privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

BlanK0, in Golang telemetry (again)

Honestly I wouldn’t be surprised, I don’t know much about Go but based on Google’s track record it seems like the gameplan is to sell a bunch of user data to third parties and go rich

RuikkaaPrus,
@RuikkaaPrus@lemmy.ml avatar

Lmao Hope you’re not right (I mean, I hope no telemetry is imposed on my favorite programming language). But as you said, Google tracking/survillance history say that people privacy really don’t concerns him

BlanK0,

You can always switch to another language later on if anything goes south, since a lot of the thought process is the same behind the scripting 🤞

RuikkaaPrus,
@RuikkaaPrus@lemmy.ml avatar

Rust is my “alternative”. But I see Rust pretty hard (is a system level programming language lol) and differently scoped.

I like some Go characteristics like garbage collection, simpler syntax, crossplatform, 1 second C bindings, and so on.

TCB13, (edited ) in I have an issue with how SIM cards are handled in most countries
@TCB13@lemmy.world avatar

It seems like a dystopian system, that we litterely can not hide from our governments without turning off our smartphones

That’s basically it.

However SIM cards that aren’t tied to people usually ends up scenarios like the US have where SIM swap attacks are common and you’ve a LOT of identity fraud. Note that we’ve an increasing number of services sending information and validation codes via SMS like banking apps and whatnot and you don’t secure the SIMs anyone will be able to get a replacement SIM because “I got my phone stolen” and you’ll have zero security.

I don’t like it, but I get the point.

WbrJr,

I recently heard the episode of darknet diaries about it. I would think a simple PIN-Code that is mandatory would solve this issue? Or a letter send to the owner of the SIM?

TCB13,
@TCB13@lemmy.world avatar

Both solutions would make it safer, but not impossible to get around. Someone can get the PIN Code in some more analog (getting the paper with the PIN) or digital way (interception with physical access to a phone) and getting into the persons mailbox.

Even if those attacks wouldn’t happen there’s always the chance of something more complex like calling the carrier support and saying you’ve change your address and then a week later ask for a new SIM. It can go wrong very quickly, asking for a govt ID is the easy way to solve it all.

To be fair we can have a better solution, we simply force the fucktards that run banks and other places who send SMS codes to use a simple 2FA method without bullshit apps, just provide a QR code and live with it.

LemmyHead,

I think it’s actually the other way around. BECAUSE phone numbers are linked to our accounts and identities, it makes us vulnerable to SIM swapping. They should only be used for calling and texting people, nothing more. But nowadays we need to link our personal details to them, our accounts, which introduces this vulnerability because then it creates this incentive for an attack

TCB13,
@TCB13@lemmy.world avatar

If you live in a country where carriers are required to identify phone numbers and do identity checks for SIM swaps they’ll never, ever, allow someone to get a SIM with your number without providing valid govt ID. That’s why it solves the issue and its safe. Just look at the numbers / stats and you’ll find that the SIM swapping attacks happen on countries where no identification is required.

taladar,

Honestly, it would just be nice if someone made a mobile computing device that wasn’t phone-capable at all. It is outdated functionality to have just one or two services use a totally separate protocol from everything else.

BastingChemina,

A tablet ?

taladar,

The ones I had which allow mobile data connections also allow use as a phone. Not to mention that most tablets are the wrong size to carry them around all the time.

beckerist, in Golang telemetry (again)

deleted_by_author

  • Loading...
  • RuikkaaPrus,
    @RuikkaaPrus@lemmy.ml avatar

    I searched A LOT about this information and got no information (but misinformation) about. Plus just look at this decision.

    What that means? I need to do a torsocks to every single command I type? (That last is just sarcasm. Please, I’m not so paranoid (by now))

    CookieManTheGreat, in Is this even legal? Hiding data deletion behind login (after email request)

    Yes because they need to verify that its your account and not someone wanting to get your account deleted

    pacjo,

    As mentioned in another reply:

    I’m writing from the email associated with the account, this is enough for most services I encountered

    CookieManTheGreat, (edited )

    Yes but having you to log in with a password is legit as well.

    The fact that the support can’t help etc is another issue, completely idiotic.

    echo64, in Is this even legal? Hiding data deletion behind login (after email request)

    it’s not illegal to put account deletion behind a login at all. Its also legal for them to request identification.

    However if you request data deletion and they have no valid exception to avoid doing that they must comply, it doesn’t matter if they have a mechanism for deletion that you can use, they have to still delete the data even if you don’t press the “delete account” button.

    you can file a complaint with your countries regulatory departments but if they refuse to press the delete account button for you, there’s not much else you can do outside of that.

    pacjo,

    Not the answer I was hoping for, but still a good one. I’ll try contacting someone who might be interested in this.

    In the mean time I sent them another email specifically mentioning this as a request and not me just asking for help.

    ShortN0te, in I have an issue with how SIM cards are handled in most countries

    The thing is, even if you would not need to link your identity to your sim card, it would still be trivial to identify who you are if you use your phone like a normal human. Thanks to cell towers.

    But yes this is just an excuse and does not stop much crime. If you want to break into a bank or hurt someone just leave your phone at home and you already circumvented this measure.

    amju_wolf,
    @amju_wolf@pawb.social avatar

    It’s even simpler than that; you probably pay for your SIM credit online / with a card, which is much easier to tie to a person than using cell towers for tracking.

    cucumber_sandwich,

    Prepaid and cash is still pretty common though. Even paying for prepaid codes with card might break the identification.

    parpol, in Medical devices and user privacy

    Can you order a GDPR-compliant one from Europe instead, or an older brand?

    breeze,

    Too expensive. There’s an import tax I have to pay if I ordered anything abroad, and the devices price in general are high enough to hurt my wallets even more. Older brands can’t be acquired from stores, and “not supported” if I bought a used one, I was told.

    Azal, in Medical devices and user privacy

    Here’s something tangentially related that makes it difficult to find older options, the support. In the US a piece of medical device has to be supported for 7 years. My hospital has these bladder scanners that are in quite a few departments, regular fixture in hospitals (ultrasounds). Jan 1 2024 was when our came up on the 7 year mark. To do preventative maintenance calibration required logging on their server, guess what’s no longer accessible? So to stay in compliance all of us in the biomed department has to figure out how to get new ones to replace the 10 $11k each paperweights we have now.

    breeze,

    I found some older models around my area, but are all used and not very clear on what functions are still supported. I wish companies were more open about those things.

    invertedspear, in Medical devices and user privacy

    I have and use a resimed that does the phone home option. Once my doctor got what he needed I put it in airplane mode.

    Distributor used the stats while I was reporting to call me and tell me I need new filters or other parts. I lol’d and bought them online for way cheaper. They stopped trying even before the doctor got all the data he needed.

    Also, AFAICT it’s only data out, so I’m not worried about some exploit being delivered to the machine.

    Final thought: I work in med tech. We have better security than credit agencies because we get fined more if we screw up. Personal data leaks are so common no one even cares anymore, but leaking someone’s medical info will shut a company down. You are likely safe, but ultimately never as safe as a “dumb” machine would be except they just don’t exist anymore.

    Actual final thought: you will be amazed at how much better you feel every morning after actually sleeping instead of the dirty pseudo sleep you’re currently getting.

    breeze,

    Thank you. I asked some acquaintances in health industry and received similar answers.

    211,

    I thought it was data out only too, but at my sleep apnea orientation was told (and I double checked that they really meant it) that they could also tweak settings remotely. ResMed. Always possible that they had misunderstood something too, of course.

    ItsComplicated, in Medical devices and user privacy

    Is there no longer an option to use the machine without the report or connection to internet?

    breeze,

    Considering that, but the doctor needs the report so my condition can be treated in a proper way. I need to contact more distributors and see if there are any “customer privacy conscious” kind, but I’m not getting my hopes up.

    otter, (edited )

    I’m not familiar with the companies mentioned, but have you tried talking to the doctor or the clinic? They may be able to provide you with better guidance, or tell you about other machines that are compatible with your treatment plan. Even if they don’t know about the privacy aspect, that might give you a shorter list to follow up on.

    My guess (or hope) is that this is the option that the average person finds convenient, which is why the doctor recommended it. There should be other options that the doctor / clinic knows about, especially because an IOT CPAP machine is a fairly new thing.

