origin':106 'overal':151 'overview':6 'phish':80 'platform':55 'popular':40 'possibl':130 'potenti':75 'profil':48 'provid':3,83,160 'research':157 'resolv':110 'resourc':162 'risk':9,76,93,166 'scam':78 'script':64,100 'softwar':103 'target':12,168 'too-good-to-be-tru':144 'true':149 'ublock':105 'understand':164 'use':101 'user':70 'way':22 'websit':38 'well':156 'well-research':155 'without':69"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034637
+visibility: "visible "
+apId: "https://lemmy.world/post/11049489"
+editedAt: null
+createdAt: DateTimeImmutable @1705948237 {#2265
date: 2024-01-22 19:30:37.0 +01:00
}
} |
|
Show voter details
|
67 |
DENIED
|
edit
|
App\Entity\Entry {#2262
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2217 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2196 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
\n
The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
\n
It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
\n
Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705948237 {#2253
date: 2024-01-22 19:30:37.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2263 …}
+votes: Doctrine\ORM\PersistentCollection {#2235 …}
+reports: Doctrine\ORM\PersistentCollection {#2239 …}
+favourites: Doctrine\ORM\PersistentCollection {#2236 …}
+notifications: Doctrine\ORM\PersistentCollection {#2226 …}
+badges: Doctrine\ORM\PersistentCollection {#2238 …}
+children: []
-id: 32446
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'action':86 'ad':13,97,116,127,169 'adblock':102 'advertis':35,139 'advic':87 'also':58,118 'appear':32 'articl':2,57,82,153 'associ':10,99 'avoid':135 'block':96,113,126 'capabl':111 'carri':26 'case':50 'cautious':142 'cite':43 'clear':84 'click':136 'compani':53 'comprehens':5 'danger':61 'differ':21 'discuss':73 'display':138 'dns':109 'download':68 'emphas':131 'employ':108 'exampl':44 'good':146 'guidanc':120 'high':47 'high-profil':46 'highlight':59 'import':133 'includ':39 'inform':158 'insight':18 'interact':71 'involv':51 'like':104 'major':52 'malici':63 'malvertis':15,23,49,171 'malwar':114 'mitig':91 'offer':17,119,150 'one':41 'origin':106 'overal':151 'overview':6 'phish':80 'platform':55 'popular':40 'possibl':130 'potenti':75 'profil':48 'provid':3,83,160 'research':157 'resolv':110 'resourc':162 'risk':9,76,93,166 'scam':78 'script':64,100 'softwar':103 'target':12,168 'too-good-to-be-tru':144 'true':149 'ublock':105 'understand':164 'use':101 'user':70 'way':22 'websit':38 'well':156 'well-research':155 'without':69"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034637
+visibility: "visible "
+apId: "https://lemmy.world/post/11049489"
+editedAt: null
+createdAt: DateTimeImmutable @1705948237 {#2265
date: 2024-01-22 19:30:37.0 +01:00
}
} |
|
Show voter details
|
68 |
DENIED
|
moderate
|
App\Entity\Entry {#2262
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2217 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2196 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
\n
The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
\n
It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
\n
Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705948237 {#2253
date: 2024-01-22 19:30:37.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2263 …}
+votes: Doctrine\ORM\PersistentCollection {#2235 …}
+reports: Doctrine\ORM\PersistentCollection {#2239 …}
+favourites: Doctrine\ORM\PersistentCollection {#2236 …}
+notifications: Doctrine\ORM\PersistentCollection {#2226 …}
+badges: Doctrine\ORM\PersistentCollection {#2238 …}
+children: []
-id: 32446
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'action':86 'ad':13,97,116,127,169 'adblock':102 'advertis':35,139 'advic':87 'also':58,118 'appear':32 'articl':2,57,82,153 'associ':10,99 'avoid':135 'block':96,113,126 'capabl':111 'carri':26 'case':50 'cautious':142 'cite':43 'clear':84 'click':136 'compani':53 'comprehens':5 'danger':61 'differ':21 'discuss':73 'display':138 'dns':109 'download':68 'emphas':131 'employ':108 'exampl':44 'good':146 'guidanc':120 'high':47 'high-profil':46 'highlight':59 'import':133 'includ':39 'inform':158 'insight':18 'interact':71 'involv':51 'like':104 'major':52 'malici':63 'malvertis':15,23,49,171 'malwar':114 'mitig':91 'offer':17,119,150 'one':41 'origin':106 'overal':151 'overview':6 'phish':80 'platform':55 'popular':40 'possibl':130 'potenti':75 'profil':48 'provid':3,83,160 'research':157 'resolv':110 'resourc':162 'risk':9,76,93,166 'scam':78 'script':64,100 'softwar':103 'target':12,168 'too-good-to-be-tru':144 'true':149 'ublock':105 'understand':164 'use':101 'user':70 'way':22 'websit':38 'well':156 'well-research':155 'without':69"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034637
+visibility: "visible "
+apId: "https://lemmy.world/post/11049489"
+editedAt: null
+createdAt: DateTimeImmutable @1705948237 {#2265
date: 2024-01-22 19:30:37.0 +01:00
}
} |
|
Show voter details
|
69 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
70 |
DENIED
|
moderate
|
App\Entity\Entry {#2363
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#1708 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Facebook-Messenger-s-Rollout-of-End-to-End-Encryption-Leaves-Metadata-Questions-Unanswered"
+title: "Facebook Messenger's Rollout of End-to-End Encryption Leaves Metadata Questions Unanswered"
+url: "https://spectrum.ieee.org/end-to-end-encryption-messenger"
+body: """
Excerpts from the [article](https://spectrum.ieee.org/end-to-end-encryption-messenger) and another [article](https://www.eff.org/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger) by the Electronic Frontier Foundation (EFF) :\n
\n
While Meta won’t collect messages themselves, there is nothing stopping them from collecting metadata on those very messages.\n
\n
By design, Meta has access to a lot of unencrypted metadata, such as who sends messages to whom, when those messages were sent, and data about you, your account, and your social contacts. None of that will change with the introduction of default encryption.\n
\n
Meta has a reputation for [collecting its users’ data](https://www.wired.com/story/ways-facebook-tracks-you-limit-it/): a key part of its lucrative advertising business. In fact, last year, the company [earned](https://www.theverge.com/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion) a US $1.3 billion fine from European Union regulators for transferring EU citizens’ Facebook data to the United States.\n
\n
Meta’s documentation [indicates](https://messengernews.fb.com/wp-content/uploads/2021/12/Metas-approach-to-safer-private-messaging-on-Messenger-and-Instagram-DMs-Sep-23.pdf) the company will continue to process messages’ metadata: what time a message was sent, for example, and who sent it to whom. The company says it will use metadata to help identify bad actors. Privacy advocates see this use case as evidence metadata can make a double-edged sword.\n
\n
“*This also demonstrates how much can be inferred from behaviors and metadata without needing access to the actual contents of messages themselves*,” says Geraghty. “So we have to ask: What could Meta be using this data for additionally? It’s likely this metadata will be used to continuously enrich user profiles for targeted advertising purposes.”
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 102
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727469802 {#2471
date: 2024-09-27 22:43:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1906 …}
+votes: Doctrine\ORM\PersistentCollection {#1908 …}
+reports: Doctrine\ORM\PersistentCollection {#1926 …}
+favourites: Doctrine\ORM\PersistentCollection {#1907 …}
+notifications: Doctrine\ORM\PersistentCollection {#1883 …}
+badges: Doctrine\ORM\PersistentCollection {#2389 …}
+children: []
-id: 32203
-titleTs: "'encrypt':10 'end':7,9 'end-to-end':6 'facebook':1 'leav':11 'messeng':2 'metadata':12 'question':13 'rollout':4 'unansw':14"
-bodyTs: "'/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion)':112 '/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger)':13 '/end-to-end-encryption-messenger)':7 '/story/ways-facebook-tracks-you-limit-it/):':94 '/wp-content/uploads/2021/12/metas-approach-to-safer-private-messaging-on-messenger-and-instagram-dms-sep-23.pdf)':138 '1.3':115 'access':43,203 'account':67 'actor':172 'actual':206 'addit':226 'advertis':101,242 'advoc':174 'also':190 'anoth':9 'articl':4,10 'ask':217 'bad':171 'behavior':198 'billion':116 'busi':102 'case':178 'chang':76 'citizen':125 'collect':24,33,88 'compani':108,140,162 'contact':71 'content':207 'continu':142,236 'could':219 'data':63,91,127,224 'default':81 'demonstr':191 'design':40 'document':134 'doubl':186 'double-edg':185 'earn':109 'edg':187 'eff':19 'electron':16 'encrypt':82 'enrich':237 'eu':124 'european':119 'evid':180 'exampl':154 'excerpt':1 'facebook':126 'fact':104 'fine':117 'foundat':18 'frontier':17 'geraghti':212 'help':169 'identifi':170 'indic':135 'infer':196 'introduct':79 'key':96 'last':105 'like':229 'lot':46 'lucrat':100 'make':183 'messag':25,38,54,59,145,150,209 'messengernews.fb.com':137 'messengernews.fb.com/wp-content/uploads/2021/12/metas-approach-to-safer-private-messaging-on-messenger-and-instagram-dms-sep-23.pdf)':136 'meta':21,41,83,132,220 'metadata':34,49,146,167,181,200,231 'much':193 'need':202 'none':72 'noth':29 'part':97 'privaci':173 'process':144 'profil':239 'purpos':243 'regul':121 'reput':86 'say':163,211 'see':175 'send':53 'sent':61,152,157 'social':70 'spectrum.ieee.org':6 'spectrum.ieee.org/end-to-end-encryption-messenger)':5 'state':131 'stop':30 'sword':188 'target':241 'time':148 'transfer':123 'unencrypt':48 'union':120 'unit':130 'us':114 'use':166,177,222,234 'user':90,238 'without':201 'won':22 'www.eff.org':12 'www.eff.org/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger)':11 'www.theverge.com':111 'www.theverge.com/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion)':110 'www.wired.com':93 'www.wired.com/story/ways-facebook-tracks-you-limit-it/):':92 'year':106"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705946678
+visibility: "visible "
+apId: "https://lemmy.world/post/11003492"
+editedAt: null
+createdAt: DateTimeImmutable @1705860278 {#2371
date: 2024-01-21 19:04:38.0 +01:00
}
} |
|
Show voter details
|
71 |
DENIED
|
edit
|
App\Entity\Entry {#2363
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#1708 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Facebook-Messenger-s-Rollout-of-End-to-End-Encryption-Leaves-Metadata-Questions-Unanswered"
+title: "Facebook Messenger's Rollout of End-to-End Encryption Leaves Metadata Questions Unanswered"
+url: "https://spectrum.ieee.org/end-to-end-encryption-messenger"
+body: """
Excerpts from the [article](https://spectrum.ieee.org/end-to-end-encryption-messenger) and another [article](https://www.eff.org/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger) by the Electronic Frontier Foundation (EFF) :\n
\n
While Meta won’t collect messages themselves, there is nothing stopping them from collecting metadata on those very messages.\n
\n
By design, Meta has access to a lot of unencrypted metadata, such as who sends messages to whom, when those messages were sent, and data about you, your account, and your social contacts. None of that will change with the introduction of default encryption.\n
\n
Meta has a reputation for [collecting its users’ data](https://www.wired.com/story/ways-facebook-tracks-you-limit-it/): a key part of its lucrative advertising business. In fact, last year, the company [earned](https://www.theverge.com/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion) a US $1.3 billion fine from European Union regulators for transferring EU citizens’ Facebook data to the United States.\n
\n
Meta’s documentation [indicates](https://messengernews.fb.com/wp-content/uploads/2021/12/Metas-approach-to-safer-private-messaging-on-Messenger-and-Instagram-DMs-Sep-23.pdf) the company will continue to process messages’ metadata: what time a message was sent, for example, and who sent it to whom. The company says it will use metadata to help identify bad actors. Privacy advocates see this use case as evidence metadata can make a double-edged sword.\n
\n
“*This also demonstrates how much can be inferred from behaviors and metadata without needing access to the actual contents of messages themselves*,” says Geraghty. “So we have to ask: What could Meta be using this data for additionally? It’s likely this metadata will be used to continuously enrich user profiles for targeted advertising purposes.”
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 102
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727469802 {#2471
date: 2024-09-27 22:43:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1906 …}
+votes: Doctrine\ORM\PersistentCollection {#1908 …}
+reports: Doctrine\ORM\PersistentCollection {#1926 …}
+favourites: Doctrine\ORM\PersistentCollection {#1907 …}
+notifications: Doctrine\ORM\PersistentCollection {#1883 …}
+badges: Doctrine\ORM\PersistentCollection {#2389 …}
+children: []
-id: 32203
-titleTs: "'encrypt':10 'end':7,9 'end-to-end':6 'facebook':1 'leav':11 'messeng':2 'metadata':12 'question':13 'rollout':4 'unansw':14"
-bodyTs: "'/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion)':112 '/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger)':13 '/end-to-end-encryption-messenger)':7 '/story/ways-facebook-tracks-you-limit-it/):':94 '/wp-content/uploads/2021/12/metas-approach-to-safer-private-messaging-on-messenger-and-instagram-dms-sep-23.pdf)':138 '1.3':115 'access':43,203 'account':67 'actor':172 'actual':206 'addit':226 'advertis':101,242 'advoc':174 'also':190 'anoth':9 'articl':4,10 'ask':217 'bad':171 'behavior':198 'billion':116 'busi':102 'case':178 'chang':76 'citizen':125 'collect':24,33,88 'compani':108,140,162 'contact':71 'content':207 'continu':142,236 'could':219 'data':63,91,127,224 'default':81 'demonstr':191 'design':40 'document':134 'doubl':186 'double-edg':185 'earn':109 'edg':187 'eff':19 'electron':16 'encrypt':82 'enrich':237 'eu':124 'european':119 'evid':180 'exampl':154 'excerpt':1 'facebook':126 'fact':104 'fine':117 'foundat':18 'frontier':17 'geraghti':212 'help':169 'identifi':170 'indic':135 'infer':196 'introduct':79 'key':96 'last':105 'like':229 'lot':46 'lucrat':100 'make':183 'messag':25,38,54,59,145,150,209 'messengernews.fb.com':137 'messengernews.fb.com/wp-content/uploads/2021/12/metas-approach-to-safer-private-messaging-on-messenger-and-instagram-dms-sep-23.pdf)':136 'meta':21,41,83,132,220 'metadata':34,49,146,167,181,200,231 'much':193 'need':202 'none':72 'noth':29 'part':97 'privaci':173 'process':144 'profil':239 'purpos':243 'regul':121 'reput':86 'say':163,211 'see':175 'send':53 'sent':61,152,157 'social':70 'spectrum.ieee.org':6 'spectrum.ieee.org/end-to-end-encryption-messenger)':5 'state':131 'stop':30 'sword':188 'target':241 'time':148 'transfer':123 'unencrypt':48 'union':120 'unit':130 'us':114 'use':166,177,222,234 'user':90,238 'without':201 'won':22 'www.eff.org':12 'www.eff.org/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger)':11 'www.theverge.com':111 'www.theverge.com/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion)':110 'www.wired.com':93 'www.wired.com/story/ways-facebook-tracks-you-limit-it/):':92 'year':106"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705946678
+visibility: "visible "
+apId: "https://lemmy.world/post/11003492"
+editedAt: null
+createdAt: DateTimeImmutable @1705860278 {#2371
date: 2024-01-21 19:04:38.0 +01:00
}
} |
|
Show voter details
|
72 |
DENIED
|
moderate
|
App\Entity\Entry {#2363
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#1708 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Facebook-Messenger-s-Rollout-of-End-to-End-Encryption-Leaves-Metadata-Questions-Unanswered"
+title: "Facebook Messenger's Rollout of End-to-End Encryption Leaves Metadata Questions Unanswered"
+url: "https://spectrum.ieee.org/end-to-end-encryption-messenger"
+body: """
Excerpts from the [article](https://spectrum.ieee.org/end-to-end-encryption-messenger) and another [article](https://www.eff.org/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger) by the Electronic Frontier Foundation (EFF) :\n
\n
While Meta won’t collect messages themselves, there is nothing stopping them from collecting metadata on those very messages.\n
\n
By design, Meta has access to a lot of unencrypted metadata, such as who sends messages to whom, when those messages were sent, and data about you, your account, and your social contacts. None of that will change with the introduction of default encryption.\n
\n
Meta has a reputation for [collecting its users’ data](https://www.wired.com/story/ways-facebook-tracks-you-limit-it/): a key part of its lucrative advertising business. In fact, last year, the company [earned](https://www.theverge.com/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion) a US $1.3 billion fine from European Union regulators for transferring EU citizens’ Facebook data to the United States.\n
\n
Meta’s documentation [indicates](https://messengernews.fb.com/wp-content/uploads/2021/12/Metas-approach-to-safer-private-messaging-on-Messenger-and-Instagram-DMs-Sep-23.pdf) the company will continue to process messages’ metadata: what time a message was sent, for example, and who sent it to whom. The company says it will use metadata to help identify bad actors. Privacy advocates see this use case as evidence metadata can make a double-edged sword.\n
\n
“*This also demonstrates how much can be inferred from behaviors and metadata without needing access to the actual contents of messages themselves*,” says Geraghty. “So we have to ask: What could Meta be using this data for additionally? It’s likely this metadata will be used to continuously enrich user profiles for targeted advertising purposes.”
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 8
+favouriteCount: 102
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727469802 {#2471
date: 2024-09-27 22:43:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1906 …}
+votes: Doctrine\ORM\PersistentCollection {#1908 …}
+reports: Doctrine\ORM\PersistentCollection {#1926 …}
+favourites: Doctrine\ORM\PersistentCollection {#1907 …}
+notifications: Doctrine\ORM\PersistentCollection {#1883 …}
+badges: Doctrine\ORM\PersistentCollection {#2389 …}
+children: []
-id: 32203
-titleTs: "'encrypt':10 'end':7,9 'end-to-end':6 'facebook':1 'leav':11 'messeng':2 'metadata':12 'question':13 'rollout':4 'unansw':14"
-bodyTs: "'/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion)':112 '/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger)':13 '/end-to-end-encryption-messenger)':7 '/story/ways-facebook-tracks-you-limit-it/):':94 '/wp-content/uploads/2021/12/metas-approach-to-safer-private-messaging-on-messenger-and-instagram-dms-sep-23.pdf)':138 '1.3':115 'access':43,203 'account':67 'actor':172 'actual':206 'addit':226 'advertis':101,242 'advoc':174 'also':190 'anoth':9 'articl':4,10 'ask':217 'bad':171 'behavior':198 'billion':116 'busi':102 'case':178 'chang':76 'citizen':125 'collect':24,33,88 'compani':108,140,162 'contact':71 'content':207 'continu':142,236 'could':219 'data':63,91,127,224 'default':81 'demonstr':191 'design':40 'document':134 'doubl':186 'double-edg':185 'earn':109 'edg':187 'eff':19 'electron':16 'encrypt':82 'enrich':237 'eu':124 'european':119 'evid':180 'exampl':154 'excerpt':1 'facebook':126 'fact':104 'fine':117 'foundat':18 'frontier':17 'geraghti':212 'help':169 'identifi':170 'indic':135 'infer':196 'introduct':79 'key':96 'last':105 'like':229 'lot':46 'lucrat':100 'make':183 'messag':25,38,54,59,145,150,209 'messengernews.fb.com':137 'messengernews.fb.com/wp-content/uploads/2021/12/metas-approach-to-safer-private-messaging-on-messenger-and-instagram-dms-sep-23.pdf)':136 'meta':21,41,83,132,220 'metadata':34,49,146,167,181,200,231 'much':193 'need':202 'none':72 'noth':29 'part':97 'privaci':173 'process':144 'profil':239 'purpos':243 'regul':121 'reput':86 'say':163,211 'see':175 'send':53 'sent':61,152,157 'social':70 'spectrum.ieee.org':6 'spectrum.ieee.org/end-to-end-encryption-messenger)':5 'state':131 'stop':30 'sword':188 'target':241 'time':148 'transfer':123 'unencrypt':48 'union':120 'unit':130 'us':114 'use':166,177,222,234 'user':90,238 'without':201 'won':22 'www.eff.org':12 'www.eff.org/deeplinks/2023/12/meta-announces-end-end-encryption-default-messenger)':11 'www.theverge.com':111 'www.theverge.com/2023/5/22/23732461/meta-eu-privacy-fine-us-data-transfers-1-3-billion)':110 'www.wired.com':93 'www.wired.com/story/ways-facebook-tracks-you-limit-it/):':92 'year':106"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705946678
+visibility: "visible "
+apId: "https://lemmy.world/post/11003492"
+editedAt: null
+createdAt: DateTimeImmutable @1705860278 {#2371
date: 2024-01-21 19:04:38.0 +01:00
}
} |
|
Show voter details
|
73 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
74 |
DENIED
|
moderate
|
App\Entity\Entry {#2152
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2122 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2115 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
\n
> Full text from the Electronic Frontier Foundation (EFF) article:\n
> \n
> Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
> \n
> By Matthew Guariglia and Eva Galperin\n
> \n
> ~3 minutes\n
> \n
> For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
> \n
> Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
> \n
> We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
> \n
> Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 99
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727359314 {#2145
date: 2024-09-26 16:01:54.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2153 …}
+votes: Doctrine\ORM\PersistentCollection {#2149 …}
+reports: Doctrine\ORM\PersistentCollection {#2185 …}
+favourites: Doctrine\ORM\PersistentCollection {#2179 …}
+notifications: Doctrine\ORM\PersistentCollection {#2182 …}
+badges: Doctrine\ORM\PersistentCollection {#2172 …}
+children: []
-id: 32104
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705913408
+visibility: "visible "
+apId: "https://lemmy.world/post/10984539"
+editedAt: null
+createdAt: DateTimeImmutable @1705827008 {#2150
date: 2024-01-21 09:50:08.0 +01:00
}
} |
|
Show voter details
|
75 |
DENIED
|
edit
|
App\Entity\Entry {#2152
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2122 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2115 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
\n
> Full text from the Electronic Frontier Foundation (EFF) article:\n
> \n
> Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
> \n
> By Matthew Guariglia and Eva Galperin\n
> \n
> ~3 minutes\n
> \n
> For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
> \n
> Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
> \n
> We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
> \n
> Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 99
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727359314 {#2145
date: 2024-09-26 16:01:54.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2153 …}
+votes: Doctrine\ORM\PersistentCollection {#2149 …}
+reports: Doctrine\ORM\PersistentCollection {#2185 …}
+favourites: Doctrine\ORM\PersistentCollection {#2179 …}
+notifications: Doctrine\ORM\PersistentCollection {#2182 …}
+badges: Doctrine\ORM\PersistentCollection {#2172 …}
+children: []
-id: 32104
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705913408
+visibility: "visible "
+apId: "https://lemmy.world/post/10984539"
+editedAt: null
+createdAt: DateTimeImmutable @1705827008 {#2150
date: 2024-01-21 09:50:08.0 +01:00
}
} |
|
Show voter details
|
76 |
DENIED
|
moderate
|
App\Entity\Entry {#2152
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2122 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2115 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
cross-posted from: [lemmy.world/post/10984512](https://lemmy.world/post/10984512)\n
\n
> Full text from the Electronic Frontier Foundation (EFF) article:\n
> \n
> Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
> \n
> By Matthew Guariglia and Eva Galperin\n
> \n
> ~3 minutes\n
> \n
> For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
> \n
> Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
> \n
> We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
> \n
> Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 99
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727359314 {#2145
date: 2024-09-26 16:01:54.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2153 …}
+votes: Doctrine\ORM\PersistentCollection {#2149 …}
+reports: Doctrine\ORM\PersistentCollection {#2185 …}
+favourites: Doctrine\ORM\PersistentCollection {#2179 …}
+notifications: Doctrine\ORM\PersistentCollection {#2182 …}
+badges: Doctrine\ORM\PersistentCollection {#2172 …}
+children: []
-id: 32104
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':174 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':224 '/post/10984512](https://lemmy.world/post/10984512)':7 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':65 '3':37 '404':61 'abus':218 'access':306 'accord':219 'account':145,168 'actor':161 'address':73,158 'adher':360 'also':231 'articl':16 'bad':160 'better':316 'big':239 'bounti':225 'breach':164 'busi':249 'claim':135 'clear':335 'collect':246 'collector':229 'come':327 'compani':17,51,208,254,282,295,384 'concern':374 'convinc':103 'corpor':264 'creat':256 'cross':2 'cross-post':1 'data':30,182,193,265,289,310,323,349,370 'deal':347 'death':199 'debt':228 'depart':133 'depend':378 'discret':381 'domain':170 'domest':217 'easi':21 'eff':15 'electron':12 'email':157,167 'emerg':181,322,369 'employe':345 'enforc':166,353 'entwin':240 'eva':35 'exist':130 'face':340 'fail':283 'fake':95,177,302,368 'first':243 'form':109 'foundat':14 'fraudul':366 'frontier':13 'full':8 'galperin':36 'get':50,192,204,305 'govern':156 'guariglia':33 'hand':53,70 'harder':300 'hunter':226 'imperson':25,44,201 'impost':99 'incred':55 'individu':79 'inform':58,206,261 'isn':209 'judici':189 'krebsonsecurity.com':173 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':172 'law':165,352 'lemmy.world':6 'lemmy.world/post/10984512](https://lemmy.world/post/10984512)':5 'less':390 'life':197 'likewis':159 'log':76 'mail':144 'make':18,298 'mani':253,281 'matthew':32 'media':62 'minut':38 'miss':107 'model':250 'motherboard':221 'must':314 'name':122,171 'offic':88,126,303 'offici':155 'one':377 'onlin':46,149 'order':48 'oversight':190 'parti':388 'particular':102 'pdf':92 'peopl':41 'person':57,148,260 'phone':75 'polic':26,45,87,125,185,202,269,294,386 'polici':342 'post':3 'pretend':83,291 'prevent':285 'privaci':341,396 'problem':241 'proton':143 'public':339 'public-fac':338 'quick':194 'rais':372 'rather':152 'real':376 'realm':213 'receiv':355 'recent':66 'report':59 'reput':393 'request':105,183,324,350,367,371 'requir':112,330,363 'reservoir':258 'reveal':67 'ripe':267 'scrutin':318 'search':114 'second':277 'seiz':271 'send':176,187 'sensit':56,205,309 'server':266 'situat':200 'special':373 'spell':333 'spot':365 'stalker':82,215 'starter':312 'state':118 'steal':28,275,288 'stellar':392 'store':262 'subpoena':179,320 'suppos':196 'tactic':234 'text':9 'thiev':23,273,286 'train':356 'two':237,387 'use':120,141,151,163,232 'valu':395 'vast':257 'verizon':69 'warrant':96,115,178,319 'wasn':100 'without':188 'wors':97 'www.404media.co':64 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':63 'www.vice.com':223 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':222 'year':40"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705913408
+visibility: "visible "
+apId: "https://lemmy.world/post/10984539"
+editedAt: null
+createdAt: DateTimeImmutable @1705827008 {#2150
date: 2024-01-21 09:50:08.0 +01:00
}
} |
|
Show voter details
|
77 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
78 |
DENIED
|
moderate
|
App\Entity\Entry {#2121
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2122 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2115 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
Full text from the Electronic Frontier Foundation (EFF) article:\n
\n
Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
\n
By Matthew Guariglia and Eva Galperin\n
\n
~3 minutes\n
\n
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
\n
Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
\n
We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
\n
Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 34
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705826831 {#2118
date: 2024-01-21 09:47:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2113 …}
+votes: Doctrine\ORM\PersistentCollection {#2119 …}
+reports: Doctrine\ORM\PersistentCollection {#2120 …}
+favourites: Doctrine\ORM\PersistentCollection {#2160 …}
+notifications: Doctrine\ORM\PersistentCollection {#2162 …}
+badges: Doctrine\ORM\PersistentCollection {#2128 …}
+children: []
-id: 32102
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705903331
+visibility: "visible "
+apId: "https://lemmy.world/post/10984512"
+editedAt: null
+createdAt: DateTimeImmutable @1705826831 {#2117
date: 2024-01-21 09:47:11.0 +01:00
}
} |
|
Show voter details
|
79 |
DENIED
|
edit
|
App\Entity\Entry {#2121
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2122 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2115 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
Full text from the Electronic Frontier Foundation (EFF) article:\n
\n
Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
\n
By Matthew Guariglia and Eva Galperin\n
\n
~3 minutes\n
\n
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
\n
Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
\n
We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
\n
Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 34
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705826831 {#2118
date: 2024-01-21 09:47:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2113 …}
+votes: Doctrine\ORM\PersistentCollection {#2119 …}
+reports: Doctrine\ORM\PersistentCollection {#2120 …}
+favourites: Doctrine\ORM\PersistentCollection {#2160 …}
+notifications: Doctrine\ORM\PersistentCollection {#2162 …}
+badges: Doctrine\ORM\PersistentCollection {#2128 …}
+children: []
-id: 32102
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705903331
+visibility: "visible "
+apId: "https://lemmy.world/post/10984512"
+editedAt: null
+createdAt: DateTimeImmutable @1705826831 {#2117
date: 2024-01-21 09:47:11.0 +01:00
}
} |
|
Show voter details
|
80 |
DENIED
|
moderate
|
App\Entity\Entry {#2121
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2122 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2115 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
Full text from the Electronic Frontier Foundation (EFF) article:\n
\n
Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
\n
By Matthew Guariglia and Eva Galperin\n
\n
~3 minutes\n
\n
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
\n
Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
\n
We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
\n
Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 34
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705826831 {#2118
date: 2024-01-21 09:47:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2113 …}
+votes: Doctrine\ORM\PersistentCollection {#2119 …}
+reports: Doctrine\ORM\PersistentCollection {#2120 …}
+favourites: Doctrine\ORM\PersistentCollection {#2160 …}
+notifications: Doctrine\ORM\PersistentCollection {#2162 …}
+badges: Doctrine\ORM\PersistentCollection {#2128 …}
+children: []
-id: 32102
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705903331
+visibility: "visible "
+apId: "https://lemmy.world/post/10984512"
+editedAt: null
+createdAt: DateTimeImmutable @1705826831 {#2117
date: 2024-01-21 09:47:11.0 +01:00
}
} |
|
Show voter details
|
81 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
82 |
DENIED
|
moderate
|
App\Entity\Entry {#2062
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2081 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2077 …}
+slug: "Riot-Games-Now-Requires-Kernel-Level-Anti-Cheat-Software-for-League-of"
+title: "Riot Games Now Requires Kernel-Level Anti-Cheat Software for League of Legends, Following Valorant's Implementation"
+url: "https://tuta.com/blog/Riot-requires-kernel-level-anticheat"
+body: """
cross-posted from: [lemmy.world/post/10958052](https://lemmy.world/post/10958052)\n
\n
> Vanguard, the controversial anti-cheat software initially attached to Valorant, is now also coming to League of Legends.\n
> \n
> Summary:\n
> \n
> The article discusses Riot Games’ requirement for players to install their Vanguard anti-cheat software, which runs at the kernel level, in order to play their games such as League of Legends and Valorant. The software aims to combat cheating by scanning for known vulnerabilities and blocking them, as well as monitoring for suspicious activity while the game is being played. However, the use of kernel-level software raises concerns about privacy and security, as it grants the company complete access to users’ devices.\n
> \n
> The article highlights that Riot Games is owned by Tencent, a Chinese tech giant that has been involved in censorship and surveillance activities in China. This raises concerns that Vanguard could potentially be used for similar purposes, such as monitoring players’ activity and restricting free speech in-game.\n
> \n
> Ultimately, the decision to install Vanguard rests with players, but the article urges caution and encourages players to consider the potential risks and implications before doing so.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 33
+favouriteCount: 194
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727772125 {#2082
date: 2024-10-01 10:42:05.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2098 …}
+votes: Doctrine\ORM\PersistentCollection {#2080 …}
+reports: Doctrine\ORM\PersistentCollection {#2089 …}
+favourites: Doctrine\ORM\PersistentCollection {#2095 …}
+notifications: Doctrine\ORM\PersistentCollection {#2091 …}
+badges: Doctrine\ORM\PersistentCollection {#2090 …}
+children: []
-id: 31982
-titleTs: "'anti':9 'anti-cheat':8 'cheat':10 'follow':16 'game':2 'implement':19 'kernel':6 'kernel-level':5 'leagu':13 'legend':15 'level':7 'requir':4 'riot':1 'softwar':11 'valor':17"
-bodyTs: "'/post/10958052](https://lemmy.world/post/10958052)':7 'access':110 'activ':83,136,155 'aim':65 'also':21 'anti':12,41 'anti-cheat':11,40 'articl':29,115,174 'attach':16 'block':75 'caution':176 'censorship':133 'cheat':13,42,68 'china':138 'chines':125 'combat':67 'come':22 'compani':108 'complet':109 'concern':99,141 'consid':181 'controversi':10 'could':144 'cross':2 'cross-post':1 'decis':165 'devic':113 'discuss':30 'encourag':178 'free':158 'game':32,55,86,119,162 'giant':127 'grant':106 'highlight':116 'howev':90 'implic':186 'in-gam':160 'initi':15 'instal':37,167 'involv':131 'kernel':48,95 'kernel-level':94 'known':72 'leagu':24,58 'legend':26,60 'lemmy.world':6 'lemmy.world/post/10958052](https://lemmy.world/post/10958052)':5 'level':49,96 'monitor':80,153 'order':51 'own':121 'play':53,89 'player':35,154,171,179 'post':3 'potenti':145,183 'privaci':101 'purpos':150 'rais':98,140 'requir':33 'rest':169 'restrict':157 'riot':31,118 'risk':184 'run':45 'scan':70 'secur':103 'similar':149 'softwar':14,43,64,97 'speech':159 'summari':27 'surveil':135 'suspici':82 'tech':126 'tencent':123 'ultim':163 'urg':175 'use':92,147 'user':112 'valor':18,62 'vanguard':8,39,143,168 'vulner':73 'well':78"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705861187
+visibility: "visible "
+apId: "https://lemmy.world/post/10958057"
+editedAt: DateTimeImmutable @1727160233 {#2085
date: 2024-09-24 08:43:53.0 +02:00
}
+createdAt: DateTimeImmutable @1705774787 {#2096
date: 2024-01-20 19:19:47.0 +01:00
}
} |
|
Show voter details
|
83 |
DENIED
|
edit
|
App\Entity\Entry {#2062
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2081 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2077 …}
+slug: "Riot-Games-Now-Requires-Kernel-Level-Anti-Cheat-Software-for-League-of"
+title: "Riot Games Now Requires Kernel-Level Anti-Cheat Software for League of Legends, Following Valorant's Implementation"
+url: "https://tuta.com/blog/Riot-requires-kernel-level-anticheat"
+body: """
cross-posted from: [lemmy.world/post/10958052](https://lemmy.world/post/10958052)\n
\n
> Vanguard, the controversial anti-cheat software initially attached to Valorant, is now also coming to League of Legends.\n
> \n
> Summary:\n
> \n
> The article discusses Riot Games’ requirement for players to install their Vanguard anti-cheat software, which runs at the kernel level, in order to play their games such as League of Legends and Valorant. The software aims to combat cheating by scanning for known vulnerabilities and blocking them, as well as monitoring for suspicious activity while the game is being played. However, the use of kernel-level software raises concerns about privacy and security, as it grants the company complete access to users’ devices.\n
> \n
> The article highlights that Riot Games is owned by Tencent, a Chinese tech giant that has been involved in censorship and surveillance activities in China. This raises concerns that Vanguard could potentially be used for similar purposes, such as monitoring players’ activity and restricting free speech in-game.\n
> \n
> Ultimately, the decision to install Vanguard rests with players, but the article urges caution and encourages players to consider the potential risks and implications before doing so.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 33
+favouriteCount: 194
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727772125 {#2082
date: 2024-10-01 10:42:05.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2098 …}
+votes: Doctrine\ORM\PersistentCollection {#2080 …}
+reports: Doctrine\ORM\PersistentCollection {#2089 …}
+favourites: Doctrine\ORM\PersistentCollection {#2095 …}
+notifications: Doctrine\ORM\PersistentCollection {#2091 …}
+badges: Doctrine\ORM\PersistentCollection {#2090 …}
+children: []
-id: 31982
-titleTs: "'anti':9 'anti-cheat':8 'cheat':10 'follow':16 'game':2 'implement':19 'kernel':6 'kernel-level':5 'leagu':13 'legend':15 'level':7 'requir':4 'riot':1 'softwar':11 'valor':17"
-bodyTs: "'/post/10958052](https://lemmy.world/post/10958052)':7 'access':110 'activ':83,136,155 'aim':65 'also':21 'anti':12,41 'anti-cheat':11,40 'articl':29,115,174 'attach':16 'block':75 'caution':176 'censorship':133 'cheat':13,42,68 'china':138 'chines':125 'combat':67 'come':22 'compani':108 'complet':109 'concern':99,141 'consid':181 'controversi':10 'could':144 'cross':2 'cross-post':1 'decis':165 'devic':113 'discuss':30 'encourag':178 'free':158 'game':32,55,86,119,162 'giant':127 'grant':106 'highlight':116 'howev':90 'implic':186 'in-gam':160 'initi':15 'instal':37,167 'involv':131 'kernel':48,95 'kernel-level':94 'known':72 'leagu':24,58 'legend':26,60 'lemmy.world':6 'lemmy.world/post/10958052](https://lemmy.world/post/10958052)':5 'level':49,96 'monitor':80,153 'order':51 'own':121 'play':53,89 'player':35,154,171,179 'post':3 'potenti':145,183 'privaci':101 'purpos':150 'rais':98,140 'requir':33 'rest':169 'restrict':157 'riot':31,118 'risk':184 'run':45 'scan':70 'secur':103 'similar':149 'softwar':14,43,64,97 'speech':159 'summari':27 'surveil':135 'suspici':82 'tech':126 'tencent':123 'ultim':163 'urg':175 'use':92,147 'user':112 'valor':18,62 'vanguard':8,39,143,168 'vulner':73 'well':78"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705861187
+visibility: "visible "
+apId: "https://lemmy.world/post/10958057"
+editedAt: DateTimeImmutable @1727160233 {#2085
date: 2024-09-24 08:43:53.0 +02:00
}
+createdAt: DateTimeImmutable @1705774787 {#2096
date: 2024-01-20 19:19:47.0 +01:00
}
} |
|
Show voter details
|
84 |
DENIED
|
moderate
|
App\Entity\Entry {#2062
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2081 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2077 …}
+slug: "Riot-Games-Now-Requires-Kernel-Level-Anti-Cheat-Software-for-League-of"
+title: "Riot Games Now Requires Kernel-Level Anti-Cheat Software for League of Legends, Following Valorant's Implementation"
+url: "https://tuta.com/blog/Riot-requires-kernel-level-anticheat"
+body: """
cross-posted from: [lemmy.world/post/10958052](https://lemmy.world/post/10958052)\n
\n
> Vanguard, the controversial anti-cheat software initially attached to Valorant, is now also coming to League of Legends.\n
> \n
> Summary:\n
> \n
> The article discusses Riot Games’ requirement for players to install their Vanguard anti-cheat software, which runs at the kernel level, in order to play their games such as League of Legends and Valorant. The software aims to combat cheating by scanning for known vulnerabilities and blocking them, as well as monitoring for suspicious activity while the game is being played. However, the use of kernel-level software raises concerns about privacy and security, as it grants the company complete access to users’ devices.\n
> \n
> The article highlights that Riot Games is owned by Tencent, a Chinese tech giant that has been involved in censorship and surveillance activities in China. This raises concerns that Vanguard could potentially be used for similar purposes, such as monitoring players’ activity and restricting free speech in-game.\n
> \n
> Ultimately, the decision to install Vanguard rests with players, but the article urges caution and encourages players to consider the potential risks and implications before doing so.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 33
+favouriteCount: 194
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727772125 {#2082
date: 2024-10-01 10:42:05.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2098 …}
+votes: Doctrine\ORM\PersistentCollection {#2080 …}
+reports: Doctrine\ORM\PersistentCollection {#2089 …}
+favourites: Doctrine\ORM\PersistentCollection {#2095 …}
+notifications: Doctrine\ORM\PersistentCollection {#2091 …}
+badges: Doctrine\ORM\PersistentCollection {#2090 …}
+children: []
-id: 31982
-titleTs: "'anti':9 'anti-cheat':8 'cheat':10 'follow':16 'game':2 'implement':19 'kernel':6 'kernel-level':5 'leagu':13 'legend':15 'level':7 'requir':4 'riot':1 'softwar':11 'valor':17"
-bodyTs: "'/post/10958052](https://lemmy.world/post/10958052)':7 'access':110 'activ':83,136,155 'aim':65 'also':21 'anti':12,41 'anti-cheat':11,40 'articl':29,115,174 'attach':16 'block':75 'caution':176 'censorship':133 'cheat':13,42,68 'china':138 'chines':125 'combat':67 'come':22 'compani':108 'complet':109 'concern':99,141 'consid':181 'controversi':10 'could':144 'cross':2 'cross-post':1 'decis':165 'devic':113 'discuss':30 'encourag':178 'free':158 'game':32,55,86,119,162 'giant':127 'grant':106 'highlight':116 'howev':90 'implic':186 'in-gam':160 'initi':15 'instal':37,167 'involv':131 'kernel':48,95 'kernel-level':94 'known':72 'leagu':24,58 'legend':26,60 'lemmy.world':6 'lemmy.world/post/10958052](https://lemmy.world/post/10958052)':5 'level':49,96 'monitor':80,153 'order':51 'own':121 'play':53,89 'player':35,154,171,179 'post':3 'potenti':145,183 'privaci':101 'purpos':150 'rais':98,140 'requir':33 'rest':169 'restrict':157 'riot':31,118 'risk':184 'run':45 'scan':70 'secur':103 'similar':149 'softwar':14,43,64,97 'speech':159 'summari':27 'surveil':135 'suspici':82 'tech':126 'tencent':123 'ultim':163 'urg':175 'use':92,147 'user':112 'valor':18,62 'vanguard':8,39,143,168 'vulner':73 'well':78"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705861187
+visibility: "visible "
+apId: "https://lemmy.world/post/10958057"
+editedAt: DateTimeImmutable @1727160233 {#2085
date: 2024-09-24 08:43:53.0 +02:00
}
+createdAt: DateTimeImmutable @1705774787 {#2096
date: 2024-01-20 19:19:47.0 +01:00
}
} |
|
Show voter details
|
85 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
86 |
DENIED
|
moderate
|
App\Entity\Entry {#2295
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2105 …}
+slug: "Mozilla-s-Platform-Tilt-Tracking-technical-issues-which-disadvantage-Firefox-relative"
+title: "Mozilla's Platform Tilt: Tracking technical issues which disadvantage Firefox relative to the first-party browser within major software platforms"
+url: "https://mozilla.github.io/platform-tilt/"
+body: """
cross-posted from: [lemmy.world/post/10939423](https://lemmy.world/post/10939423)\n
\n
> About Platform Tilt:\n
> \n
> This [dashboard](https://mozilla.github.io/platform-tilt/) tracks technical issues in major software platforms which disadvantage Firefox relative to the first-party browser. We consider aspects like security, stability, performance, and functionality, and propose changes to create a more level playing field. Further discussion on the live issues can be found in our [platform-tilt issue tracker. ](https://github.com/mozilla/platform-tilt/)\n
> \n
> Mozilla’s blog [post](https://blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):\n
> \n
> Browsers are the principal gateway connecting people to the open Internet, acting as their agent and shaping their experience. The central role of browsers has long motivated us to build and improve Firefox in order to offer people an independent choice. However, this centrality also creates a strong incentive for dominant players to control the browser that people use. The right way to win users is to build a better product, but shortcuts can be irresistible — and there’s a long history of companies leveraging their control of devices and operating systems to tilt the playing field in favor of their own browser.\n
> \n
> *This tilt manifests in a variety of ways. For example: making it harder for a user to download and use a different browser, ignoring or resetting a user’s default browser preference, restricting capabilities to the first-party browser, or requiring the use of the first-party browser engine for third-party browsers.*\n
> \n
> For years, Mozilla has engaged in dialog with platform vendors in an effort to address these issues. With renewed public attention and an evolving regulatory environment, we think it’s time to publish these concerns using the same transparent process and tools we use to develop positions on emerging technical standards. So today we’re publishing a new issue tracker where we intend to document the ways in which platforms put Firefox at a disadvantage and engage with the vendors of those platforms to resolve them.\n
> \n
> This tracker captures the issues we experience developing Firefox, but we believe in an even playing field for everyone, not just us. We encourage other browser vendors to publish their concerns in a similar fashion, and welcome the engagement and contributions of other non-browser groups interested in these issues. We’re particularly appreciative of the efforts of Open Web Advocacy in articulating the case for a level playing field and for documenting self-preferencing.\n
> \n
> People deserve choice, and choice requires the existence of viable alternatives. Alternatives and competition are good for everyone, but they can only flourish if the playing field is fair. It’s not today, but it’s also not hard to fix if the platform vendors wish to do so.\n
> \n
> We call on Apple, Google, and Microsoft to engage with us in this new forum to speedily resolve these concerns.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727201529 {#2290
date: 2024-09-24 20:12:09.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2281 …}
+votes: Doctrine\ORM\PersistentCollection {#2280 …}
+reports: Doctrine\ORM\PersistentCollection {#2278 …}
+favourites: Doctrine\ORM\PersistentCollection {#2279 …}
+notifications: Doctrine\ORM\PersistentCollection {#2277 …}
+badges: Doctrine\ORM\PersistentCollection {#2220 …}
+children: []
-id: 31888
-titleTs: "'browser':17 'disadvantag':9 'firefox':10 'first':15 'first-parti':14 'issu':7 'major':19 'mozilla':1 'parti':16 'platform':3,21 'relat':11 'softwar':20 'technic':6 'tilt':4 'track':5 'within':18"
-bodyTs: "'/mozilla/platform-tilt/)':70 '/netpolicy/2024/01/19/platform-tilt/):':77 '/platform-tilt/)':15 '/post/10939423](https://lemmy.world/post/10939423)':7 'act':89 'address':251 'advocaci':384 'agent':92 'also':122,436 'altern':410,411 'appl':452 'appreci':377 'articul':386 'aspect':35 'attent':257 'believ':334 'better':147 'blog':73 'blog.mozilla.org':76 'blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):':75 'browser':32,78,101,133,180,203,211,220,230,236,348,368 'build':107,145 'call':450 'capabl':214 'captur':325 'case':388 'central':98,121 'chang':44 'choic':118,402,404 'compani':161 'competit':413 'concern':271,353,468 'connect':83 'consid':34 'contribut':363 'control':131,164 'creat':46,123 'cross':2 'cross-post':1 'dashboard':12 'default':210 'deserv':401 'develop':282,330 'devic':166 'dialog':243 'differ':202 'disadvantag':24,311 'discuss':53 'document':301,396 'domin':128 'download':198 'effort':249,380 'emerg':285 'encourag':346 'engag':241,313,361,457 'engin':231 'environ':262 'even':337 'everyon':341,417 'evolv':260 'exampl':190 'exist':407 'experi':96,329 'fair':428 'fashion':357 'favor':176 'field':51,174,339,393,426 'firefox':25,110,308,331 'first':30,218,228 'first-parti':29,217,227 'fix':440 'flourish':422 'forum':463 'found':60 'function':41 'gateway':82 'github.com':69 'github.com/mozilla/platform-tilt/)':68 'good':415 'googl':453 'group':369 'hard':438 'harder':193 'histori':159 'howev':119 'ignor':204 'improv':109 'incent':126 'independ':117 'intend':299 'interest':370 'internet':88 'irresist':153 'issu':18,57,66,253,295,327,373 'lemmy.world':6 'lemmy.world/post/10939423](https://lemmy.world/post/10939423)':5 'level':49,391 'leverag':162 'like':36 'live':56 'long':103,158 'major':20 'make':191 'manifest':183 'microsoft':455 'motiv':104 'mozilla':71,239 'mozilla.github.io':14 'mozilla.github.io/platform-tilt/)':13 'new':294,462 'non':367 'non-brows':366 'offer':114 'open':87,382 'oper':168 'order':112 'parti':31,219,229,235 'particular':376 'peopl':84,115,135,400 'perform':39 'platform':9,22,64,245,306,319,443 'platform-tilt':63 'play':50,173,338,392,425 'player':129 'posit':283 'post':3,74 'prefer':212 'preferenc':399 'princip':81 'process':276 'product':148 'propos':43 'public':256 'publish':269,292,351 'put':307 're':291,375 'regulatori':261 'relat':26 'renew':255 'requir':222,405 'reset':206 'resolv':321,466 'restrict':213 'right':138 'role':99 'secur':37 'self':398 'self-preferenc':397 'shape':94 'shortcut':150 'similar':356 'softwar':21 'speedili':465 'stabil':38 'standard':287 'strong':125 'system':169 'technic':17,286 'think':264 'third':234 'third-parti':233 'tilt':10,65,171,182 'time':267 'today':289,432 'tool':278 'track':16 'tracker':67,296,324 'transpar':275 'us':105,344,459 'use':136,200,224,272,280 'user':142,196,208 'varieti':186 'vendor':246,316,349,444 'viabl':409 'way':139,188,303 'web':383 'welcom':359 'win':141 'wish':445 'year':238"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705821574
+visibility: "visible "
+apId: "https://lemmy.world/post/10939427"
+editedAt: null
+createdAt: DateTimeImmutable @1705735174 {#2296
date: 2024-01-20 08:19:34.0 +01:00
}
} |
|
Show voter details
|
87 |
DENIED
|
edit
|
App\Entity\Entry {#2295
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2105 …}
+slug: "Mozilla-s-Platform-Tilt-Tracking-technical-issues-which-disadvantage-Firefox-relative"
+title: "Mozilla's Platform Tilt: Tracking technical issues which disadvantage Firefox relative to the first-party browser within major software platforms"
+url: "https://mozilla.github.io/platform-tilt/"
+body: """
cross-posted from: [lemmy.world/post/10939423](https://lemmy.world/post/10939423)\n
\n
> About Platform Tilt:\n
> \n
> This [dashboard](https://mozilla.github.io/platform-tilt/) tracks technical issues in major software platforms which disadvantage Firefox relative to the first-party browser. We consider aspects like security, stability, performance, and functionality, and propose changes to create a more level playing field. Further discussion on the live issues can be found in our [platform-tilt issue tracker. ](https://github.com/mozilla/platform-tilt/)\n
> \n
> Mozilla’s blog [post](https://blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):\n
> \n
> Browsers are the principal gateway connecting people to the open Internet, acting as their agent and shaping their experience. The central role of browsers has long motivated us to build and improve Firefox in order to offer people an independent choice. However, this centrality also creates a strong incentive for dominant players to control the browser that people use. The right way to win users is to build a better product, but shortcuts can be irresistible — and there’s a long history of companies leveraging their control of devices and operating systems to tilt the playing field in favor of their own browser.\n
> \n
> *This tilt manifests in a variety of ways. For example: making it harder for a user to download and use a different browser, ignoring or resetting a user’s default browser preference, restricting capabilities to the first-party browser, or requiring the use of the first-party browser engine for third-party browsers.*\n
> \n
> For years, Mozilla has engaged in dialog with platform vendors in an effort to address these issues. With renewed public attention and an evolving regulatory environment, we think it’s time to publish these concerns using the same transparent process and tools we use to develop positions on emerging technical standards. So today we’re publishing a new issue tracker where we intend to document the ways in which platforms put Firefox at a disadvantage and engage with the vendors of those platforms to resolve them.\n
> \n
> This tracker captures the issues we experience developing Firefox, but we believe in an even playing field for everyone, not just us. We encourage other browser vendors to publish their concerns in a similar fashion, and welcome the engagement and contributions of other non-browser groups interested in these issues. We’re particularly appreciative of the efforts of Open Web Advocacy in articulating the case for a level playing field and for documenting self-preferencing.\n
> \n
> People deserve choice, and choice requires the existence of viable alternatives. Alternatives and competition are good for everyone, but they can only flourish if the playing field is fair. It’s not today, but it’s also not hard to fix if the platform vendors wish to do so.\n
> \n
> We call on Apple, Google, and Microsoft to engage with us in this new forum to speedily resolve these concerns.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727201529 {#2290
date: 2024-09-24 20:12:09.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2281 …}
+votes: Doctrine\ORM\PersistentCollection {#2280 …}
+reports: Doctrine\ORM\PersistentCollection {#2278 …}
+favourites: Doctrine\ORM\PersistentCollection {#2279 …}
+notifications: Doctrine\ORM\PersistentCollection {#2277 …}
+badges: Doctrine\ORM\PersistentCollection {#2220 …}
+children: []
-id: 31888
-titleTs: "'browser':17 'disadvantag':9 'firefox':10 'first':15 'first-parti':14 'issu':7 'major':19 'mozilla':1 'parti':16 'platform':3,21 'relat':11 'softwar':20 'technic':6 'tilt':4 'track':5 'within':18"
-bodyTs: "'/mozilla/platform-tilt/)':70 '/netpolicy/2024/01/19/platform-tilt/):':77 '/platform-tilt/)':15 '/post/10939423](https://lemmy.world/post/10939423)':7 'act':89 'address':251 'advocaci':384 'agent':92 'also':122,436 'altern':410,411 'appl':452 'appreci':377 'articul':386 'aspect':35 'attent':257 'believ':334 'better':147 'blog':73 'blog.mozilla.org':76 'blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):':75 'browser':32,78,101,133,180,203,211,220,230,236,348,368 'build':107,145 'call':450 'capabl':214 'captur':325 'case':388 'central':98,121 'chang':44 'choic':118,402,404 'compani':161 'competit':413 'concern':271,353,468 'connect':83 'consid':34 'contribut':363 'control':131,164 'creat':46,123 'cross':2 'cross-post':1 'dashboard':12 'default':210 'deserv':401 'develop':282,330 'devic':166 'dialog':243 'differ':202 'disadvantag':24,311 'discuss':53 'document':301,396 'domin':128 'download':198 'effort':249,380 'emerg':285 'encourag':346 'engag':241,313,361,457 'engin':231 'environ':262 'even':337 'everyon':341,417 'evolv':260 'exampl':190 'exist':407 'experi':96,329 'fair':428 'fashion':357 'favor':176 'field':51,174,339,393,426 'firefox':25,110,308,331 'first':30,218,228 'first-parti':29,217,227 'fix':440 'flourish':422 'forum':463 'found':60 'function':41 'gateway':82 'github.com':69 'github.com/mozilla/platform-tilt/)':68 'good':415 'googl':453 'group':369 'hard':438 'harder':193 'histori':159 'howev':119 'ignor':204 'improv':109 'incent':126 'independ':117 'intend':299 'interest':370 'internet':88 'irresist':153 'issu':18,57,66,253,295,327,373 'lemmy.world':6 'lemmy.world/post/10939423](https://lemmy.world/post/10939423)':5 'level':49,391 'leverag':162 'like':36 'live':56 'long':103,158 'major':20 'make':191 'manifest':183 'microsoft':455 'motiv':104 'mozilla':71,239 'mozilla.github.io':14 'mozilla.github.io/platform-tilt/)':13 'new':294,462 'non':367 'non-brows':366 'offer':114 'open':87,382 'oper':168 'order':112 'parti':31,219,229,235 'particular':376 'peopl':84,115,135,400 'perform':39 'platform':9,22,64,245,306,319,443 'platform-tilt':63 'play':50,173,338,392,425 'player':129 'posit':283 'post':3,74 'prefer':212 'preferenc':399 'princip':81 'process':276 'product':148 'propos':43 'public':256 'publish':269,292,351 'put':307 're':291,375 'regulatori':261 'relat':26 'renew':255 'requir':222,405 'reset':206 'resolv':321,466 'restrict':213 'right':138 'role':99 'secur':37 'self':398 'self-preferenc':397 'shape':94 'shortcut':150 'similar':356 'softwar':21 'speedili':465 'stabil':38 'standard':287 'strong':125 'system':169 'technic':17,286 'think':264 'third':234 'third-parti':233 'tilt':10,65,171,182 'time':267 'today':289,432 'tool':278 'track':16 'tracker':67,296,324 'transpar':275 'us':105,344,459 'use':136,200,224,272,280 'user':142,196,208 'varieti':186 'vendor':246,316,349,444 'viabl':409 'way':139,188,303 'web':383 'welcom':359 'win':141 'wish':445 'year':238"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705821574
+visibility: "visible "
+apId: "https://lemmy.world/post/10939427"
+editedAt: null
+createdAt: DateTimeImmutable @1705735174 {#2296
date: 2024-01-20 08:19:34.0 +01:00
}
} |
|
Show voter details
|
88 |
DENIED
|
moderate
|
App\Entity\Entry {#2295
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2105 …}
+slug: "Mozilla-s-Platform-Tilt-Tracking-technical-issues-which-disadvantage-Firefox-relative"
+title: "Mozilla's Platform Tilt: Tracking technical issues which disadvantage Firefox relative to the first-party browser within major software platforms"
+url: "https://mozilla.github.io/platform-tilt/"
+body: """
cross-posted from: [lemmy.world/post/10939423](https://lemmy.world/post/10939423)\n
\n
> About Platform Tilt:\n
> \n
> This [dashboard](https://mozilla.github.io/platform-tilt/) tracks technical issues in major software platforms which disadvantage Firefox relative to the first-party browser. We consider aspects like security, stability, performance, and functionality, and propose changes to create a more level playing field. Further discussion on the live issues can be found in our [platform-tilt issue tracker. ](https://github.com/mozilla/platform-tilt/)\n
> \n
> Mozilla’s blog [post](https://blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):\n
> \n
> Browsers are the principal gateway connecting people to the open Internet, acting as their agent and shaping their experience. The central role of browsers has long motivated us to build and improve Firefox in order to offer people an independent choice. However, this centrality also creates a strong incentive for dominant players to control the browser that people use. The right way to win users is to build a better product, but shortcuts can be irresistible — and there’s a long history of companies leveraging their control of devices and operating systems to tilt the playing field in favor of their own browser.\n
> \n
> *This tilt manifests in a variety of ways. For example: making it harder for a user to download and use a different browser, ignoring or resetting a user’s default browser preference, restricting capabilities to the first-party browser, or requiring the use of the first-party browser engine for third-party browsers.*\n
> \n
> For years, Mozilla has engaged in dialog with platform vendors in an effort to address these issues. With renewed public attention and an evolving regulatory environment, we think it’s time to publish these concerns using the same transparent process and tools we use to develop positions on emerging technical standards. So today we’re publishing a new issue tracker where we intend to document the ways in which platforms put Firefox at a disadvantage and engage with the vendors of those platforms to resolve them.\n
> \n
> This tracker captures the issues we experience developing Firefox, but we believe in an even playing field for everyone, not just us. We encourage other browser vendors to publish their concerns in a similar fashion, and welcome the engagement and contributions of other non-browser groups interested in these issues. We’re particularly appreciative of the efforts of Open Web Advocacy in articulating the case for a level playing field and for documenting self-preferencing.\n
> \n
> People deserve choice, and choice requires the existence of viable alternatives. Alternatives and competition are good for everyone, but they can only flourish if the playing field is fair. It’s not today, but it’s also not hard to fix if the platform vendors wish to do so.\n
> \n
> We call on Apple, Google, and Microsoft to engage with us in this new forum to speedily resolve these concerns.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727201529 {#2290
date: 2024-09-24 20:12:09.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2281 …}
+votes: Doctrine\ORM\PersistentCollection {#2280 …}
+reports: Doctrine\ORM\PersistentCollection {#2278 …}
+favourites: Doctrine\ORM\PersistentCollection {#2279 …}
+notifications: Doctrine\ORM\PersistentCollection {#2277 …}
+badges: Doctrine\ORM\PersistentCollection {#2220 …}
+children: []
-id: 31888
-titleTs: "'browser':17 'disadvantag':9 'firefox':10 'first':15 'first-parti':14 'issu':7 'major':19 'mozilla':1 'parti':16 'platform':3,21 'relat':11 'softwar':20 'technic':6 'tilt':4 'track':5 'within':18"
-bodyTs: "'/mozilla/platform-tilt/)':70 '/netpolicy/2024/01/19/platform-tilt/):':77 '/platform-tilt/)':15 '/post/10939423](https://lemmy.world/post/10939423)':7 'act':89 'address':251 'advocaci':384 'agent':92 'also':122,436 'altern':410,411 'appl':452 'appreci':377 'articul':386 'aspect':35 'attent':257 'believ':334 'better':147 'blog':73 'blog.mozilla.org':76 'blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):':75 'browser':32,78,101,133,180,203,211,220,230,236,348,368 'build':107,145 'call':450 'capabl':214 'captur':325 'case':388 'central':98,121 'chang':44 'choic':118,402,404 'compani':161 'competit':413 'concern':271,353,468 'connect':83 'consid':34 'contribut':363 'control':131,164 'creat':46,123 'cross':2 'cross-post':1 'dashboard':12 'default':210 'deserv':401 'develop':282,330 'devic':166 'dialog':243 'differ':202 'disadvantag':24,311 'discuss':53 'document':301,396 'domin':128 'download':198 'effort':249,380 'emerg':285 'encourag':346 'engag':241,313,361,457 'engin':231 'environ':262 'even':337 'everyon':341,417 'evolv':260 'exampl':190 'exist':407 'experi':96,329 'fair':428 'fashion':357 'favor':176 'field':51,174,339,393,426 'firefox':25,110,308,331 'first':30,218,228 'first-parti':29,217,227 'fix':440 'flourish':422 'forum':463 'found':60 'function':41 'gateway':82 'github.com':69 'github.com/mozilla/platform-tilt/)':68 'good':415 'googl':453 'group':369 'hard':438 'harder':193 'histori':159 'howev':119 'ignor':204 'improv':109 'incent':126 'independ':117 'intend':299 'interest':370 'internet':88 'irresist':153 'issu':18,57,66,253,295,327,373 'lemmy.world':6 'lemmy.world/post/10939423](https://lemmy.world/post/10939423)':5 'level':49,391 'leverag':162 'like':36 'live':56 'long':103,158 'major':20 'make':191 'manifest':183 'microsoft':455 'motiv':104 'mozilla':71,239 'mozilla.github.io':14 'mozilla.github.io/platform-tilt/)':13 'new':294,462 'non':367 'non-brows':366 'offer':114 'open':87,382 'oper':168 'order':112 'parti':31,219,229,235 'particular':376 'peopl':84,115,135,400 'perform':39 'platform':9,22,64,245,306,319,443 'platform-tilt':63 'play':50,173,338,392,425 'player':129 'posit':283 'post':3,74 'prefer':212 'preferenc':399 'princip':81 'process':276 'product':148 'propos':43 'public':256 'publish':269,292,351 'put':307 're':291,375 'regulatori':261 'relat':26 'renew':255 'requir':222,405 'reset':206 'resolv':321,466 'restrict':213 'right':138 'role':99 'secur':37 'self':398 'self-preferenc':397 'shape':94 'shortcut':150 'similar':356 'softwar':21 'speedili':465 'stabil':38 'standard':287 'strong':125 'system':169 'technic':17,286 'think':264 'third':234 'third-parti':233 'tilt':10,65,171,182 'time':267 'today':289,432 'tool':278 'track':16 'tracker':67,296,324 'transpar':275 'us':105,344,459 'use':136,200,224,272,280 'user':142,196,208 'varieti':186 'vendor':246,316,349,444 'viabl':409 'way':139,188,303 'web':383 'welcom':359 'win':141 'wish':445 'year':238"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705821574
+visibility: "visible "
+apId: "https://lemmy.world/post/10939427"
+editedAt: null
+createdAt: DateTimeImmutable @1705735174 {#2296
date: 2024-01-20 08:19:34.0 +01:00
}
} |
|
Show voter details
|
89 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
90 |
DENIED
|
moderate
|
App\Entity\Entry {#2099
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2105 …}
+slug: "Mozilla-s-Platform-Tilt-Tracking-technical-issues-which-disadvantage-Firefox-relative"
+title: "Mozilla's Platform Tilt: Tracking technical issues which disadvantage Firefox relative to the first-party browser within major software platforms"
+url: "https://mozilla.github.io/platform-tilt/"
+body: """
About Platform Tilt:\n
\n
This [dashboard](https://mozilla.github.io/platform-tilt/) tracks technical issues in major software platforms which disadvantage Firefox relative to the first-party browser. We consider aspects like security, stability, performance, and functionality, and propose changes to create a more level playing field. Further discussion on the live issues can be found in our [platform-tilt issue tracker. ](https://github.com/mozilla/platform-tilt/)\n
\n
Mozilla’s blog [post](https://blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):\n
\n
Browsers are the principal gateway connecting people to the open Internet, acting as their agent and shaping their experience. The central role of browsers has long motivated us to build and improve Firefox in order to offer people an independent choice. However, this centrality also creates a strong incentive for dominant players to control the browser that people use. The right way to win users is to build a better product, but shortcuts can be irresistible — and there’s a long history of companies leveraging their control of devices and operating systems to tilt the playing field in favor of their own browser.\n
\n
*This tilt manifests in a variety of ways. For example: making it harder for a user to download and use a different browser, ignoring or resetting a user’s default browser preference, restricting capabilities to the first-party browser, or requiring the use of the first-party browser engine for third-party browsers.*\n
\n
For years, Mozilla has engaged in dialog with platform vendors in an effort to address these issues. With renewed public attention and an evolving regulatory environment, we think it’s time to publish these concerns using the same transparent process and tools we use to develop positions on emerging technical standards. So today we’re publishing a new issue tracker where we intend to document the ways in which platforms put Firefox at a disadvantage and engage with the vendors of those platforms to resolve them.\n
\n
This tracker captures the issues we experience developing Firefox, but we believe in an even playing field for everyone, not just us. We encourage other browser vendors to publish their concerns in a similar fashion, and welcome the engagement and contributions of other non-browser groups interested in these issues. We’re particularly appreciative of the efforts of Open Web Advocacy in articulating the case for a level playing field and for documenting self-preferencing.\n
\n
People deserve choice, and choice requires the existence of viable alternatives. Alternatives and competition are good for everyone, but they can only flourish if the playing field is fair. It’s not today, but it’s also not hard to fix if the platform vendors wish to do so.\n
\n
We call on Apple, Google, and Microsoft to engage with us in this new forum to speedily resolve these concerns.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727024288 {#2104
date: 2024-09-22 18:58:08.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2108 …}
+votes: Doctrine\ORM\PersistentCollection {#2101 …}
+reports: Doctrine\ORM\PersistentCollection {#2109 …}
+favourites: Doctrine\ORM\PersistentCollection {#2106 …}
+notifications: Doctrine\ORM\PersistentCollection {#2107 …}
+badges: Doctrine\ORM\PersistentCollection {#2124 …}
+children: []
-id: 31887
-titleTs: "'browser':17 'disadvantag':9 'firefox':10 'first':15 'first-parti':14 'issu':7 'major':19 'mozilla':1 'parti':16 'platform':3,21 'relat':11 'softwar':20 'technic':6 'tilt':4 'track':5 'within':18"
-bodyTs: "'/mozilla/platform-tilt/)':63 '/netpolicy/2024/01/19/platform-tilt/):':70 '/platform-tilt/)':8 'act':82 'address':244 'advocaci':377 'agent':85 'also':115,429 'altern':403,404 'appl':445 'appreci':370 'articul':379 'aspect':28 'attent':250 'believ':327 'better':140 'blog':66 'blog.mozilla.org':69 'blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):':68 'browser':25,71,94,126,173,196,204,213,223,229,341,361 'build':100,138 'call':443 'capabl':207 'captur':318 'case':381 'central':91,114 'chang':37 'choic':111,395,397 'compani':154 'competit':406 'concern':264,346,461 'connect':76 'consid':27 'contribut':356 'control':124,157 'creat':39,116 'dashboard':5 'default':203 'deserv':394 'develop':275,323 'devic':159 'dialog':236 'differ':195 'disadvantag':17,304 'discuss':46 'document':294,389 'domin':121 'download':191 'effort':242,373 'emerg':278 'encourag':339 'engag':234,306,354,450 'engin':224 'environ':255 'even':330 'everyon':334,410 'evolv':253 'exampl':183 'exist':400 'experi':89,322 'fair':421 'fashion':350 'favor':169 'field':44,167,332,386,419 'firefox':18,103,301,324 'first':23,211,221 'first-parti':22,210,220 'fix':433 'flourish':415 'forum':456 'found':53 'function':34 'gateway':75 'github.com':62 'github.com/mozilla/platform-tilt/)':61 'good':408 'googl':446 'group':362 'hard':431 'harder':186 'histori':152 'howev':112 'ignor':197 'improv':102 'incent':119 'independ':110 'intend':292 'interest':363 'internet':81 'irresist':146 'issu':11,50,59,246,288,320,366 'level':42,384 'leverag':155 'like':29 'live':49 'long':96,151 'major':13 'make':184 'manifest':176 'microsoft':448 'motiv':97 'mozilla':64,232 'mozilla.github.io':7 'mozilla.github.io/platform-tilt/)':6 'new':287,455 'non':360 'non-brows':359 'offer':107 'open':80,375 'oper':161 'order':105 'parti':24,212,222,228 'particular':369 'peopl':77,108,128,393 'perform':32 'platform':2,15,57,238,299,312,436 'platform-tilt':56 'play':43,166,331,385,418 'player':122 'posit':276 'post':67 'prefer':205 'preferenc':392 'princip':74 'process':269 'product':141 'propos':36 'public':249 'publish':262,285,344 'put':300 're':284,368 'regulatori':254 'relat':19 'renew':248 'requir':215,398 'reset':199 'resolv':314,459 'restrict':206 'right':131 'role':92 'secur':30 'self':391 'self-preferenc':390 'shape':87 'shortcut':143 'similar':349 'softwar':14 'speedili':458 'stabil':31 'standard':280 'strong':118 'system':162 'technic':10,279 'think':257 'third':227 'third-parti':226 'tilt':3,58,164,175 'time':260 'today':282,425 'tool':271 'track':9 'tracker':60,289,317 'transpar':268 'us':98,337,452 'use':129,193,217,265,273 'user':135,189,201 'varieti':179 'vendor':239,309,342,437 'viabl':402 'way':132,181,296 'web':376 'welcom':352 'win':134 'wish':438 'year':231"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705821500
+visibility: "visible "
+apId: "https://lemmy.world/post/10939423"
+editedAt: null
+createdAt: DateTimeImmutable @1705735100 {#2100
date: 2024-01-20 08:18:20.0 +01:00
}
} |
|
Show voter details
|
91 |
DENIED
|
edit
|
App\Entity\Entry {#2099
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2105 …}
+slug: "Mozilla-s-Platform-Tilt-Tracking-technical-issues-which-disadvantage-Firefox-relative"
+title: "Mozilla's Platform Tilt: Tracking technical issues which disadvantage Firefox relative to the first-party browser within major software platforms"
+url: "https://mozilla.github.io/platform-tilt/"
+body: """
About Platform Tilt:\n
\n
This [dashboard](https://mozilla.github.io/platform-tilt/) tracks technical issues in major software platforms which disadvantage Firefox relative to the first-party browser. We consider aspects like security, stability, performance, and functionality, and propose changes to create a more level playing field. Further discussion on the live issues can be found in our [platform-tilt issue tracker. ](https://github.com/mozilla/platform-tilt/)\n
\n
Mozilla’s blog [post](https://blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):\n
\n
Browsers are the principal gateway connecting people to the open Internet, acting as their agent and shaping their experience. The central role of browsers has long motivated us to build and improve Firefox in order to offer people an independent choice. However, this centrality also creates a strong incentive for dominant players to control the browser that people use. The right way to win users is to build a better product, but shortcuts can be irresistible — and there’s a long history of companies leveraging their control of devices and operating systems to tilt the playing field in favor of their own browser.\n
\n
*This tilt manifests in a variety of ways. For example: making it harder for a user to download and use a different browser, ignoring or resetting a user’s default browser preference, restricting capabilities to the first-party browser, or requiring the use of the first-party browser engine for third-party browsers.*\n
\n
For years, Mozilla has engaged in dialog with platform vendors in an effort to address these issues. With renewed public attention and an evolving regulatory environment, we think it’s time to publish these concerns using the same transparent process and tools we use to develop positions on emerging technical standards. So today we’re publishing a new issue tracker where we intend to document the ways in which platforms put Firefox at a disadvantage and engage with the vendors of those platforms to resolve them.\n
\n
This tracker captures the issues we experience developing Firefox, but we believe in an even playing field for everyone, not just us. We encourage other browser vendors to publish their concerns in a similar fashion, and welcome the engagement and contributions of other non-browser groups interested in these issues. We’re particularly appreciative of the efforts of Open Web Advocacy in articulating the case for a level playing field and for documenting self-preferencing.\n
\n
People deserve choice, and choice requires the existence of viable alternatives. Alternatives and competition are good for everyone, but they can only flourish if the playing field is fair. It’s not today, but it’s also not hard to fix if the platform vendors wish to do so.\n
\n
We call on Apple, Google, and Microsoft to engage with us in this new forum to speedily resolve these concerns.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727024288 {#2104
date: 2024-09-22 18:58:08.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2108 …}
+votes: Doctrine\ORM\PersistentCollection {#2101 …}
+reports: Doctrine\ORM\PersistentCollection {#2109 …}
+favourites: Doctrine\ORM\PersistentCollection {#2106 …}
+notifications: Doctrine\ORM\PersistentCollection {#2107 …}
+badges: Doctrine\ORM\PersistentCollection {#2124 …}
+children: []
-id: 31887
