1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#2336
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "In-case-you-missed-it-Fossify-A-fork-of-Simple"
+title: "In case you missed it: Fossify (A fork of Simple Mobile Tools)"
+url: null
+body: """
cross-posted from: [lemmy.world/post/10796117](https://lemmy.world/post/10796117)\n
\n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager ](https://f-droid.org/en/packages/org.fossify.filemanager/)(fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are now available for download on F-Droid.\n
> \n
> (Simple Mobile Tools suite [was acquired by an Israeli adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))\n
> \n
> About [Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 85
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725491091 {#2342
date: 2024-09-05 01:04:51.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2335 …}
+votes: Doctrine\ORM\PersistentCollection {#2338 …}
+reports: Doctrine\ORM\PersistentCollection {#2143 …}
+favourites: Doctrine\ORM\PersistentCollection {#2136 …}
+notifications: Doctrine\ORM\PersistentCollection {#2073 …}
+badges: Doctrine\ORM\PersistentCollection {#2072 …}
+children: []
-id: 31030
-titleTs: "'case':2 'fork':8 'fossifi':6 'miss':4 'mobil':11 'simpl':10 'tool':12"
-bodyTs: "'/en/packages/org.fossify.calendar/)':32 '/en/packages/org.fossify.filemanager/)(fork':22 '/en/packages/org.fossify.gallery/)':12 '/fossifyorg):':64 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':59 '/post/10796117](https://lemmy.world/post/10796117)':7 'acquir':51 'ad':77 'ad-fre':76 'adwar':55 'alternativeto.net':58 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':57 'app':80 'avail':39 'back':71 'bring':99 'calendar':29,36 'communiti':70 'community-back':69 'compani':56 'continu':96 'cross':2 'cross-post':1 'download':41 'droid':45 'everyon':105 'f':44 'f-droid':43 'f-droid.org':11,21,31 'f-droid.org/en/packages/org.fossify.calendar/)':30 'f-droid.org/en/packages/org.fossify.filemanager/)(fork':20 'f-droid.org/en/packages/org.fossify.gallery/)':10 'file':18,25 'fork':13,33,82 'fossifi':8,17,28,61,65 'free':78 'galleri':9,16 'github.com':63 'github.com/fossifyorg):':62 'isra':54 'legaci':98 'lemmy.world':6 'lemmy.world/post/10796117](https://lemmy.world/post/10796117)':5 'longer':89 'maintain':90 'manag':19,26 'mobil':47,79 'open':73 'open-sourc':72 'post':3 'privat':102 're':93 'simpl':15,24,35,46,100 'simplemobiletool':85 'sourc':74 'suit':49 'tech':103 'tool':48"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705520968
+visibility: "visible "
+apId: "https://lemmy.world/post/10796761"
+editedAt: DateTimeImmutable @1725146033 {#2337
date: 2024-09-01 01:13:53.0 +02:00
}
+createdAt: DateTimeImmutable @1705434568 {#2343
date: 2024-01-16 20:49:28.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#2336
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "In-case-you-missed-it-Fossify-A-fork-of-Simple"
+title: "In case you missed it: Fossify (A fork of Simple Mobile Tools)"
+url: null
+body: """
cross-posted from: [lemmy.world/post/10796117](https://lemmy.world/post/10796117)\n
\n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager ](https://f-droid.org/en/packages/org.fossify.filemanager/)(fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are now available for download on F-Droid.\n
> \n
> (Simple Mobile Tools suite [was acquired by an Israeli adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))\n
> \n
> About [Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 85
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725491091 {#2342
date: 2024-09-05 01:04:51.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2335 …}
+votes: Doctrine\ORM\PersistentCollection {#2338 …}
+reports: Doctrine\ORM\PersistentCollection {#2143 …}
+favourites: Doctrine\ORM\PersistentCollection {#2136 …}
+notifications: Doctrine\ORM\PersistentCollection {#2073 …}
+badges: Doctrine\ORM\PersistentCollection {#2072 …}
+children: []
-id: 31030
-titleTs: "'case':2 'fork':8 'fossifi':6 'miss':4 'mobil':11 'simpl':10 'tool':12"
-bodyTs: "'/en/packages/org.fossify.calendar/)':32 '/en/packages/org.fossify.filemanager/)(fork':22 '/en/packages/org.fossify.gallery/)':12 '/fossifyorg):':64 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':59 '/post/10796117](https://lemmy.world/post/10796117)':7 'acquir':51 'ad':77 'ad-fre':76 'adwar':55 'alternativeto.net':58 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':57 'app':80 'avail':39 'back':71 'bring':99 'calendar':29,36 'communiti':70 'community-back':69 'compani':56 'continu':96 'cross':2 'cross-post':1 'download':41 'droid':45 'everyon':105 'f':44 'f-droid':43 'f-droid.org':11,21,31 'f-droid.org/en/packages/org.fossify.calendar/)':30 'f-droid.org/en/packages/org.fossify.filemanager/)(fork':20 'f-droid.org/en/packages/org.fossify.gallery/)':10 'file':18,25 'fork':13,33,82 'fossifi':8,17,28,61,65 'free':78 'galleri':9,16 'github.com':63 'github.com/fossifyorg):':62 'isra':54 'legaci':98 'lemmy.world':6 'lemmy.world/post/10796117](https://lemmy.world/post/10796117)':5 'longer':89 'maintain':90 'manag':19,26 'mobil':47,79 'open':73 'open-sourc':72 'post':3 'privat':102 're':93 'simpl':15,24,35,46,100 'simplemobiletool':85 'sourc':74 'suit':49 'tech':103 'tool':48"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705520968
+visibility: "visible "
+apId: "https://lemmy.world/post/10796761"
+editedAt: DateTimeImmutable @1725146033 {#2337
date: 2024-09-01 01:13:53.0 +02:00
}
+createdAt: DateTimeImmutable @1705434568 {#2343
date: 2024-01-16 20:49:28.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#2336
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "In-case-you-missed-it-Fossify-A-fork-of-Simple"
+title: "In case you missed it: Fossify (A fork of Simple Mobile Tools)"
+url: null
+body: """
cross-posted from: [lemmy.world/post/10796117](https://lemmy.world/post/10796117)\n
\n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager ](https://f-droid.org/en/packages/org.fossify.filemanager/)(fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are now available for download on F-Droid.\n
> \n
> (Simple Mobile Tools suite [was acquired by an Israeli adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))\n
> \n
> About [Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 85
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725491091 {#2342
date: 2024-09-05 01:04:51.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2335 …}
+votes: Doctrine\ORM\PersistentCollection {#2338 …}
+reports: Doctrine\ORM\PersistentCollection {#2143 …}
+favourites: Doctrine\ORM\PersistentCollection {#2136 …}
+notifications: Doctrine\ORM\PersistentCollection {#2073 …}
+badges: Doctrine\ORM\PersistentCollection {#2072 …}
+children: []
-id: 31030
-titleTs: "'case':2 'fork':8 'fossifi':6 'miss':4 'mobil':11 'simpl':10 'tool':12"
-bodyTs: "'/en/packages/org.fossify.calendar/)':32 '/en/packages/org.fossify.filemanager/)(fork':22 '/en/packages/org.fossify.gallery/)':12 '/fossifyorg):':64 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':59 '/post/10796117](https://lemmy.world/post/10796117)':7 'acquir':51 'ad':77 'ad-fre':76 'adwar':55 'alternativeto.net':58 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':57 'app':80 'avail':39 'back':71 'bring':99 'calendar':29,36 'communiti':70 'community-back':69 'compani':56 'continu':96 'cross':2 'cross-post':1 'download':41 'droid':45 'everyon':105 'f':44 'f-droid':43 'f-droid.org':11,21,31 'f-droid.org/en/packages/org.fossify.calendar/)':30 'f-droid.org/en/packages/org.fossify.filemanager/)(fork':20 'f-droid.org/en/packages/org.fossify.gallery/)':10 'file':18,25 'fork':13,33,82 'fossifi':8,17,28,61,65 'free':78 'galleri':9,16 'github.com':63 'github.com/fossifyorg):':62 'isra':54 'legaci':98 'lemmy.world':6 'lemmy.world/post/10796117](https://lemmy.world/post/10796117)':5 'longer':89 'maintain':90 'manag':19,26 'mobil':47,79 'open':73 'open-sourc':72 'post':3 'privat':102 're':93 'simpl':15,24,35,46,100 'simplemobiletool':85 'sourc':74 'suit':49 'tech':103 'tool':48"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705520968
+visibility: "visible "
+apId: "https://lemmy.world/post/10796761"
+editedAt: DateTimeImmutable @1725146033 {#2337
date: 2024-09-01 01:13:53.0 +02:00
}
+createdAt: DateTimeImmutable @1705434568 {#2343
date: 2024-01-16 20:49:28.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\Entry {#2267
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "In-case-you-missed-it-Fossify-A-fork-of-Simple"
+title: "In case you missed it: Fossify (A fork of Simple Mobile Tools)"
+url: null
+body: """
[Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager ](https://f-droid.org/en/packages/org.fossify.filemanager/)(fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are now available for download on F-Droid.\n
\n
(Simple Mobile Tools suite [was acquired by an Israeli adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))\n
\n
About [Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 141
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725343368 {#2266
date: 2024-09-03 08:02:48.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2273 …}
+votes: Doctrine\ORM\PersistentCollection {#2274 …}
+reports: Doctrine\ORM\PersistentCollection {#2190 …}
+favourites: Doctrine\ORM\PersistentCollection {#2265 …}
+notifications: Doctrine\ORM\PersistentCollection {#2263 …}
+badges: Doctrine\ORM\PersistentCollection {#2235 …}
+children: []
-id: 31021
-titleTs: "'case':2 'fork':8 'fossifi':6 'miss':4 'mobil':11 'simpl':10 'tool':12"
-bodyTs: "'/en/packages/org.fossify.calendar/)':25 '/en/packages/org.fossify.filemanager/)(fork':15 '/en/packages/org.fossify.gallery/)':5 '/fossifyorg):':57 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':52 'acquir':44 'ad':70 'ad-fre':69 'adwar':48 'alternativeto.net':51 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':50 'app':73 'avail':32 'back':64 'bring':92 'calendar':22,29 'communiti':63 'community-back':62 'compani':49 'continu':89 'download':34 'droid':38 'everyon':98 'f':37 'f-droid':36 'f-droid.org':4,14,24 'f-droid.org/en/packages/org.fossify.calendar/)':23 'f-droid.org/en/packages/org.fossify.filemanager/)(fork':13 'f-droid.org/en/packages/org.fossify.gallery/)':3 'file':11,18 'fork':6,26,75 'fossifi':1,10,21,54,58 'free':71 'galleri':2,9 'github.com':56 'github.com/fossifyorg):':55 'isra':47 'legaci':91 'longer':82 'maintain':83 'manag':12,19 'mobil':40,72 'open':66 'open-sourc':65 'privat':95 're':86 'simpl':8,17,28,39,93 'simplemobiletool':78 'sourc':67 'suit':42 'tech':96 'tool':41"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705519574
+visibility: "visible "
+apId: "https://lemmy.world/post/10795861"
+editedAt: DateTimeImmutable @1725142725 {#2257
date: 2024-09-01 00:18:45.0 +02:00
}
+createdAt: DateTimeImmutable @1705433174 {#2268
date: 2024-01-16 20:26:14.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\Entry {#2267
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "In-case-you-missed-it-Fossify-A-fork-of-Simple"
+title: "In case you missed it: Fossify (A fork of Simple Mobile Tools)"
+url: null
+body: """
[Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager ](https://f-droid.org/en/packages/org.fossify.filemanager/)(fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are now available for download on F-Droid.\n
\n
(Simple Mobile Tools suite [was acquired by an Israeli adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))\n
\n
About [Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 141
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725343368 {#2266
date: 2024-09-03 08:02:48.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2273 …}
+votes: Doctrine\ORM\PersistentCollection {#2274 …}
+reports: Doctrine\ORM\PersistentCollection {#2190 …}
+favourites: Doctrine\ORM\PersistentCollection {#2265 …}
+notifications: Doctrine\ORM\PersistentCollection {#2263 …}
+badges: Doctrine\ORM\PersistentCollection {#2235 …}
+children: []
-id: 31021
-titleTs: "'case':2 'fork':8 'fossifi':6 'miss':4 'mobil':11 'simpl':10 'tool':12"
-bodyTs: "'/en/packages/org.fossify.calendar/)':25 '/en/packages/org.fossify.filemanager/)(fork':15 '/en/packages/org.fossify.gallery/)':5 '/fossifyorg):':57 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':52 'acquir':44 'ad':70 'ad-fre':69 'adwar':48 'alternativeto.net':51 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':50 'app':73 'avail':32 'back':64 'bring':92 'calendar':22,29 'communiti':63 'community-back':62 'compani':49 'continu':89 'download':34 'droid':38 'everyon':98 'f':37 'f-droid':36 'f-droid.org':4,14,24 'f-droid.org/en/packages/org.fossify.calendar/)':23 'f-droid.org/en/packages/org.fossify.filemanager/)(fork':13 'f-droid.org/en/packages/org.fossify.gallery/)':3 'file':11,18 'fork':6,26,75 'fossifi':1,10,21,54,58 'free':71 'galleri':2,9 'github.com':56 'github.com/fossifyorg):':55 'isra':47 'legaci':91 'longer':82 'maintain':83 'manag':12,19 'mobil':40,72 'open':66 'open-sourc':65 'privat':95 're':86 'simpl':8,17,28,39,93 'simplemobiletool':78 'sourc':67 'suit':42 'tech':96 'tool':41"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705519574
+visibility: "visible "
+apId: "https://lemmy.world/post/10795861"
+editedAt: DateTimeImmutable @1725142725 {#2257
date: 2024-09-01 00:18:45.0 +02:00
}
+createdAt: DateTimeImmutable @1705433174 {#2268
date: 2024-01-16 20:26:14.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\Entry {#2267
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "In-case-you-missed-it-Fossify-A-fork-of-Simple"
+title: "In case you missed it: Fossify (A fork of Simple Mobile Tools)"
+url: null
+body: """
[Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager ](https://f-droid.org/en/packages/org.fossify.filemanager/)(fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are now available for download on F-Droid.\n
\n
(Simple Mobile Tools suite [was acquired by an Israeli adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))\n
\n
About [Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 141
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1725343368 {#2266
date: 2024-09-03 08:02:48.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2273 …}
+votes: Doctrine\ORM\PersistentCollection {#2274 …}
+reports: Doctrine\ORM\PersistentCollection {#2190 …}
+favourites: Doctrine\ORM\PersistentCollection {#2265 …}
+notifications: Doctrine\ORM\PersistentCollection {#2263 …}
+badges: Doctrine\ORM\PersistentCollection {#2235 …}
+children: []
-id: 31021
-titleTs: "'case':2 'fork':8 'fossifi':6 'miss':4 'mobil':11 'simpl':10 'tool':12"
-bodyTs: "'/en/packages/org.fossify.calendar/)':25 '/en/packages/org.fossify.filemanager/)(fork':15 '/en/packages/org.fossify.gallery/)':5 '/fossifyorg):':57 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':52 'acquir':44 'ad':70 'ad-fre':69 'adwar':48 'alternativeto.net':51 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/))':50 'app':73 'avail':32 'back':64 'bring':92 'calendar':22,29 'communiti':63 'community-back':62 'compani':49 'continu':89 'download':34 'droid':38 'everyon':98 'f':37 'f-droid':36 'f-droid.org':4,14,24 'f-droid.org/en/packages/org.fossify.calendar/)':23 'f-droid.org/en/packages/org.fossify.filemanager/)(fork':13 'f-droid.org/en/packages/org.fossify.gallery/)':3 'file':11,18 'fork':6,26,75 'fossifi':1,10,21,54,58 'free':71 'galleri':2,9 'github.com':56 'github.com/fossifyorg):':55 'isra':47 'legaci':91 'longer':82 'maintain':83 'manag':12,19 'mobil':40,72 'open':66 'open-sourc':65 'privat':95 're':86 'simpl':8,17,28,39,93 'simplemobiletool':78 'sourc':67 'suit':42 'tech':96 'tool':41"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705519574
+visibility: "visible "
+apId: "https://lemmy.world/post/10795861"
+editedAt: DateTimeImmutable @1725142725 {#2257
date: 2024-09-01 00:18:45.0 +02:00
}
+createdAt: DateTimeImmutable @1705433174 {#2268
date: 2024-01-16 20:26:14.0 +01:00
}
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
App\Entity\Entry {#2248
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1686 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 130
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706376247 {#2246
date: 2024-01-27 18:24:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2243 …}
+votes: Doctrine\ORM\PersistentCollection {#2255 …}
+reports: Doctrine\ORM\PersistentCollection {#2251 …}
+favourites: Doctrine\ORM\PersistentCollection {#2285 …}
+notifications: Doctrine\ORM\PersistentCollection {#2287 …}
+badges: Doctrine\ORM\PersistentCollection {#2142 …}
+children: []
-id: 33481
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462647
+visibility: "visible "
+apId: "https://lemmy.world/post/11253421"
+editedAt: null
+createdAt: DateTimeImmutable @1706376247 {#2245
date: 2024-01-27 18:24:07.0 +01:00
}
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
App\Entity\Entry {#2248
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1686 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 130
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706376247 {#2246
date: 2024-01-27 18:24:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2243 …}
+votes: Doctrine\ORM\PersistentCollection {#2255 …}
+reports: Doctrine\ORM\PersistentCollection {#2251 …}
+favourites: Doctrine\ORM\PersistentCollection {#2285 …}
+notifications: Doctrine\ORM\PersistentCollection {#2287 …}
+badges: Doctrine\ORM\PersistentCollection {#2142 …}
+children: []
-id: 33481
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462647
+visibility: "visible "
+apId: "https://lemmy.world/post/11253421"
+editedAt: null
+createdAt: DateTimeImmutable @1706376247 {#2245
date: 2024-01-27 18:24:07.0 +01:00
}
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
App\Entity\Entry {#2248
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#1686 …}
+slug: "Fossify-Contacts-and-Fossify-SMS-Messenger-Fossify-is-a-fork"
+title: "Fossify Contacts and Fossify SMS Messenger (Fossify is a fork of Simple Mobile Tools) are now available, joining Fossify's existing suite of Gallery, File Manager, Phone, and Calendar apps."
+url: "https://search.f-droid.org/?q=Fossify&lang=en"
+body: """
cross-posted from: [lemmy.world/post/11253225](https://lemmy.world/post/11253225)\n
\n
> [Fossify Contacts](https://f-droid.org/en/packages/org.fossify.contacts/) (fork of Simple Contacts) and [Fossify SMS Messenger](https://f-droid.org/en/packages/org.fossify.messages/) (fork of Simple SMS Messenger) have been released on F-Droid.\n
> \n
> Other Fossify apps available for download on F-Droid:\n
> \n
> - [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery)\n
> - [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager)\n
> - [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer)\n
> - [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar)\n
> \n
> (ICYMI, [Simple Mobile Tools suite was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report from Exodus](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 130
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706376247 {#2246
date: 2024-01-27 18:24:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2243 …}
+votes: Doctrine\ORM\PersistentCollection {#2255 …}
+reports: Doctrine\ORM\PersistentCollection {#2251 …}
+favourites: Doctrine\ORM\PersistentCollection {#2285 …}
+notifications: Doctrine\ORM\PersistentCollection {#2287 …}
+badges: Doctrine\ORM\PersistentCollection {#2142 …}
+children: []
-id: 33481
-titleTs: "'app':30 'avail':17 'calendar':29 'contact':2 'exist':21 'file':25 'fork':10 'fossifi':1,4,7,19 'galleri':24 'join':18 'manag':26 'messeng':6 'mobil':13 'phone':27 'simpl':12 'sms':5 'suit':22 'tool':14"
-bodyTs: "'/en/packages/org.fossify.calendar/)':79 '/en/packages/org.fossify.contacts/)':12 '/en/packages/org.fossify.filemanager/)':60 '/en/packages/org.fossify.gallery/)':50 '/en/packages/org.fossify.messages/)':23 '/en/packages/org.fossify.phone/)':70 '/en/reports/com.simplemobiletools.gallery/latest/)':118 '/fossifyorg):':148 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':97 '/post/11253225](https://lemmy.world/post/11253225)':7 '0':128 '10':131 '21':142 '9':139 'acquir':90 'ad':161 'ad-fre':160 'adwar':93 'alternativeto.net':96 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':95 'app':38,100,135,164 'avail':39 'back':155 'bring':183 'calendar':76,83 'communiti':154 'community-back':153 'compani':94 'contact':9,16 'contain':107,138 'continu':180 'cross':2 'cross-post':1 'dialer':74 'download':41 'droid':35,45 'everyon':189 'exodus':115 'f':34,44 'f-droid':33,43 'f-droid.org':11,22,49,59,69,78 'f-droid.org/en/packages/org.fossify.calendar/)':77 'f-droid.org/en/packages/org.fossify.contacts/)':10 'f-droid.org/en/packages/org.fossify.filemanager/)':58 'f-droid.org/en/packages/org.fossify.gallery/)':48 'f-droid.org/en/packages/org.fossify.messages/)':21 'f-droid.org/en/packages/org.fossify.phone/)':68 'file':56,64 'fork':13,24,51,61,71,80,166 'fossifi':8,18,37,46,55,66,75,145,149 'free':162 'galleri':47,54,126 'github.com':147 'github.com/fossifyorg):':146 'googl':103 'icymi':84 'legaci':182 'lemmy.world':6 'lemmy.world/post/11253225](https://lemmy.world/post/11253225)':5 'longer':173 'maintain':174 'manag':57,65 'messeng':20,28 'mobil':86,163 'old':122 'open':157 'open-sourc':156 'permiss':111,132,143 'phone':67 'play':104 'post':3 'privat':186 're':177 'releas':31 'report':113 'reports.exodus-privacy.eu.org':117 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':116 'sale':137 'show':119 'simpl':15,26,53,63,73,82,85,125,184 'simplemobiletool':169 'sms':19,27 'sourc':158 'store':105 'suit':88 'tech':187 'tool':87 'tracker':108,129,140 'unnecessari':110 'version':123 'wherea':133"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706462647
+visibility: "visible "
+apId: "https://lemmy.world/post/11253421"
+editedAt: null
+createdAt: DateTimeImmutable @1706376247 {#2245
date: 2024-01-27 18:24:07.0 +01:00
}
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\Entry {#2071
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706104555 {#2065
date: 2024-01-24 14:55:55.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2067 …}
+votes: Doctrine\ORM\PersistentCollection {#2049 …}
+reports: Doctrine\ORM\PersistentCollection {#2051 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2047 …}
+badges: Doctrine\ORM\PersistentCollection {#2057 …}
+children: []
-id: 32746
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172112
+visibility: "visible "
+apId: "https://lemmy.world/post/11118096"
+editedAt: DateTimeImmutable @1728258263 {#2074
date: 2024-10-07 01:44:23.0 +02:00
}
+createdAt: DateTimeImmutable @1706085712 {#2066
date: 2024-01-24 09:41:52.0 +01:00
}
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\Entry {#2071
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706104555 {#2065
date: 2024-01-24 14:55:55.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2067 …}
+votes: Doctrine\ORM\PersistentCollection {#2049 …}
+reports: Doctrine\ORM\PersistentCollection {#2051 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2047 …}
+badges: Doctrine\ORM\PersistentCollection {#2057 …}
+children: []
-id: 32746
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172112
+visibility: "visible "
+apId: "https://lemmy.world/post/11118096"
+editedAt: DateTimeImmutable @1728258263 {#2074
date: 2024-10-07 01:44:23.0 +02:00
}
+createdAt: DateTimeImmutable @1706085712 {#2066
date: 2024-01-24 09:41:52.0 +01:00
}
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\Entry {#2071
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2380 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2454 …}
+slug: "Fossify-Phone-Fossify-is-a-fork-of-Simple-Mobile-Tools"
+title: "Fossify Phone (Fossify is a fork of Simple Mobile Tools) is now available, adding to Fossify's existing Gallery, File Manager, and Calendar apps"
+url: null
+body: """
cross-posted from: [lemmy.world/post/11117839](https://lemmy.world/post/11117839)\n
\n
> [Fossify Phone](https://f-droid.org/en/packages/org.fossify.phone/) (fork of Simple Dialer) has been released on F-Droid.\n
> \n
> [Fossify Gallery](https://f-droid.org/en/packages/org.fossify.gallery/) (fork of Simple Gallery), [Fossify File Manager](https://f-droid.org/en/packages/org.fossify.filemanager/) (fork of Simple File Manager) and [Fossify Calendar](https://f-droid.org/en/packages/org.fossify.calendar/) (fork of Simple Calendar) are also available for download on F-Droid, with more to come.\n
> \n
> (ICYMI: Simple Mobile Tools suite [was acquired by an adware company](https://alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/) and their apps on the Google Play Store now contain trackers and unnecessary permissions. This [report](https://reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/) from Exodus shows that the old version of Simple Gallery had 0 trackers and 10 permissions, whereas the app, after sale, contains 9 trackers and 21 permissions!)\n
> \n
> [About Fossify](https://github.com/FossifyOrg): Fossify is all about community-backed, open-source, and ad-free mobile apps. A fork of the SimpleMobileTools, which is no longer maintained, and we’re here to continue the legacy, bringing simple and private tech to everyone.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 2
+favouriteCount: 129
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1706104555 {#2065
date: 2024-01-24 14:55:55.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2067 …}
+votes: Doctrine\ORM\PersistentCollection {#2049 …}
+reports: Doctrine\ORM\PersistentCollection {#2051 …}
+favourites: Doctrine\ORM\PersistentCollection {#2059 …}
+notifications: Doctrine\ORM\PersistentCollection {#2047 …}
+badges: Doctrine\ORM\PersistentCollection {#2057 …}
+children: []
-id: 32746
-titleTs: "'ad':14 'app':24 'avail':13 'calendar':23 'exist':18 'file':20 'fork':6 'fossifi':1,3,16 'galleri':19 'manag':21 'mobil':9 'phone':2 'simpl':8 'tool':10"
-bodyTs: "'/en/packages/org.fossify.calendar/)':49 '/en/packages/org.fossify.filemanager/)':38 '/en/packages/org.fossify.gallery/)':28 '/en/packages/org.fossify.phone/)':12 '/en/reports/com.simplemobiletools.gallery/latest/)':99 '/fossifyorg):':131 '/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':80 '/post/11117839](https://lemmy.world/post/11117839)':7 '0':111 '10':114 '21':125 '9':122 'acquir':73 'ad':144 'ad-fre':143 'adwar':76 'also':55 'alternativeto.net':79 'alternativeto.net/news/2023/12/simple-mobile-tools-bought-by-zipoapps-sparks-controversy-over-future-of-open-source-apps/)':78 'app':83,118,147 'avail':56 'back':138 'bring':166 'calendar':46,53 'come':66 'communiti':137 'community-back':136 'compani':77 'contain':90,121 'continu':163 'cross':2 'cross-post':1 'dialer':16 'download':58 'droid':23,62 'everyon':172 'exodus':101 'f':22,61 'f-droid':21,60 'f-droid.org':11,27,37,48 'f-droid.org/en/packages/org.fossify.calendar/)':47 'f-droid.org/en/packages/org.fossify.filemanager/)':36 'f-droid.org/en/packages/org.fossify.gallery/)':26 'f-droid.org/en/packages/org.fossify.phone/)':10 'file':34,42 'fork':13,29,39,50,149 'fossifi':8,24,33,45,128,132 'free':145 'galleri':25,32,109 'github.com':130 'github.com/fossifyorg):':129 'googl':86 'icymi':67 'legaci':165 'lemmy.world':6 'lemmy.world/post/11117839](https://lemmy.world/post/11117839)':5 'longer':156 'maintain':157 'manag':35,43 'mobil':69,146 'old':105 'open':140 'open-sourc':139 'permiss':94,115,126 'phone':9 'play':87 'post':3 'privat':169 're':160 'releas':19 'report':96 'reports.exodus-privacy.eu.org':98 'reports.exodus-privacy.eu.org/en/reports/com.simplemobiletools.gallery/latest/)':97 'sale':120 'show':102 'simpl':15,31,41,52,68,108,167 'simplemobiletool':152 'sourc':141 'store':88 'suit':71 'tech':170 'tool':70 'tracker':91,112,123 'unnecessari':93 'version':106 'wherea':116"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706172112
+visibility: "visible "
+apId: "https://lemmy.world/post/11118096"
+editedAt: DateTimeImmutable @1728258263 {#2074
date: 2024-10-07 01:44:23.0 +02:00
}
+createdAt: DateTimeImmutable @1706085712 {#2066
date: 2024-01-24 09:41:52.0 +01:00
}
} |
|
Show voter details
|
17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
18 |
DENIED
|
moderate
|
App\Entity\Entry {#2236
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2205 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2206 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
\n
The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
\n
It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
\n
Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705948237 {#2239
date: 2024-01-22 19:30:37.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2233 …}
+votes: Doctrine\ORM\PersistentCollection {#2234 …}
+reports: Doctrine\ORM\PersistentCollection {#2237 …}
+favourites: Doctrine\ORM\PersistentCollection {#2258 …}
+notifications: Doctrine\ORM\PersistentCollection {#2260 …}
+badges: Doctrine\ORM\PersistentCollection {#2254 …}
+children: []
-id: 32446
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'action':86 'ad':13,97,116,127,169 'adblock':102 'advertis':35,139 'advic':87 'also':58,118 'appear':32 'articl':2,57,82,153 'associ':10,99 'avoid':135 'block':96,113,126 'capabl':111 'carri':26 'case':50 'cautious':142 'cite':43 'clear':84 'click':136 'compani':53 'comprehens':5 'danger':61 'differ':21 'discuss':73 'display':138 'dns':109 'download':68 'emphas':131 'employ':108 'exampl':44 'good':146 'guidanc':120 'high':47 'high-profil':46 'highlight':59 'import':133 'includ':39 'inform':158 'insight':18 'interact':71 'involv':51 'like':104 'major':52 'malici':63 'malvertis':15,23,49,171 'malwar':114 'mitig':91 'offer':17,119,150 'one':41 'origin':106 'overal':151 'overview':6 'phish':80 'platform':55 'popular':40 'possibl':130 'potenti':75 'profil':48 'provid':3,83,160 'research':157 'resolv':110 'resourc':162 'risk':9,76,93,166 'scam':78 'script':64,100 'softwar':103 'target':12,168 'too-good-to-be-tru':144 'true':149 'ublock':105 'understand':164 'use':101 'user':70 'way':22 'websit':38 'well':156 'well-research':155 'without':69"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034637
+visibility: "visible "
+apId: "https://lemmy.world/post/11049489"
+editedAt: null
+createdAt: DateTimeImmutable @1705948237 {#2240
date: 2024-01-22 19:30:37.0 +01:00
}
} |
|
Show voter details
|
19 |
DENIED
|
edit
|
App\Entity\Entry {#2236
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2205 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2206 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
\n
The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
\n
It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
\n
Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705948237 {#2239
date: 2024-01-22 19:30:37.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2233 …}
+votes: Doctrine\ORM\PersistentCollection {#2234 …}
+reports: Doctrine\ORM\PersistentCollection {#2237 …}
+favourites: Doctrine\ORM\PersistentCollection {#2258 …}
+notifications: Doctrine\ORM\PersistentCollection {#2260 …}
+badges: Doctrine\ORM\PersistentCollection {#2254 …}
+children: []
-id: 32446
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'action':86 'ad':13,97,116,127,169 'adblock':102 'advertis':35,139 'advic':87 'also':58,118 'appear':32 'articl':2,57,82,153 'associ':10,99 'avoid':135 'block':96,113,126 'capabl':111 'carri':26 'case':50 'cautious':142 'cite':43 'clear':84 'click':136 'compani':53 'comprehens':5 'danger':61 'differ':21 'discuss':73 'display':138 'dns':109 'download':68 'emphas':131 'employ':108 'exampl':44 'good':146 'guidanc':120 'high':47 'high-profil':46 'highlight':59 'import':133 'includ':39 'inform':158 'insight':18 'interact':71 'involv':51 'like':104 'major':52 'malici':63 'malvertis':15,23,49,171 'malwar':114 'mitig':91 'offer':17,119,150 'one':41 'origin':106 'overal':151 'overview':6 'phish':80 'platform':55 'popular':40 'possibl':130 'potenti':75 'profil':48 'provid':3,83,160 'research':157 'resolv':110 'resourc':162 'risk':9,76,93,166 'scam':78 'script':64,100 'softwar':103 'target':12,168 'too-good-to-be-tru':144 'true':149 'ublock':105 'understand':164 'use':101 'user':70 'way':22 'websit':38 'well':156 'well-research':155 'without':69"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034637
+visibility: "visible "
+apId: "https://lemmy.world/post/11049489"
+editedAt: null
+createdAt: DateTimeImmutable @1705948237 {#2240
date: 2024-01-22 19:30:37.0 +01:00
}
} |
|
Show voter details
|
20 |
DENIED
|
moderate
|
App\Entity\Entry {#2236
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2205 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2206 …}
+slug: "Targeted-Ads-are-a-Cybersecurity-Risk"
+title: "Targeted Ads are a Cybersecurity Risk"
+url: "https://avoidthehack.com/ads-cybersecurity-risk"
+body: """
The article provides a comprehensive overview of the risks associated with targeted ads and malvertising. It offers insights into the different ways malvertising can be carried out and how it can appear on any advertisement on any website, including popular ones. It cites examples of high-profile malvertising cases involving major companies and platforms. The article also highlights the dangers of malicious scripts that can be downloaded without user interaction and discusses the potential risks of scams and phishing.\n
\n
The article provides clear and actionable advice on how to mitigate these risks, such as blocking ads and associated scripts, using adblocking software like uBlock Origin, and employing DNS resolvers capable of blocking malware and ads.\n
\n
It also offers guidance on what to do when blocking ads is not possible, emphasizing the importance of avoiding clicking on displayed advertisements and being cautious of too-good-to-be-true offers.\n
\n
Overall, the article is well-researched, informative, and provides a resource for understanding the risks of targeted ads and malvertising.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 60
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705948237 {#2239
date: 2024-01-22 19:30:37.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2233 …}
+votes: Doctrine\ORM\PersistentCollection {#2234 …}
+reports: Doctrine\ORM\PersistentCollection {#2237 …}
+favourites: Doctrine\ORM\PersistentCollection {#2258 …}
+notifications: Doctrine\ORM\PersistentCollection {#2260 …}
+badges: Doctrine\ORM\PersistentCollection {#2254 …}
+children: []
-id: 32446
-titleTs: "'ad':2 'cybersecur':5 'risk':6 'target':1"
-bodyTs: "'action':86 'ad':13,97,116,127,169 'adblock':102 'advertis':35,139 'advic':87 'also':58,118 'appear':32 'articl':2,57,82,153 'associ':10,99 'avoid':135 'block':96,113,126 'capabl':111 'carri':26 'case':50 'cautious':142 'cite':43 'clear':84 'click':136 'compani':53 'comprehens':5 'danger':61 'differ':21 'discuss':73 'display':138 'dns':109 'download':68 'emphas':131 'employ':108 'exampl':44 'good':146 'guidanc':120 'high':47 'high-profil':46 'highlight':59 'import':133 'includ':39 'inform':158 'insight':18 'interact':71 'involv':51 'like':104 'major':52 'malici':63 'malvertis':15,23,49,171 'malwar':114 'mitig':91 'offer':17,119,150 'one':41 'origin':106 'overal':151 'overview':6 'phish':80 'platform':55 'popular':40 'possibl':130 'potenti':75 'profil':48 'provid':3,83,160 'research':157 'resolv':110 'resourc':162 'risk':9,76,93,166 'scam':78 'script':64,100 'softwar':103 'target':12,168 'too-good-to-be-tru':144 'true':149 'ublock':105 'understand':164 'use':101 'user':70 'way':22 'websit':38 'well':156 'well-research':155 'without':69"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706034637
+visibility: "visible "
+apId: "https://lemmy.world/post/11049489"
+editedAt: null
+createdAt: DateTimeImmutable @1705948237 {#2240
date: 2024-01-22 19:30:37.0 +01:00
}
} |
|
Show voter details
|
21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
22 |
DENIED
|
moderate
|
App\Entity\Entry {#2120
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2161 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2160 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
Full text from the Electronic Frontier Foundation (EFF) article:\n
\n
Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
\n
By Matthew Guariglia and Eva Galperin\n
\n
~3 minutes\n
\n
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
\n
Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
\n
We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
\n
Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 34
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705826831 {#2119
date: 2024-01-21 09:47:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2163 …}
+votes: Doctrine\ORM\PersistentCollection {#2044 …}
+reports: Doctrine\ORM\PersistentCollection {#2127 …}
+favourites: Doctrine\ORM\PersistentCollection {#2043 …}
+notifications: Doctrine\ORM\PersistentCollection {#2215 …}
+badges: Doctrine\ORM\PersistentCollection {#2198 …}
+children: []
-id: 32102
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705903331
+visibility: "visible "
+apId: "https://lemmy.world/post/10984512"
+editedAt: null
+createdAt: DateTimeImmutable @1705826831 {#2116
date: 2024-01-21 09:47:11.0 +01:00
}
} |
|
Show voter details
|
23 |
DENIED
|
edit
|
App\Entity\Entry {#2120
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2161 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2160 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
Full text from the Electronic Frontier Foundation (EFF) article:\n
\n
Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
\n
By Matthew Guariglia and Eva Galperin\n
\n
~3 minutes\n
\n
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
\n
Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
\n
We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
\n
Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 34
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705826831 {#2119
date: 2024-01-21 09:47:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2163 …}
+votes: Doctrine\ORM\PersistentCollection {#2044 …}
+reports: Doctrine\ORM\PersistentCollection {#2127 …}
+favourites: Doctrine\ORM\PersistentCollection {#2043 …}
+notifications: Doctrine\ORM\PersistentCollection {#2215 …}
+badges: Doctrine\ORM\PersistentCollection {#2198 …}
+children: []
-id: 32102
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705903331
+visibility: "visible "
+apId: "https://lemmy.world/post/10984512"
+editedAt: null
+createdAt: DateTimeImmutable @1705826831 {#2116
date: 2024-01-21 09:47:11.0 +01:00
}
} |
|
Show voter details
|
24 |
DENIED
|
moderate
|
App\Entity\Entry {#2120
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2161 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2160 …}
+slug: "Companies-Make-it-Too-Easy-for-Thieves-to-Impersonate-Police"
+title: "Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data"
+url: "https://www.eff.org/deeplinks/2024/01/companies-make-it-too-easy-thieves-impersonate-police-and-steal-our-data"
+body: """
Full text from the Electronic Frontier Foundation (EFF) article:\n
\n
Companies Make it Too Easy for Thieves to Impersonate Police and Steal Our Data\n
\n
By Matthew Guariglia and Eva Galperin\n
\n
~3 minutes\n
\n
For years, people have been impersonating police online in order to get companies to hand over incredibly sensitive personal information. [Reporting by 404 Media](https://www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/) recently revealed that Verizon handed over the address and phone logs of an individual to a stalker pretending to be a police officer who had a PDF of a fake warrant. Worse, the imposter wasn’t particularly convincing. His request was missing a form that is required for search warrants from his state. He used the name of a police officer that did not exist in the department he claimed to be from. And he used a Proton Mail account, which any person online can use, rather than an official government email address.\n
\n
Likewise, bad actors have [used breached law enforcement email accounts or domain names](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) to send fake warrants, subpoenas, or “Emergency Data Requests” (which police can send without judicial oversight to get data quickly in supposedly life or death situations). Impersonating police to get sensitive information from companies isn’t just the realm of stalkers and domestic abusers; [according to Motherboard](https://www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data), bounty hunters and debt collectors have also used the tactic.\n
\n
We have two very big entwined problems. The first is the “collect it all” business model of too many companies, which creates vast reservoirs of personal information stored in corporate data servers, ripe for police to seize and thieves to steal. The second is that too many companies fail to prevent thieves from stealing data by pretending to be police.\n
\n
Companies have to make it harder for fake “officers” to get access to our sensitive data. For starters, they must do better at scrutinizing warrants, subpoenas, and emergency data requests when they come in. These requirements should be spelled out clearly in a public-facing privacy policy, and all employees who deal with data requests from law enforcement should receive training in how to adhere to these requirements and spot fraudulent requests. Fake emergency data requests raise special concerns, because real ones depend on the discretion of both companies and police—two parties with less than stellar reputations for valuing privacy.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 34
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705826831 {#2119
date: 2024-01-21 09:47:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2163 …}
+votes: Doctrine\ORM\PersistentCollection {#2044 …}
+reports: Doctrine\ORM\PersistentCollection {#2127 …}
+favourites: Doctrine\ORM\PersistentCollection {#2043 …}
+notifications: Doctrine\ORM\PersistentCollection {#2215 …}
+badges: Doctrine\ORM\PersistentCollection {#2198 …}
+children: []
-id: 32102
-titleTs: "'compani':1 'data':14 'easi':5 'imperson':9 'make':2 'polic':10 'steal':12 'thiev':7"
-bodyTs: "'/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':167 '/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':217 '/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':58 '3':30 '404':54 'abus':211 'access':299 'accord':212 'account':138,161 'actor':154 'address':66,151 'adher':353 'also':224 'articl':9 'bad':153 'better':309 'big':232 'bounti':218 'breach':157 'busi':242 'claim':128 'clear':328 'collect':239 'collector':222 'come':320 'compani':10,44,201,247,275,288,377 'concern':367 'convinc':96 'corpor':257 'creat':249 'data':23,175,186,258,282,303,316,342,363 'deal':340 'death':192 'debt':221 'depart':126 'depend':371 'discret':374 'domain':163 'domest':210 'easi':14 'eff':8 'electron':5 'email':150,160 'emerg':174,315,362 'employe':338 'enforc':159,346 'entwin':233 'eva':28 'exist':123 'face':333 'fail':276 'fake':88,170,295,361 'first':236 'form':102 'foundat':7 'fraudul':359 'frontier':6 'full':1 'galperin':29 'get':43,185,197,298 'govern':149 'guariglia':26 'hand':46,63 'harder':293 'hunter':219 'imperson':18,37,194 'impost':92 'incred':48 'individu':72 'inform':51,199,254 'isn':202 'judici':182 'krebsonsecurity.com':166 'krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/)':165 'law':158,345 'less':383 'life':190 'likewis':152 'log':69 'mail':137 'make':11,291 'mani':246,274 'matthew':25 'media':55 'minut':31 'miss':100 'model':243 'motherboard':214 'must':307 'name':115,164 'offic':81,119,296 'offici':148 'one':370 'onlin':39,142 'order':41 'oversight':183 'parti':381 'particular':95 'pdf':85 'peopl':34 'person':50,141,253 'phone':68 'polic':19,38,80,118,178,195,262,287,379 'polici':335 'pretend':76,284 'prevent':278 'privaci':334,389 'problem':234 'proton':136 'public':332 'public-fac':331 'quick':187 'rais':365 'rather':145 'real':369 'realm':206 'receiv':348 'recent':59 'report':52 'reput':386 'request':98,176,317,343,360,364 'requir':105,323,356 'reservoir':251 'reveal':60 'ripe':260 'scrutin':311 'search':107 'second':270 'seiz':264 'send':169,180 'sensit':49,198,302 'server':259 'situat':193 'special':366 'spell':326 'spot':358 'stalker':75,208 'starter':305 'state':111 'steal':21,268,281 'stellar':385 'store':255 'subpoena':172,313 'suppos':189 'tactic':227 'text':2 'thiev':16,266,279 'train':349 'two':230,380 'use':113,134,144,156,225 'valu':388 'vast':250 'verizon':62 'warrant':89,108,171,312 'wasn':93 'without':181 'wors':90 'www.404media.co':57 'www.404media.co/verizon-gave-phone-data-to-stalker-edrs-search-warrant-pose-as-cop/)':56 'www.vice.com':216 'www.vice.com/en/article/panvkz/stalkers-debt-collectors-bounty-hunters-impersonate-cops-phone-location-data),':215 'year':33"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705903331
+visibility: "visible "
+apId: "https://lemmy.world/post/10984512"
+editedAt: null
+createdAt: DateTimeImmutable @1705826831 {#2116
date: 2024-01-21 09:47:11.0 +01:00
}
} |
|
Show voter details
|
25 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
26 |
DENIED
|
moderate
|
App\Entity\Entry {#2075
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2061 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2079 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#2037
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2084 …}
+votes: Doctrine\ORM\PersistentCollection {#2076 …}
+reports: Doctrine\ORM\PersistentCollection {#2083 …}
+favourites: Doctrine\ORM\PersistentCollection {#2085 …}
+notifications: Doctrine\ORM\PersistentCollection {#2062 …}
+badges: Doctrine\ORM\PersistentCollection {#2077 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2144
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
27 |
DENIED
|
edit
|
App\Entity\Entry {#2075
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2061 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2079 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#2037
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2084 …}
+votes: Doctrine\ORM\PersistentCollection {#2076 …}
+reports: Doctrine\ORM\PersistentCollection {#2083 …}
+favourites: Doctrine\ORM\PersistentCollection {#2085 …}
+notifications: Doctrine\ORM\PersistentCollection {#2062 …}
+badges: Doctrine\ORM\PersistentCollection {#2077 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2144
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
28 |
DENIED
|
moderate
|
App\Entity\Entry {#2075
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#2025 …}
+image: Proxies\__CG__\App\Entity\Image {#2061 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2079 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#2037
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2084 …}
+votes: Doctrine\ORM\PersistentCollection {#2076 …}
+reports: Doctrine\ORM\PersistentCollection {#2083 …}
+favourites: Doctrine\ORM\PersistentCollection {#2085 …}
+notifications: Doctrine\ORM\PersistentCollection {#2062 …}
+badges: Doctrine\ORM\PersistentCollection {#2077 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2144
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
29 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
30 |
DENIED
|
moderate
|
App\Entity\Entry {#2054
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1736 …}
+image: Proxies\__CG__\App\Entity\Image {#2061 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2079 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 19
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705512547 {#2055
date: 2024-01-17 18:29:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2058 …}
+votes: Doctrine\ORM\PersistentCollection {#2125 …}
+reports: Doctrine\ORM\PersistentCollection {#2041 …}
+favourites: Doctrine\ORM\PersistentCollection {#2100 …}
+notifications: Doctrine\ORM\PersistentCollection {#2105 …}
+badges: Doctrine\ORM\PersistentCollection {#2111 …}
+children: []
-id: 31250
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705553047
+visibility: "visible "
+apId: "https://lemmy.world/post/10833789"
+editedAt: null
+createdAt: DateTimeImmutable @1705512547 {#2052
date: 2024-01-17 18:29:07.0 +01:00
}
} |
|
Show voter details
|
31 |
DENIED
|
edit
|
App\Entity\Entry {#2054
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1736 …}
+image: Proxies\__CG__\App\Entity\Image {#2061 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2079 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 19
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705512547 {#2055
date: 2024-01-17 18:29:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2058 …}
+votes: Doctrine\ORM\PersistentCollection {#2125 …}
+reports: Doctrine\ORM\PersistentCollection {#2041 …}
+favourites: Doctrine\ORM\PersistentCollection {#2100 …}
+notifications: Doctrine\ORM\PersistentCollection {#2105 …}
+badges: Doctrine\ORM\PersistentCollection {#2111 …}
+children: []
-id: 31250
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705553047
+visibility: "visible "
+apId: "https://lemmy.world/post/10833789"
+editedAt: null
+createdAt: DateTimeImmutable @1705512547 {#2052
date: 2024-01-17 18:29:07.0 +01:00
}
} |
|
Show voter details
|
32 |
DENIED
|
moderate
|
App\Entity\Entry {#2054
+user: App\Entity\User {#264 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1736 …}
+image: Proxies\__CG__\App\Entity\Image {#2061 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2079 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 19
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705512547 {#2055
date: 2024-01-17 18:29:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2058 …}
+votes: Doctrine\ORM\PersistentCollection {#2125 …}
+reports: Doctrine\ORM\PersistentCollection {#2041 …}
+favourites: Doctrine\ORM\PersistentCollection {#2100 …}
+notifications: Doctrine\ORM\PersistentCollection {#2105 …}
+badges: Doctrine\ORM\PersistentCollection {#2111 …}
+children: []
-id: 31250
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705553047
+visibility: "visible "
+apId: "https://lemmy.world/post/10833789"
+editedAt: null
+createdAt: DateTimeImmutable @1705512547 {#2052
date: 2024-01-17 18:29:07.0 +01:00
}
} |
|
Show voter details
|