Yup. Maybe even just pure coincidence. People are very susceptible to confirmation bias and, as an extra spicy hot take, people in communities like this one even more so.
Telegram uses Google services like Signal for notifications - telegra.ph/Notifications-FIX its the first point under the Android section
core.telegram.org/api/push-updates these are the docs for building your own Telegram app, specifically the push notifications section and again it mentions using APNS for iOS or FCM for Android but they also offer Simple push which would work with Unifiedpush and would be one way to bypass FCM but I don’t know if they offer that in their official app or if there are any other Telegram apps that have implemented it
“Signal only uses FCM to wake up the Android app if there are new messages waiting on the Signal server and the app isn’t connected to it. Signal does not include any information in these notifications, encrypted or otherwise, so Google can only infer that your device has something queued on Signal’s servers.” I was wondering if a similar system has been implemented in telegram?
Too radical a solution for me, I used microG for a long time, but the notification problems made me go back to Google services. i’ve banned them from accessing camera/microphone/geolocation via App Ops (put them on ignore mode), so I’m pretty calm. but notifications are still a problem).
A similar experience is what got me into privacy. Time to get off of social media and get rid of apps that have access to your keyboard, mic, files, etc.
One possibility: Are you on the same network (i.e. wifi) without a vpn? If yes, then both of you have the same public IP, so it’s trivial to figure out you’re likely in the same household.
It’s basically always this. Your phone in the same room with someone else’s phone. This is stronger around christmas when people are looking for gift ideas, so they push this mind control shit on you even harder.
It’s not actually listening to you–that’s been debunked multiple ways–but what it’s doing instead is arguably worse.
So what are the mechanics of this? OP would also have had to interact with Meta somehow after finding the moccasins but before the girlfriend did, right?
No, you don’t have to interact with Meta. Websites that utilize Facebook ads in some fashion will install a Meta Pixel to their site in order to track users and better target their ads. That information can be correlated to others in the same household extremely easily.
I also hear people make the same claims against Alexa, but I usually start explaining what cookies are and how ad networks collects your data to more effectively target you. It doesn’t make fiscal sense to do mass audio surveillance when you already freely hand over your data.
Lemmy is the only social media I have, but we are connected via Whatsapp. I’m thinking that since we were both connected to the wifi without a VPN, that’s the probable source of information bleed.
It can be the website you are browsing have trackers that share data with facebook, and facebook was able to infer you guys are in the same household via IP information (ISP also sales you info BTW), and push the ad to her. Or facebook might think that you guys could be the same person or have similar interest etc.
The sites to be redirected shouldn’t be already pre-selected by the extension. E.g I am logged in to Twitter on my browser and installing this extension will unintentionally redirect me to some instance.
And also, maybe the sites for redirection should be added by the user instead of the extension making assumptions. With libredirect I can click more options and add the site to Chrome’s handler.
It has a reasonable default of reliable privacy frontends but I may add an onboarding step(already in firefox due to more restrictions in their manifest v3 than chrome) for selecting sites
GDPR can only extend to their borders, the same that any country’s laws extend to theirs. Why would you expect another country to honor your “home rules”?
It does. When GDPR was about to be placed in effect, the company I worked for in Brazil, send a communication to all our clients saying that they needed to communicate us if they were in Europe for us to process their claims (life insurance) with a third party European partner because the Brazilian office would not be able to comply with European regulations and the company would not even going to answer emails from clients located there. Eventually Brazil made their own data protection laws based on the European one and the company re opened contact with their clients located there.
Open VPN has a knack for taking out a big part of the throughput. My 1gb gets knocked down to somewhere in the 300 space. Wireguard has more performance but more of a trick to set up, and if the ISP is feeling obnoxious is a lot easier to isolate and block than OVPN.
You could get one of the older models where they don’t connect to the internet and instead just bumble around bumping into stuff until the place is clean
privacy
Active
This magazine is from a federated server and may be incomplete. Browse more on the original instance.