    Doctors modify treatment plans fairly often, even for things like patient comfort, and bringing this concern to their attention could also change what they recommend to future patients.


    Personal thoughts unrelated to your case: This is a growing concern with healthcare technology and I think we need more attention on the harms. “Your insurance company will use it against you” is something that most people will understand.

    breeze,

    That’s right. I will email the doctor and ask if any other patients have expressed concerns about it.

    taladar, in I have an issue with how SIM cards are handled in most countries

    I doubt most of the companies tracking people with their phone even bother trying to get at that data since finding your identity is so easy when there is some tracking in almost every app.

    WbrJr,

    Totally, but the government does not really have access to this data, they would have to know what apps to look for first

    Zerush, in How good/bad is Firefox sync.
    @Zerush@lemmy.ml avatar

    All companies that have to pay for infrastructure, servers, employees and invoices naturally need income, as is logical and legitimate. Some use contextual ads, that is, tool ads on a DIY page. This may be annoying, but it does not put privacy at risk, but if it does, when the ads are based on the user’s history and data (surveillance advertising), this is what is massively used by US companies.

    That there are other models to create income, for example what Proton does, with its Freemium services. The free Proton products (all of which are OpenSource, by the way), naturally have limited functions, but they do not require trafficking in user data, because they are financed through Premium services.

    Andisearch, the first search engine on the market that used AI with its own language model, is strictly anonymous, no tracking or logging with sandboxed results, it is 100% free and private, for the future they plan to create a premium model for companies with specific functions for collaboration and special business functionalities, to finance the free version.

    Vivaldi in new installations offers a selection of search engines (DDG, Ecosia, Startpage, etc.) and bookmarks, which pay a commission when the user uses them, if not, no, they are free to delete them, apart from a store with merch, upon insistence. from the users themselves sometime ago they also accept donations, probably also receive commissions from VAG, Mercedes, Polestar and Renault to include Vivaldi Automotive in their vehicles. All without trafficking in user data and without external investors so as not to lose independence, the mistake that Mozillla made when accepting Google as an investor. This is independent of having Google as the default search engine, since Google pays Mozilla and finances them, whether the user searches with Google or not.

    It’s the surveillance policy, selling user data, which is the risk and will destroy the free internet if we don’t avoid it The ethics of a company respect to the user is the most important feature today, something that the big US companies don’t have.

    XTornado,

    Man… Don’t reply if you don’t have an answer no need to put a dump of text.

    southernwolf, in AirDrop cracked by China, revealing phone number & email
    @southernwolf@pawb.social avatar

    While I have little respect for Apple’s overall privacy practices, this sounds a lot like the CCP making something up to scare protesters and dissidents from using AirDrop. There’s no sensible reason they would be advertising such an exploit openly, especially when it could potentially be used to secretly spy on dissidents, protesters, or even used in foreign espionage. Something doesn’t sit right with this.

    BearOfaTime,

    Well if Apple doesn’t fix it, like they haven’t fixed the iMessage flaws) they’ve known about for years, then it’s still useful.

    And most people won’t even know of this issue, and they’d still use Airdrop anyway, saying “I’m not interesting enough to spy on”.

    iMessage lacks forward secrecy, so if I get your RSA key which never changes, I can read all your old messages and any new ones too. And that’s just one issue with iMessage. And people don’t know about it, and still use it, thinking it’s secure. (it’s pretty good in my opinion, just wish Apple would fix the issues linked article).

    possiblylinux127, (edited ) in AirDrop cracked by China, revealing phone number & email

    Probably not a reliable source but you should still use Foss with strong encryption (RSA2048+ ideally)

    Scolding7300,

    For airdrop? There’s a foss airdrop?!

    homesweethomeMrL, in AirDrop cracked by China, revealing phone number & email

    Usually when one of Apple’s security measures is breached, the company would issue an update to patch it. We’d hope this will happen here, but the Chinese government is likely to apply pressure on the iPhone maker to leave the exploit unpatched – at least, on Chinese devices.

    WELL, Apple? ? . . . We’re waiting

    rdri,

    Too busy protecting iOS users from iMessages of unauthorized color.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #