Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Septimaeus, to asklemmy in What do normal people look at on their phones?

A duck!

Septimaeus, (edited ) to selfhosted in what if your cloud=provider gets hacked ?

I’d put the corrupted backups in an eye-catching container, like a Lisa Frank backpack or Barbie lunchbox, to put on the wall in my office.

Septimaeus, (edited ) to selfhosted in what if your cloud=provider gets hacked ?

Dammit, I came here hoping to see at least one “I have a very special set of skills.” Oh well.

Yeah I’d cut bait, rebuild from latest tapes. But also…

Septimaeus, (edited ) to memes in FML

How does it work?

It feels deeper to her because:

  1. the pelvic alignment improves penetration, mostly due to the thighs being out of eachother’s way
  2. you won’t slip into her fernix as easily, which increases lateral pressure in the vaginal canal
  3. generally she just feels you better at unexplored angles where she remains more sensitive to pressure, for a stronger feeling of fullness

Why does it work?

Is it because she thinks your pp is bigger? No, probably not. It works because you’re paying attention and being responsive, which makes your partner feel in control and taken care of. She’ll think of you next time she wants that, because she knows you’re good for it. Better sex, that is.

Anyway be safe, have fun, and quit worrying about your pp.

Septimaeus, (edited ) to memes in FML

Flip her onto her side and hold one of her legs upward. You’ll get compliments because it’s a bit athletic and does in fact feel deeper.

Important: try this only if you know she’s into being handled this way. She likely is if she’s saying things like that, but always make sure your partner enjoys stuff before adding it.

Details below.

Septimaeus, (edited ) to science_memes in A dangerous mistake to make

Is it a bird? Is it a plane? No, it’s the joke, man :)

Septimaeus, to asklemmy in Unused Airtag slot

Holographic slammer

Septimaeus, (edited ) to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Right, I suppose cybersecurity isn’t so different than physical security in that way. Someone who really wants to get to you always can (read: why there are so many burner phones at def con).

But for the average person, who uses consumer grade deadbolts in their home and doesn’t hire a private detail when they travel, does an iPhone fit within their acceptable risk threshold? Probably.

Septimaeus, to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

That’s possible too, and in general I’d think a foreground application currently in use alleviates most of the technical restrictions mentioned (read: why we never install FB).

But again we must assume some uncommon device privileges and we still haven’t solved the problem of background energy usage required to record and/or process a real time feed.

Septimaeus, to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Yeah outside mobile devices I imagine there’s a lot more leeway technically speaking. I’d be far more inclined to suspect a smart TV or a home assistant appliance like Amazon Echo, for example. And certainly there are plenty of PCs out there that are 100% compromised.

But it’s the phone that people often think of as eavesdropping on their conversations. The idea is stickier perhaps because it’s a more personal violation. And I wouldn’t put it past data brokers by any means. They would if they could. I’ve just yet to hear a feasible explanation of how they can without being caught. Hence my doubt.

Septimaeus, (edited ) to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Yeah they’d have to it seems, but real time transcription isn’t free. Even late model devices with better inference hardware have limited battery and energy monitoring. I imagine it’d be hard to conceal that behavior especially for an app recording in the background.

WetBeardHairs@lemmy.ml mentioned that mobile devices use the same hardware coprocessing used for wake word behavior to target specific key phrases. I don’t know anything about that, but it’s one way they could work around the technical limitations.

Of course, that’s a relatively bespoke hardware solution that might also be difficult to fully conceal, and it would come with its own limitations. Like in that case, there’s a preset list of high value key words that you can tally, in order to send company servers a small “score card” rather than a heavy audio clip. But the data would be far less rich than what people usually think of with these flashy headlines (your private conversations, your bowel movements, your penchant for musical theater, whatever).

Septimaeus, to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

That certainly would make the data smuggling easier. What about battery though? I assume that requires inference and at least rudimentary processing.

How would a background process do this in real time on a mobile device without leaving traceable evidence like cpu time?

Septimaeus, (edited ) to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Hmm, that’s outside my wheelhouse. So you’re saying phone hardware is designed to listen for not just one but multiple predefined or reprogrammable bank of wake words? I hadn’t read about that yet but it sounds more feasible than the constant livestream idea.

The echo had the capacity for multiple wake words IIRC, but I hadn’t heard of that for mobile devices. I’m curious how many of these key words can they fit?

Septimaeus, (edited ) to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Damn, I hadn’t thought of that. The chicken egg question of spooky ad relevance. Insidious indeed.

I feel like the idea of some person or group having enough info to psychologically manipulate or predict should be way scarier than the black helicopter stuff, especially given that it’s one of the few conspiracy theories we actually have a bunch of high quality evidence for, just in marketing and statistics textbooks alone.

But here we are. Government surveillance is the hot button, not the fact that marketers would happily sock puppet you given the chance.

Septimaeus, (edited ) to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Yeah those push token systems need an overhaul. IIRC tokens are specific to app-device combinations, so invalidation that isn’t automatic should be push-button revocation. Users should have control of it like any other API on their device, if only to get apps to stop spamming coupons or whatever.

It’s funny though: when I first saw those headlines, my first reaction was that it was a positive sign, since this was apparently news worthy even though the magnitude of impact for this sort of systemic breach is demonstrably low. (In particular, it pertains to (1) incidental high-noise data (2) associated with devices and (3) available only by request to (4) governments, who are weak compared to even the smallest data brokers WRT capacity for data mining inference and redistribution, to put it mildly.)

Regardless, those systems need attention.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #