Comments

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Septimaeus, (edited ) to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

Yeah those push token systems need an overhaul. IIRC tokens are specific to app-device combinations, so invalidation that isn’t automatic should be push-button revocation. Users should have control of it like any other API on their device, if only to get apps to stop spamming coupons or whatever.

It’s funny though: when I first saw those headlines, my first reaction was that it was a positive sign, since this was apparently news worthy even though the magnitude of impact for this sort of systemic breach is demonstrably low. (In particular, it pertains to (1) incidental high-noise data (2) associated with devices and (3) available only by request to (4) governments, who are weak compared to even the smallest data brokers WRT capacity for data mining inference and redistribution, to put it mildly.)

Regardless, those systems need attention.

Septimaeus, (edited ) to selfhosted in what if your cloud=provider gets hacked ?

I’d put the corrupted backups in an eye-catching container, like a Lisa Frank backpack or Barbie lunchbox, to put on the wall in my office.

Septimaeus, to privacy in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

That certainly would make the data smuggling easier. What about battery though? I assume that requires inference and at least rudimentary processing.

How would a background process do this in real time on a mobile device without leaving traceable evidence like cpu time?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #