I’ve been bought a nice wallet which has an airtag slot on the front of it. I use android and therefore don’t want to put an airtag in to the slot, but also don’t want to leave it empty....
I’ve been on Reddit for over a decade. But I’m done with that site and want to do something else. What do normal people look at on their phones? Is it all social media? Streaming?
the pelvic alignment improves penetration, mostly due to the thighs being out of eachother’s way
you won’t slip into her fernix as easily, which increases lateral pressure in the vaginal canal
generally she just feels you better at unexplored angles where she remains more sensitive to pressure, for a stronger feeling of fullness
Why does it work?
Is it because she thinks your pp is bigger? No, probably not. It works because you’re paying attention and being responsive, which makes your partner feel in control and taken care of. She’ll think of you next time she wants that, because she knows you’re good for it. Better sex, that is.
Anyway be safe, have fun, and quit worrying about your pp.
Flip her onto her side and hold one of her legs upward. You’ll get compliments because it’s a bit athletic and does in fact feel deeper.
Important: try this only if you know she’s into being handled this way. She likely is if she’s saying things like that, but always make sure your partner enjoys stuff before adding it.
Agreed, though I think it’s possible to use smart devices safely. For Android it can be difficult outside custom roms. The OEM flavors tend to have spyware baked in that takes time and root to fully undo, and even then I’m never sure I got it all. These are the most common phones, however, especially in economy price brackets, which is why I’d agree that for the average user most phones are spyware.
Flashing is not useful advice to most. “Just root it bro” doesn’t help your nontechnical relatives who can’t stop downloading toolbars and VPN installers. But with OEM variants undermining privacy at the system level, it feels like a losing battle.
I’d give credit to Apple for their privacy enablement, especially with E2EE, device lockdown, granular access permission control and audits. Unfortunately their devices are not as affordable and I’m not sure how to advise the average Android user beyond general opt-out vigilance.
Yeah those push token systems need an overhaul. IIRC tokens are specific to app-device combinations, so invalidation that isn’t automatic should be push-button revocation. Users should have control of it like any other API on their device, if only to get apps to stop spamming coupons or whatever.
It’s funny though: when I first saw those headlines, my first reaction was that it was a positive sign, since this was apparently news worthy even though the magnitude of impact for this sort of systemic breach is demonstrably low. (In particular, it pertains to (1) incidental high-noise data (2) associated with devices and (3) available only by request to (4) governments, who are weak compared to even the smallest data brokers WRT capacity for data mining inference and redistribution, to put it mildly.)
Damn, I hadn’t thought of that. The chicken egg question of spooky ad relevance. Insidious indeed.
I feel like the idea of some person or group having enough info to psychologically manipulate or predict should be way scarier than the black helicopter stuff, especially given that it’s one of the few conspiracy theories we actually have a bunch of high quality evidence for, just in marketing and statistics textbooks alone.
But here we are. Government surveillance is the hot button, not the fact that marketers would happily sock puppet you given the chance.
Hmm, that’s outside my wheelhouse. So you’re saying phone hardware is designed to listen for not just one but multiple predefined or reprogrammable bank of wake words? I hadn’t read about that yet but it sounds more feasible than the constant livestream idea.
The echo had the capacity for multiple wake words IIRC, but I hadn’t heard of that for mobile devices. I’m curious how many of these key words can they fit?
Yeah they’d have to it seems, but real time transcription isn’t free. Even late model devices with better inference hardware have limited battery and energy monitoring. I imagine it’d be hard to conceal that behavior especially for an app recording in the background.
WetBeardHairs@lemmy.ml mentioned that mobile devices use the same hardware coprocessing used for wake word behavior to target specific key phrases. I don’t know anything about that, but it’s one way they could work around the technical limitations.
Of course, that’s a relatively bespoke hardware solution that might also be difficult to fully conceal, and it would come with its own limitations. Like in that case, there’s a preset list of high value key words that you can tally, in order to send company servers a small “score card” rather than a heavy audio clip. But the data would be far less rich than what people usually think of with these flashy headlines (your private conversations, your bowel movements, your penchant for musical theater, whatever).
Yeah outside mobile devices I imagine there’s a lot more leeway technically speaking. I’d be far more inclined to suspect a smart TV or a home assistant appliance like Amazon Echo, for example. And certainly there are plenty of PCs out there that are 100% compromised.
But it’s the phone that people often think of as eavesdropping on their conversations. The idea is stickier perhaps because it’s a more personal violation. And I wouldn’t put it past data brokers by any means. They would if they could. I’ve just yet to hear a feasible explanation of how they can without being caught. Hence my doubt.
That’s possible too, and in general I’d think a foreground application currently in use alleviates most of the technical restrictions mentioned (read: why we never install FB).
But again we must assume some uncommon device privileges and we still haven’t solved the problem of background energy usage required to record and/or process a real time feed.
Right, I suppose cybersecurity isn’t so different than physical security in that way. Someone who really wants to get to you always can (read: why there are so many burner phones at def con).
But for the average person, who uses consumer grade deadbolts in their home and doesn’t hire a private detail when they travel, does an iPhone fit within their acceptable risk threshold? Probably.
I usually wear the tin foil hat in these debates, but I must concede in this case: the eavesdropping phone theory in particular is difficult to substantiate, from a technical standpoint.
For one, a user can check this themselves today with basic local network traffic monitors or packet sniffing tools. Even heavily compressed audio data will stand out in the log, no matter how it’s encrypted, streamed, batched or what have you.
To get a sense of what I mean, run wireshark and give a wake phrase command to see what that looks like. Now imagine trying to obfuscate that type of transmission for audio longer than 2 seconds, and repeatedly throughout a day.
Even assuming local audio inference and processing on a completely compromised device (rooted/jailbroken, disabled sandboxing/SIP, unrestricted platform access, the works) most phones will just struggle to do that recording and processing indeterminately without a noticeable impact on energy and data use.
I’m sure advertising companies would love to collect that much raw candid data. It would seem quite a challenge to do so quietly, however, and given the apparent lack of evidence, is thus unlikely to have been implemented at any kind of scale.
As always, the paying user has the worst experience. “Purchase” a show, can only watch on a certain console of a certain brand, no transfers, no backups, then it suddenly disappears from the library and nothing can be done....
Unused Airtag slot
I’ve been bought a nice wallet which has an airtag slot on the front of it. I use android and therefore don’t want to put an airtag in to the slot, but also don’t want to leave it empty....
What do normal people look at on their phones?
I’ve been on Reddit for over a decade. But I’m done with that site and want to do something else. What do normal people look at on their phones? Is it all social media? Streaming?
what if your cloud=provider gets hacked ? (www.bleepingcomputer.com)
Hi all,...
FML (lemmy.zip)
A dangerous mistake to make (startrek.website)
Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News (www.404media.co)
Sony is going to remove certain purchased titles from user libraries (www.playstation.com)
As always, the paying user has the worst experience. “Purchase” a show, can only watch on a certain console of a certain brand, no transfers, no backups, then it suddenly disappears from the library and nothing can be done....