-titleTs: "'browser':17 'disadvantag':9 'firefox':10 'first':15 'first-parti':14 'issu':7 'major':19 'mozilla':1 'parti':16 'platform':3,21 'relat':11 'softwar':20 'technic':6 'tilt':4 'track':5 'within':18"
-bodyTs: "'/mozilla/platform-tilt/)':63 '/netpolicy/2024/01/19/platform-tilt/):':70 '/platform-tilt/)':8 'act':82 'address':244 'advocaci':377 'agent':85 'also':115,429 'altern':403,404 'appl':445 'appreci':370 'articul':379 'aspect':28 'attent':250 'believ':327 'better':140 'blog':66 'blog.mozilla.org':69 'blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):':68 'browser':25,71,94,126,173,196,204,213,223,229,341,361 'build':100,138 'call':443 'capabl':207 'captur':318 'case':381 'central':91,114 'chang':37 'choic':111,395,397 'compani':154 'competit':406 'concern':264,346,461 'connect':76 'consid':27 'contribut':356 'control':124,157 'creat':39,116 'dashboard':5 'default':203 'deserv':394 'develop':275,323 'devic':159 'dialog':236 'differ':195 'disadvantag':17,304 'discuss':46 'document':294,389 'domin':121 'download':191 'effort':242,373 'emerg':278 'encourag':339 'engag':234,306,354,450 'engin':224 'environ':255 'even':330 'everyon':334,410 'evolv':253 'exampl':183 'exist':400 'experi':89,322 'fair':421 'fashion':350 'favor':169 'field':44,167,332,386,419 'firefox':18,103,301,324 'first':23,211,221 'first-parti':22,210,220 'fix':433 'flourish':415 'forum':456 'found':53 'function':34 'gateway':75 'github.com':62 'github.com/mozilla/platform-tilt/)':61 'good':408 'googl':446 'group':362 'hard':431 'harder':186 'histori':152 'howev':112 'ignor':197 'improv':102 'incent':119 'independ':110 'intend':292 'interest':363 'internet':81 'irresist':146 'issu':11,50,59,246,288,320,366 'level':42,384 'leverag':155 'like':29 'live':49 'long':96,151 'major':13 'make':184 'manifest':176 'microsoft':448 'motiv':97 'mozilla':64,232 'mozilla.github.io':7 'mozilla.github.io/platform-tilt/)':6 'new':287,455 'non':360 'non-brows':359 'offer':107 'open':80,375 'oper':161 'order':105 'parti':24,212,222,228 'particular':369 'peopl':77,108,128,393 'perform':32 'platform':2,15,57,238,299,312,436 'platform-tilt':56 'play':43,166,331,385,418 'player':122 'posit':276 'post':67 'prefer':205 'preferenc':392 'princip':74 'process':269 'product':141 'propos':36 'public':249 'publish':262,285,344 'put':300 're':284,368 'regulatori':254 'relat':19 'renew':248 'requir':215,398 'reset':199 'resolv':314,459 'restrict':206 'right':131 'role':92 'secur':30 'self':391 'self-preferenc':390 'shape':87 'shortcut':143 'similar':349 'softwar':14 'speedili':458 'stabil':31 'standard':280 'strong':118 'system':162 'technic':10,279 'think':257 'third':227 'third-parti':226 'tilt':3,58,164,175 'time':260 'today':282,425 'tool':271 'track':9 'tracker':60,289,317 'transpar':268 'us':98,337,452 'use':129,193,217,265,273 'user':135,189,201 'varieti':179 'vendor':239,309,342,437 'viabl':402 'way':132,181,296 'web':376 'welcom':352 'win':134 'wish':438 'year':231"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705821500
+visibility: "visible "
+apId: "https://lemmy.world/post/10939423"
+editedAt: null
+createdAt: DateTimeImmutable @1705735100 {#2100
date: 2024-01-20 08:18:20.0 +01:00
}
} |
|
Show voter details
|
92 |
DENIED
|
moderate
|
App\Entity\Entry {#2099
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2105 …}
+slug: "Mozilla-s-Platform-Tilt-Tracking-technical-issues-which-disadvantage-Firefox-relative"
+title: "Mozilla's Platform Tilt: Tracking technical issues which disadvantage Firefox relative to the first-party browser within major software platforms"
+url: "https://mozilla.github.io/platform-tilt/"
+body: """
About Platform Tilt:\n
\n
This [dashboard](https://mozilla.github.io/platform-tilt/) tracks technical issues in major software platforms which disadvantage Firefox relative to the first-party browser. We consider aspects like security, stability, performance, and functionality, and propose changes to create a more level playing field. Further discussion on the live issues can be found in our [platform-tilt issue tracker. ](https://github.com/mozilla/platform-tilt/)\n
\n
Mozilla’s blog [post](https://blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):\n
\n
Browsers are the principal gateway connecting people to the open Internet, acting as their agent and shaping their experience. The central role of browsers has long motivated us to build and improve Firefox in order to offer people an independent choice. However, this centrality also creates a strong incentive for dominant players to control the browser that people use. The right way to win users is to build a better product, but shortcuts can be irresistible — and there’s a long history of companies leveraging their control of devices and operating systems to tilt the playing field in favor of their own browser.\n
\n
*This tilt manifests in a variety of ways. For example: making it harder for a user to download and use a different browser, ignoring or resetting a user’s default browser preference, restricting capabilities to the first-party browser, or requiring the use of the first-party browser engine for third-party browsers.*\n
\n
For years, Mozilla has engaged in dialog with platform vendors in an effort to address these issues. With renewed public attention and an evolving regulatory environment, we think it’s time to publish these concerns using the same transparent process and tools we use to develop positions on emerging technical standards. So today we’re publishing a new issue tracker where we intend to document the ways in which platforms put Firefox at a disadvantage and engage with the vendors of those platforms to resolve them.\n
\n
This tracker captures the issues we experience developing Firefox, but we believe in an even playing field for everyone, not just us. We encourage other browser vendors to publish their concerns in a similar fashion, and welcome the engagement and contributions of other non-browser groups interested in these issues. We’re particularly appreciative of the efforts of Open Web Advocacy in articulating the case for a level playing field and for documenting self-preferencing.\n
\n
People deserve choice, and choice requires the existence of viable alternatives. Alternatives and competition are good for everyone, but they can only flourish if the playing field is fair. It’s not today, but it’s also not hard to fix if the platform vendors wish to do so.\n
\n
We call on Apple, Google, and Microsoft to engage with us in this new forum to speedily resolve these concerns.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727024288 {#2104
date: 2024-09-22 18:58:08.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2108 …}
+votes: Doctrine\ORM\PersistentCollection {#2101 …}
+reports: Doctrine\ORM\PersistentCollection {#2109 …}
+favourites: Doctrine\ORM\PersistentCollection {#2106 …}
+notifications: Doctrine\ORM\PersistentCollection {#2107 …}
+badges: Doctrine\ORM\PersistentCollection {#2124 …}
+children: []
-id: 31887
-titleTs: "'browser':17 'disadvantag':9 'firefox':10 'first':15 'first-parti':14 'issu':7 'major':19 'mozilla':1 'parti':16 'platform':3,21 'relat':11 'softwar':20 'technic':6 'tilt':4 'track':5 'within':18"
-bodyTs: "'/mozilla/platform-tilt/)':63 '/netpolicy/2024/01/19/platform-tilt/):':70 '/platform-tilt/)':8 'act':82 'address':244 'advocaci':377 'agent':85 'also':115,429 'altern':403,404 'appl':445 'appreci':370 'articul':379 'aspect':28 'attent':250 'believ':327 'better':140 'blog':66 'blog.mozilla.org':69 'blog.mozilla.org/netpolicy/2024/01/19/platform-tilt/):':68 'browser':25,71,94,126,173,196,204,213,223,229,341,361 'build':100,138 'call':443 'capabl':207 'captur':318 'case':381 'central':91,114 'chang':37 'choic':111,395,397 'compani':154 'competit':406 'concern':264,346,461 'connect':76 'consid':27 'contribut':356 'control':124,157 'creat':39,116 'dashboard':5 'default':203 'deserv':394 'develop':275,323 'devic':159 'dialog':236 'differ':195 'disadvantag':17,304 'discuss':46 'document':294,389 'domin':121 'download':191 'effort':242,373 'emerg':278 'encourag':339 'engag':234,306,354,450 'engin':224 'environ':255 'even':330 'everyon':334,410 'evolv':253 'exampl':183 'exist':400 'experi':89,322 'fair':421 'fashion':350 'favor':169 'field':44,167,332,386,419 'firefox':18,103,301,324 'first':23,211,221 'first-parti':22,210,220 'fix':433 'flourish':415 'forum':456 'found':53 'function':34 'gateway':75 'github.com':62 'github.com/mozilla/platform-tilt/)':61 'good':408 'googl':446 'group':362 'hard':431 'harder':186 'histori':152 'howev':112 'ignor':197 'improv':102 'incent':119 'independ':110 'intend':292 'interest':363 'internet':81 'irresist':146 'issu':11,50,59,246,288,320,366 'level':42,384 'leverag':155 'like':29 'live':49 'long':96,151 'major':13 'make':184 'manifest':176 'microsoft':448 'motiv':97 'mozilla':64,232 'mozilla.github.io':7 'mozilla.github.io/platform-tilt/)':6 'new':287,455 'non':360 'non-brows':359 'offer':107 'open':80,375 'oper':161 'order':105 'parti':24,212,222,228 'particular':369 'peopl':77,108,128,393 'perform':32 'platform':2,15,57,238,299,312,436 'platform-tilt':56 'play':43,166,331,385,418 'player':122 'posit':276 'post':67 'prefer':205 'preferenc':392 'princip':74 'process':269 'product':141 'propos':36 'public':249 'publish':262,285,344 'put':300 're':284,368 'regulatori':254 'relat':19 'renew':248 'requir':215,398 'reset':199 'resolv':314,459 'restrict':206 'right':131 'role':92 'secur':30 'self':391 'self-preferenc':390 'shape':87 'shortcut':143 'similar':349 'softwar':14 'speedili':458 'stabil':31 'standard':280 'strong':118 'system':162 'technic':10,279 'think':257 'third':227 'third-parti':226 'tilt':3,58,164,175 'time':260 'today':282,425 'tool':271 'track':9 'tracker':60,289,317 'transpar':268 'us':98,337,452 'use':129,193,217,265,273 'user':135,189,201 'varieti':179 'vendor':239,309,342,437 'viabl':402 'way':132,181,296 'web':376 'welcom':352 'win':134 'wish':438 'year':231"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705821500
+visibility: "visible "
+apId: "https://lemmy.world/post/10939423"
+editedAt: null
+createdAt: DateTimeImmutable @1705735100 {#2100
date: 2024-01-20 08:18:20.0 +01:00
}
} |
|
Show voter details
|
93 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
94 |
DENIED
|
moderate
|
App\Entity\Entry {#2394
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2395 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Your-Tablet-s-Light-Sensor-Can-Spy-On-You"
+title: "Your Tablet's Light Sensor Can Spy On You"
+url: "https://spectrum.ieee.org/ambient-light-sensor-cybersecurity-risk"
+body: """
cross-posted from: [lemmy.world/post/10921294](https://lemmy.world/post/10921294)\n
\n
> Quote from the article:\n
> \n
> > People are aware of selfie cameras on laptops and tablets and sometimes use physical blockers to cover them,” says Liu. “But for the ambient light sensor, people don’t even know that an app is using that data at all. And this sensor is always on. Liu notes that there are still no blanket restrictions for Android apps.\n
> \n
> Remark added by me:\n
> \n
> Here, it might interest readers to know that unlike Stock Android, GrapheneOS (GrapheneOS is an Android-based, open source, privacy and security-focused mobile operating system for selected Google Pixel smartphones) provides a sensors permission toggle for each app. According to their [website](https://grapheneos.org/features#network-permission-toggle):\n
> \n
> Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. GrapheneOS creates an easy to disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.\n
> \n
> To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, GrapheneOS creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.\n
> \n
> In conclusion, allow me to emphasize another quote from the article:\n
> \n
> > “The acquisition time in minutes is too cumbersome to launch simple and general privacy attacks on a mass scale,” says Lukasz Olejnik, an independent security researcher and consultant who has previously highlighted the [security risks posed by ambient light sensors](https://blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/). “However, I would not rule out the significance of targeted collections for tailored operations against chosen targets.” Liu agrees that the approach is too complicated for widespread attacks. And one saving grace is that it is unlikely to ever work on a smartphone, as the displays are simply too small. But Liu says their results demonstrate how seemingly harmless combinations of components in mobile devices can lead to surprising security risks.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 109
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727065444 {#2387
date: 2024-09-23 06:24:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2393 …}
+votes: Doctrine\ORM\PersistentCollection {#1381 …}
+reports: Doctrine\ORM\PersistentCollection {#1402 …}
+favourites: Doctrine\ORM\PersistentCollection {#1385 …}
+notifications: Doctrine\ORM\PersistentCollection {#1401 …}
+badges: Doctrine\ORM\PersistentCollection {#1363 …}
+children: []
-id: 31797
-titleTs: "'light':4 'sensor':5 'spi':7 'tablet':2"
-bodyTs: "'/features#network-permission-toggle):':121 '/post/10921294](https://lemmy.world/post/10921294)':7 '/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':325 'acceleromet':145 'access':126,160,189,213,235 'accord':115 'acquisit':284 'activ':141 'ad':71,224 'agre':344 'allow':274 'alway':56 'ambient':35,320 'android':68,84,90,135,221 'android-bas':89 'anoth':278 'app':45,69,114,163,186,209,222,232,268 'approach':347 'articl':11,282 'attack':297,353 'attempt':233 'avoid':217 'awar':14 'baromet':148 'base':91 'blanket':65 'block':191 'blocker':26 'blog.lukaszolejnik.com':324 'blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':323 'bodi':139 'break':218 'camera':17,137 'check':169 'chosen':341 'collect':336 'combin':385 'compass':147 'compat':219 'complic':350 'compon':387 'conclus':273 'consult':310 'cover':28,132 'creat':179,246 'cross':2 'cross-post':1 'cumbersom':290 'data':49,166,240 'default':229,264 'demonstr':381 'deni':196,244 'devic':158,390 'disabl':162,183,253,262 'disallow':125 'display':371 'due':241 'easi':181 'easili':252 'emphas':277 'enabl':227 'even':41 'event':177 'ever':364 'exist':134 'featur':200 'focus':98 'function':215 'general':295 'given':157 'googl':104 'grace':357 'grapheneo':85,86,178,245 'grapheneos.org':120 'grapheneos.org/features#network-permission-toggle):':119 'gyroscop':146 'harmless':384 'highlight':314 'howev':326 'includ':143 'independ':306 'instal':267 'interest':77 'know':42,80 'laptop':19 'launch':292 'lead':392 'lemmy.world':6 'lemmy.world/post/10921294](https://lemmy.world/post/10921294)':5 'light':36,321 'liu':31,58,343,377 'lukasz':303 'make':198 'mass':300 'microphon':138 'might':76 'minut':287 'mobil':99,389 'note':59 'notif':184,248 'olejnik':304 'one':355 'open':92 'oper':100,339 'peopl':12,38 'permiss':110,123,136,194,225,256 'physic':25 'pixel':105 'pose':318 'post':3 'present':154 'previous':313 'privaci':94,271,296 'provid':107 'quot':8,279 'reader':78 'receiv':164,176,238 'recognit':142 'remark':70 'research':308 'restrict':66 'result':380 'risk':317,396 'rule':330 'save':356 'say':30,302,378 'scale':301 'secur':97,307,316,395 'security-focus':96 'seem':383 'select':103 'selfi':16 'sensor':37,54,109,122,130,140,153,171,190,236,255,322 'set':259,270 'signific':333 'simpl':293 'simpli':373 'sinc':203 'small':375 'smartphon':106,368 'sometim':23 'sourc':93 'still':63 'stock':83 'surpris':394 'system':101 'tablet':21 'tailor':338 'target':335,342 'tell':206 'thermomet':149 'time':285 'toggl':111,124 'tri':187,211 'unlik':82,362 'usabl':202 'use':24,47 'user':204,266 'valu':172 'websit':118 'widespread':352 'work':365 'would':328 'zero':165,239"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705779212
+visibility: "visible "
+apId: "https://lemmy.world/post/10921310"
+editedAt: null
+createdAt: DateTimeImmutable @1705692812 {#2392
date: 2024-01-19 20:33:32.0 +01:00
}
} |
|
Show voter details
|
95 |
DENIED
|
edit
|
App\Entity\Entry {#2394
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2395 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Your-Tablet-s-Light-Sensor-Can-Spy-On-You"
+title: "Your Tablet's Light Sensor Can Spy On You"
+url: "https://spectrum.ieee.org/ambient-light-sensor-cybersecurity-risk"
+body: """
cross-posted from: [lemmy.world/post/10921294](https://lemmy.world/post/10921294)\n
\n
> Quote from the article:\n
> \n
> > People are aware of selfie cameras on laptops and tablets and sometimes use physical blockers to cover them,” says Liu. “But for the ambient light sensor, people don’t even know that an app is using that data at all. And this sensor is always on. Liu notes that there are still no blanket restrictions for Android apps.\n
> \n
> Remark added by me:\n
> \n
> Here, it might interest readers to know that unlike Stock Android, GrapheneOS (GrapheneOS is an Android-based, open source, privacy and security-focused mobile operating system for selected Google Pixel smartphones) provides a sensors permission toggle for each app. According to their [website](https://grapheneos.org/features#network-permission-toggle):\n
> \n
> Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. GrapheneOS creates an easy to disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.\n
> \n
> To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, GrapheneOS creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.\n
> \n
> In conclusion, allow me to emphasize another quote from the article:\n
> \n
> > “The acquisition time in minutes is too cumbersome to launch simple and general privacy attacks on a mass scale,” says Lukasz Olejnik, an independent security researcher and consultant who has previously highlighted the [security risks posed by ambient light sensors](https://blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/). “However, I would not rule out the significance of targeted collections for tailored operations against chosen targets.” Liu agrees that the approach is too complicated for widespread attacks. And one saving grace is that it is unlikely to ever work on a smartphone, as the displays are simply too small. But Liu says their results demonstrate how seemingly harmless combinations of components in mobile devices can lead to surprising security risks.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 109
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727065444 {#2387
date: 2024-09-23 06:24:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2393 …}
+votes: Doctrine\ORM\PersistentCollection {#1381 …}
+reports: Doctrine\ORM\PersistentCollection {#1402 …}
+favourites: Doctrine\ORM\PersistentCollection {#1385 …}
+notifications: Doctrine\ORM\PersistentCollection {#1401 …}
+badges: Doctrine\ORM\PersistentCollection {#1363 …}
+children: []
-id: 31797
-titleTs: "'light':4 'sensor':5 'spi':7 'tablet':2"
-bodyTs: "'/features#network-permission-toggle):':121 '/post/10921294](https://lemmy.world/post/10921294)':7 '/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':325 'acceleromet':145 'access':126,160,189,213,235 'accord':115 'acquisit':284 'activ':141 'ad':71,224 'agre':344 'allow':274 'alway':56 'ambient':35,320 'android':68,84,90,135,221 'android-bas':89 'anoth':278 'app':45,69,114,163,186,209,222,232,268 'approach':347 'articl':11,282 'attack':297,353 'attempt':233 'avoid':217 'awar':14 'baromet':148 'base':91 'blanket':65 'block':191 'blocker':26 'blog.lukaszolejnik.com':324 'blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':323 'bodi':139 'break':218 'camera':17,137 'check':169 'chosen':341 'collect':336 'combin':385 'compass':147 'compat':219 'complic':350 'compon':387 'conclus':273 'consult':310 'cover':28,132 'creat':179,246 'cross':2 'cross-post':1 'cumbersom':290 'data':49,166,240 'default':229,264 'demonstr':381 'deni':196,244 'devic':158,390 'disabl':162,183,253,262 'disallow':125 'display':371 'due':241 'easi':181 'easili':252 'emphas':277 'enabl':227 'even':41 'event':177 'ever':364 'exist':134 'featur':200 'focus':98 'function':215 'general':295 'given':157 'googl':104 'grace':357 'grapheneo':85,86,178,245 'grapheneos.org':120 'grapheneos.org/features#network-permission-toggle):':119 'gyroscop':146 'harmless':384 'highlight':314 'howev':326 'includ':143 'independ':306 'instal':267 'interest':77 'know':42,80 'laptop':19 'launch':292 'lead':392 'lemmy.world':6 'lemmy.world/post/10921294](https://lemmy.world/post/10921294)':5 'light':36,321 'liu':31,58,343,377 'lukasz':303 'make':198 'mass':300 'microphon':138 'might':76 'minut':287 'mobil':99,389 'note':59 'notif':184,248 'olejnik':304 'one':355 'open':92 'oper':100,339 'peopl':12,38 'permiss':110,123,136,194,225,256 'physic':25 'pixel':105 'pose':318 'post':3 'present':154 'previous':313 'privaci':94,271,296 'provid':107 'quot':8,279 'reader':78 'receiv':164,176,238 'recognit':142 'remark':70 'research':308 'restrict':66 'result':380 'risk':317,396 'rule':330 'save':356 'say':30,302,378 'scale':301 'secur':97,307,316,395 'security-focus':96 'seem':383 'select':103 'selfi':16 'sensor':37,54,109,122,130,140,153,171,190,236,255,322 'set':259,270 'signific':333 'simpl':293 'simpli':373 'sinc':203 'small':375 'smartphon':106,368 'sometim':23 'sourc':93 'still':63 'stock':83 'surpris':394 'system':101 'tablet':21 'tailor':338 'target':335,342 'tell':206 'thermomet':149 'time':285 'toggl':111,124 'tri':187,211 'unlik':82,362 'usabl':202 'use':24,47 'user':204,266 'valu':172 'websit':118 'widespread':352 'work':365 'would':328 'zero':165,239"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705779212
+visibility: "visible "
+apId: "https://lemmy.world/post/10921310"
+editedAt: null
+createdAt: DateTimeImmutable @1705692812 {#2392
date: 2024-01-19 20:33:32.0 +01:00
}
} |
|
Show voter details
|
96 |
DENIED
|
moderate
|
App\Entity\Entry {#2394
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2370 …}
+image: Proxies\__CG__\App\Entity\Image {#2395 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Your-Tablet-s-Light-Sensor-Can-Spy-On-You"
+title: "Your Tablet's Light Sensor Can Spy On You"
+url: "https://spectrum.ieee.org/ambient-light-sensor-cybersecurity-risk"
+body: """
cross-posted from: [lemmy.world/post/10921294](https://lemmy.world/post/10921294)\n
\n
> Quote from the article:\n
> \n
> > People are aware of selfie cameras on laptops and tablets and sometimes use physical blockers to cover them,” says Liu. “But for the ambient light sensor, people don’t even know that an app is using that data at all. And this sensor is always on. Liu notes that there are still no blanket restrictions for Android apps.\n
> \n
> Remark added by me:\n
> \n
> Here, it might interest readers to know that unlike Stock Android, GrapheneOS (GrapheneOS is an Android-based, open source, privacy and security-focused mobile operating system for selected Google Pixel smartphones) provides a sensors permission toggle for each app. According to their [website](https://grapheneos.org/features#network-permission-toggle):\n
> \n
> Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. GrapheneOS creates an easy to disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.\n
> \n
> To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, GrapheneOS creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.\n
> \n
> In conclusion, allow me to emphasize another quote from the article:\n
> \n
> > “The acquisition time in minutes is too cumbersome to launch simple and general privacy attacks on a mass scale,” says Lukasz Olejnik, an independent security researcher and consultant who has previously highlighted the [security risks posed by ambient light sensors](https://blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/). “However, I would not rule out the significance of targeted collections for tailored operations against chosen targets.” Liu agrees that the approach is too complicated for widespread attacks. And one saving grace is that it is unlikely to ever work on a smartphone, as the displays are simply too small. But Liu says their results demonstrate how seemingly harmless combinations of components in mobile devices can lead to surprising security risks.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 5
+favouriteCount: 109
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727065444 {#2387
date: 2024-09-23 06:24:04.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2393 …}
+votes: Doctrine\ORM\PersistentCollection {#1381 …}
+reports: Doctrine\ORM\PersistentCollection {#1402 …}
+favourites: Doctrine\ORM\PersistentCollection {#1385 …}
+notifications: Doctrine\ORM\PersistentCollection {#1401 …}
+badges: Doctrine\ORM\PersistentCollection {#1363 …}
+children: []
-id: 31797
-titleTs: "'light':4 'sensor':5 'spi':7 'tablet':2"
-bodyTs: "'/features#network-permission-toggle):':121 '/post/10921294](https://lemmy.world/post/10921294)':7 '/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':325 'acceleromet':145 'access':126,160,189,213,235 'accord':115 'acquisit':284 'activ':141 'ad':71,224 'agre':344 'allow':274 'alway':56 'ambient':35,320 'android':68,84,90,135,221 'android-bas':89 'anoth':278 'app':45,69,114,163,186,209,222,232,268 'approach':347 'articl':11,282 'attack':297,353 'attempt':233 'avoid':217 'awar':14 'baromet':148 'base':91 'blanket':65 'block':191 'blocker':26 'blog.lukaszolejnik.com':324 'blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':323 'bodi':139 'break':218 'camera':17,137 'check':169 'chosen':341 'collect':336 'combin':385 'compass':147 'compat':219 'complic':350 'compon':387 'conclus':273 'consult':310 'cover':28,132 'creat':179,246 'cross':2 'cross-post':1 'cumbersom':290 'data':49,166,240 'default':229,264 'demonstr':381 'deni':196,244 'devic':158,390 'disabl':162,183,253,262 'disallow':125 'display':371 'due':241 'easi':181 'easili':252 'emphas':277 'enabl':227 'even':41 'event':177 'ever':364 'exist':134 'featur':200 'focus':98 'function':215 'general':295 'given':157 'googl':104 'grace':357 'grapheneo':85,86,178,245 'grapheneos.org':120 'grapheneos.org/features#network-permission-toggle):':119 'gyroscop':146 'harmless':384 'highlight':314 'howev':326 'includ':143 'independ':306 'instal':267 'interest':77 'know':42,80 'laptop':19 'launch':292 'lead':392 'lemmy.world':6 'lemmy.world/post/10921294](https://lemmy.world/post/10921294)':5 'light':36,321 'liu':31,58,343,377 'lukasz':303 'make':198 'mass':300 'microphon':138 'might':76 'minut':287 'mobil':99,389 'note':59 'notif':184,248 'olejnik':304 'one':355 'open':92 'oper':100,339 'peopl':12,38 'permiss':110,123,136,194,225,256 'physic':25 'pixel':105 'pose':318 'post':3 'present':154 'previous':313 'privaci':94,271,296 'provid':107 'quot':8,279 'reader':78 'receiv':164,176,238 'recognit':142 'remark':70 'research':308 'restrict':66 'result':380 'risk':317,396 'rule':330 'save':356 'say':30,302,378 'scale':301 'secur':97,307,316,395 'security-focus':96 'seem':383 'select':103 'selfi':16 'sensor':37,54,109,122,130,140,153,171,190,236,255,322 'set':259,270 'signific':333 'simpl':293 'simpli':373 'sinc':203 'small':375 'smartphon':106,368 'sometim':23 'sourc':93 'still':63 'stock':83 'surpris':394 'system':101 'tablet':21 'tailor':338 'target':335,342 'tell':206 'thermomet':149 'time':285 'toggl':111,124 'tri':187,211 'unlik':82,362 'usabl':202 'use':24,47 'user':204,266 'valu':172 'websit':118 'widespread':352 'work':365 'would':328 'zero':165,239"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705779212
+visibility: "visible "
+apId: "https://lemmy.world/post/10921310"
+editedAt: null
+createdAt: DateTimeImmutable @1705692812 {#2392
date: 2024-01-19 20:33:32.0 +01:00
}
} |
|
Show voter details
|
97 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
98 |
DENIED
|
moderate
|
App\Entity\Entry {#2019
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2395 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Your-Tablet-s-Light-Sensor-Can-Spy-On-You"
+title: "Your Tablet's Light Sensor Can Spy On You"
+url: "https://spectrum.ieee.org/ambient-light-sensor-cybersecurity-risk"
+body: """
Quote from the article:\n
\n
> People are aware of selfie cameras on laptops and tablets and sometimes use physical blockers to cover them,” says Liu. “But for the ambient light sensor, people don’t even know that an app is using that data at all. And this sensor is always on. Liu notes that there are still no blanket restrictions for Android apps.\n
\n
Remark added by me:\n
\n
Here, it might interest readers to know that unlike Stock Android, GrapheneOS (GrapheneOS is an Android-based, open source, privacy and security-focused mobile operating system for selected Google Pixel smartphones) provides a sensors permission toggle for each app. According to their [website](https://grapheneos.org/features#network-permission-toggle):\n
\n
Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. GrapheneOS creates an easy to disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.\n
\n
To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, GrapheneOS creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.\n
\n
In conclusion, allow me to emphasize another quote from the article:\n
\n
> “The acquisition time in minutes is too cumbersome to launch simple and general privacy attacks on a mass scale,” says Lukasz Olejnik, an independent security researcher and consultant who has previously highlighted the [security risks posed by ambient light sensors](https://blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/). “However, I would not rule out the significance of targeted collections for tailored operations against chosen targets.” Liu agrees that the approach is too complicated for widespread attacks. And one saving grace is that it is unlikely to ever work on a smartphone, as the displays are simply too small. But Liu says their results demonstrate how seemingly harmless combinations of components in mobile devices can lead to surprising security risks.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727096005 {#1362
date: 2024-09-23 14:53:25.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2030 …}
+votes: Doctrine\ORM\PersistentCollection {#2026 …}
+reports: Doctrine\ORM\PersistentCollection {#2022 …}
+favourites: Doctrine\ORM\PersistentCollection {#2025 …}
+notifications: Doctrine\ORM\PersistentCollection {#2033 …}
+badges: Doctrine\ORM\PersistentCollection {#2028 …}
+children: []
-id: 31795
-titleTs: "'light':4 'sensor':5 'spi':7 'tablet':2"
-bodyTs: "'/features#network-permission-toggle):':114 '/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':318 'acceleromet':138 'access':119,153,182,206,228 'accord':108 'acquisit':277 'activ':134 'ad':64,217 'agre':337 'allow':267 'alway':49 'ambient':28,313 'android':61,77,83,128,214 'android-bas':82 'anoth':271 'app':38,62,107,156,179,202,215,225,261 'approach':340 'articl':4,275 'attack':290,346 'attempt':226 'avoid':210 'awar':7 'baromet':141 'base':84 'blanket':58 'block':184 'blocker':19 'blog.lukaszolejnik.com':317 'blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':316 'bodi':132 'break':211 'camera':10,130 'check':162 'chosen':334 'collect':329 'combin':378 'compass':140 'compat':212 'complic':343 'compon':380 'conclus':266 'consult':303 'cover':21,125 'creat':172,239 'cumbersom':283 'data':42,159,233 'default':222,257 'demonstr':374 'deni':189,237 'devic':151,383 'disabl':155,176,246,255 'disallow':118 'display':364 'due':234 'easi':174 'easili':245 'emphas':270 'enabl':220 'even':34 'event':170 'ever':357 'exist':127 'featur':193 'focus':91 'function':208 'general':288 'given':150 'googl':97 'grace':350 'grapheneo':78,79,171,238 'grapheneos.org':113 'grapheneos.org/features#network-permission-toggle):':112 'gyroscop':139 'harmless':377 'highlight':307 'howev':319 'includ':136 'independ':299 'instal':260 'interest':70 'know':35,73 'laptop':12 'launch':285 'lead':385 'light':29,314 'liu':24,51,336,370 'lukasz':296 'make':191 'mass':293 'microphon':131 'might':69 'minut':280 'mobil':92,382 'note':52 'notif':177,241 'olejnik':297 'one':348 'open':85 'oper':93,332 'peopl':5,31 'permiss':103,116,129,187,218,249 'physic':18 'pixel':98 'pose':311 'present':147 'previous':306 'privaci':87,264,289 'provid':100 'quot':1,272 'reader':71 'receiv':157,169,231 'recognit':135 'remark':63 'research':301 'restrict':59 'result':373 'risk':310,389 'rule':323 'save':349 'say':23,295,371 'scale':294 'secur':90,300,309,388 'security-focus':89 'seem':376 'select':96 'selfi':9 'sensor':30,47,102,115,123,133,146,164,183,229,248,315 'set':252,263 'signific':326 'simpl':286 'simpli':366 'sinc':196 'small':368 'smartphon':99,361 'sometim':16 'sourc':86 'still':56 'stock':76 'surpris':387 'system':94 'tablet':14 'tailor':331 'target':328,335 'tell':199 'thermomet':142 'time':278 'toggl':104,117 'tri':180,204 'unlik':75,355 'usabl':195 'use':17,40 'user':197,259 'valu':165 'websit':111 'widespread':345 'work':358 'would':321 'zero':158,232"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705753177
+visibility: "visible "
+apId: "https://lemmy.world/post/10921294"
+editedAt: null
+createdAt: DateTimeImmutable @1705692677 {#1403
date: 2024-01-19 20:31:17.0 +01:00
}
} |
|
Show voter details
|
99 |
DENIED
|
edit
|
App\Entity\Entry {#2019
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2395 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Your-Tablet-s-Light-Sensor-Can-Spy-On-You"
+title: "Your Tablet's Light Sensor Can Spy On You"
+url: "https://spectrum.ieee.org/ambient-light-sensor-cybersecurity-risk"
+body: """
Quote from the article:\n
\n
> People are aware of selfie cameras on laptops and tablets and sometimes use physical blockers to cover them,” says Liu. “But for the ambient light sensor, people don’t even know that an app is using that data at all. And this sensor is always on. Liu notes that there are still no blanket restrictions for Android apps.\n
\n
Remark added by me:\n
\n
Here, it might interest readers to know that unlike Stock Android, GrapheneOS (GrapheneOS is an Android-based, open source, privacy and security-focused mobile operating system for selected Google Pixel smartphones) provides a sensors permission toggle for each app. According to their [website](https://grapheneos.org/features#network-permission-toggle):\n
\n
Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. GrapheneOS creates an easy to disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.\n
\n
To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, GrapheneOS creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.\n
\n
In conclusion, allow me to emphasize another quote from the article:\n
\n
> “The acquisition time in minutes is too cumbersome to launch simple and general privacy attacks on a mass scale,” says Lukasz Olejnik, an independent security researcher and consultant who has previously highlighted the [security risks posed by ambient light sensors](https://blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/). “However, I would not rule out the significance of targeted collections for tailored operations against chosen targets.” Liu agrees that the approach is too complicated for widespread attacks. And one saving grace is that it is unlikely to ever work on a smartphone, as the displays are simply too small. But Liu says their results demonstrate how seemingly harmless combinations of components in mobile devices can lead to surprising security risks.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727096005 {#1362
date: 2024-09-23 14:53:25.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2030 …}
+votes: Doctrine\ORM\PersistentCollection {#2026 …}
+reports: Doctrine\ORM\PersistentCollection {#2022 …}
+favourites: Doctrine\ORM\PersistentCollection {#2025 …}
+notifications: Doctrine\ORM\PersistentCollection {#2033 …}
+badges: Doctrine\ORM\PersistentCollection {#2028 …}
+children: []
-id: 31795
-titleTs: "'light':4 'sensor':5 'spi':7 'tablet':2"
-bodyTs: "'/features#network-permission-toggle):':114 '/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':318 'acceleromet':138 'access':119,153,182,206,228 'accord':108 'acquisit':277 'activ':134 'ad':64,217 'agre':337 'allow':267 'alway':49 'ambient':28,313 'android':61,77,83,128,214 'android-bas':82 'anoth':271 'app':38,62,107,156,179,202,215,225,261 'approach':340 'articl':4,275 'attack':290,346 'attempt':226 'avoid':210 'awar':7 'baromet':141 'base':84 'blanket':58 'block':184 'blocker':19 'blog.lukaszolejnik.com':317 'blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':316 'bodi':132 'break':211 'camera':10,130 'check':162 'chosen':334 'collect':329 'combin':378 'compass':140 'compat':212 'complic':343 'compon':380 'conclus':266 'consult':303 'cover':21,125 'creat':172,239 'cumbersom':283 'data':42,159,233 'default':222,257 'demonstr':374 'deni':189,237 'devic':151,383 'disabl':155,176,246,255 'disallow':118 'display':364 'due':234 'easi':174 'easili':245 'emphas':270 'enabl':220 'even':34 'event':170 'ever':357 'exist':127 'featur':193 'focus':91 'function':208 'general':288 'given':150 'googl':97 'grace':350 'grapheneo':78,79,171,238 'grapheneos.org':113 'grapheneos.org/features#network-permission-toggle):':112 'gyroscop':139 'harmless':377 'highlight':307 'howev':319 'includ':136 'independ':299 'instal':260 'interest':70 'know':35,73 'laptop':12 'launch':285 'lead':385 'light':29,314 'liu':24,51,336,370 'lukasz':296 'make':191 'mass':293 'microphon':131 'might':69 'minut':280 'mobil':92,382 'note':52 'notif':177,241 'olejnik':297 'one':348 'open':85 'oper':93,332 'peopl':5,31 'permiss':103,116,129,187,218,249 'physic':18 'pixel':98 'pose':311 'present':147 'previous':306 'privaci':87,264,289 'provid':100 'quot':1,272 'reader':71 'receiv':157,169,231 'recognit':135 'remark':63 'research':301 'restrict':59 'result':373 'risk':310,389 'rule':323 'save':349 'say':23,295,371 'scale':294 'secur':90,300,309,388 'security-focus':89 'seem':376 'select':96 'selfi':9 'sensor':30,47,102,115,123,133,146,164,183,229,248,315 'set':252,263 'signific':326 'simpl':286 'simpli':366 'sinc':196 'small':368 'smartphon':99,361 'sometim':16 'sourc':86 'still':56 'stock':76 'surpris':387 'system':94 'tablet':14 'tailor':331 'target':328,335 'tell':199 'thermomet':142 'time':278 'toggl':104,117 'tri':180,204 'unlik':75,355 'usabl':195 'use':17,40 'user':197,259 'valu':165 'websit':111 'widespread':345 'work':358 'would':321 'zero':158,232"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705753177
+visibility: "visible "
+apId: "https://lemmy.world/post/10921294"
+editedAt: null
+createdAt: DateTimeImmutable @1705692677 {#1403
date: 2024-01-19 20:31:17.0 +01:00
}
} |
|
Show voter details
|
100 |
DENIED
|
moderate
|
App\Entity\Entry {#2019
+user: App\Entity\User {#263 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2023 …}
+image: Proxies\__CG__\App\Entity\Image {#2395 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1909 …}
+slug: "Your-Tablet-s-Light-Sensor-Can-Spy-On-You"
+title: "Your Tablet's Light Sensor Can Spy On You"
+url: "https://spectrum.ieee.org/ambient-light-sensor-cybersecurity-risk"
+body: """
Quote from the article:\n
\n
> People are aware of selfie cameras on laptops and tablets and sometimes use physical blockers to cover them,” says Liu. “But for the ambient light sensor, people don’t even know that an app is using that data at all. And this sensor is always on. Liu notes that there are still no blanket restrictions for Android apps.\n
\n
Remark added by me:\n
\n
Here, it might interest readers to know that unlike Stock Android, GrapheneOS (GrapheneOS is an Android-based, open source, privacy and security-focused mobile operating system for selected Google Pixel smartphones) provides a sensors permission toggle for each app. According to their [website](https://grapheneos.org/features#network-permission-toggle):\n
\n
Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. GrapheneOS creates an easy to disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.\n
\n
To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, GrapheneOS creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.\n
\n
In conclusion, allow me to emphasize another quote from the article:\n
\n
> “The acquisition time in minutes is too cumbersome to launch simple and general privacy attacks on a mass scale,” says Lukasz Olejnik, an independent security researcher and consultant who has previously highlighted the [security risks posed by ambient light sensors](https://blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/). “However, I would not rule out the significance of targeted collections for tailored operations against chosen targets.” Liu agrees that the approach is too complicated for widespread attacks. And one saving grace is that it is unlikely to ever work on a smartphone, as the displays are simply too small. But Liu says their results demonstrate how seemingly harmless combinations of components in mobile devices can lead to surprising security risks.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 1
+favouriteCount: 24
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1727096005 {#1362
date: 2024-09-23 14:53:25.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2030 …}
+votes: Doctrine\ORM\PersistentCollection {#2026 …}
+reports: Doctrine\ORM\PersistentCollection {#2022 …}
+favourites: Doctrine\ORM\PersistentCollection {#2025 …}
+notifications: Doctrine\ORM\PersistentCollection {#2033 …}
+badges: Doctrine\ORM\PersistentCollection {#2028 …}
+children: []
-id: 31795
-titleTs: "'light':4 'sensor':5 'spi':7 'tablet':2"
-bodyTs: "'/features#network-permission-toggle):':114 '/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':318 'acceleromet':138 'access':119,153,182,206,228 'accord':108 'acquisit':277 'activ':134 'ad':64,217 'agre':337 'allow':267 'alway':49 'ambient':28,313 'android':61,77,83,128,214 'android-bas':82 'anoth':271 'app':38,62,107,156,179,202,215,225,261 'approach':340 'articl':4,275 'attack':290,346 'attempt':226 'avoid':210 'awar':7 'baromet':141 'base':84 'blanket':58 'block':184 'blocker':19 'blog.lukaszolejnik.com':317 'blog.lukaszolejnik.com/shedding-light-on-designing-web-features-with-privacy-risks-impact-assessments-case-study/).':316 'bodi':132 'break':211 'camera':10,130 'check':162 'chosen':334 'collect':329 'combin':378 'compass':140 'compat':212 'complic':343 'compon':380 'conclus':266 'consult':303 'cover':21,125 'creat':172,239 'cumbersom':283 'data':42,159,233 'default':222,257 'demonstr':374 'deni':189,237 'devic':151,383 'disabl':155,176,246,255 'disallow':118 'display':364 'due':234 'easi':174 'easili':245 'emphas':270 'enabl':220 'even':34 'event':170 'ever':357 'exist':127 'featur':193 'focus':91 'function':208 'general':288 'given':150 'googl':97 'grace':350 'grapheneo':78,79,171,238 'grapheneos.org':113 'grapheneos.org/features#network-permission-toggle):':112 'gyroscop':139 'harmless':377 'highlight':307 'howev':319 'includ':136 'independ':299 'instal':260 'interest':70 'know':35,73 'laptop':12 'launch':285 'lead':385 'light':29,314 'liu':24,51,336,370 'lukasz':296 'make':191 'mass':293 'microphon':131 'might':69 'minut':280 'mobil':92,382 'note':52 'notif':177,241 'olejnik':297 'one':348 'open':85 'oper':93,332 'peopl':5,31 'permiss':103,116,129,187,218,249 'physic':18 'pixel':98 'pose':311 'present':147 'previous':306 'privaci':87,264,289 'provid':100 'quot':1,272 'reader':71 'receiv':157,169,231 'recognit':135 'remark':63 'research':301 'restrict':59 'result':373 'risk':310,389 'rule':323 'save':349 'say':23,295,371 'scale':294 'secur':90,300,309,388 'security-focus':89 'seem':376 'select':96 'selfi':9 'sensor':30,47,102,115,123,133,146,164,183,229,248,315 'set':252,263 'signific':326 'simpl':286 'simpli':366 'sinc':196 'small':368 'smartphon':99,361 'sometim':16 'sourc':86 'still':56 'stock':76 'surpris':387 'system':94 'tablet':14 'tailor':331 'target':328,335 'tell':199 'thermomet':142 'time':278 'toggl':104,117 'tri':180,204 'unlik':75,355 'usabl':195 'use':17,40 'user':197,259 'valu':165 'websit':111 'widespread':345 'work':358 'would':321 'zero':158,232"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705753177
+visibility: "visible "
+apId: "https://lemmy.world/post/10921294"
+editedAt: null
+createdAt: DateTimeImmutable @1705692677 {#1403
date: 2024-01-19 20:31:17.0 +01:00
}
} |
|
Show voter details
|