So hear me out. What if we took $6.9M out of the CEO bonus and dropped the Mozilla AI project?
Maybe that would be enough to hire a maintainer or two for Firefox iOS port?
Maybe that could work?
I don’t know, just an idea. Crazy.
Nearly 10k and 400 stars on those respective repos.
A way to run a large language model on any operating system, in any OS, in a simple, local, and privacy respecting manner?
For linux we have docker, but Windows users were starving for a good way to do this, and even on linux, removing the step of configuring docker (or other container runtimes) to work with nvidia, is nice.
And it’s still FOSS stuff they aren’t being paid for, currently. But there are plenty of ways to monetize this.
Here’s an easy one: tie in the the vpn service they have to allow you to access the web ui of the computer running the llamafile remotely. Configure something like end to end encryption or or nat traversal (so not even mozilla can sniff the traffic), and you end up with a private LLM you can access remotely.
With this, maybe they can afford some actual development on firefox, without having to rely on google money.
A lot of money, but not enough to actually to actually do a lot. They keep cutting features their “customers” like. Why?
Because development is expensive.
Google props mozilla up to pretend they don’t have a monopoly on the internet. Just enough money to barely keep up, not enough to truly stay competitive.
Mozilla wants to not rely on google money, so they are trying to expand their products. AI is overhyped, but still useful, and something worth investing in.
I know that, but why did you bring it up in order to contrast it with Mozilla’s consumer base? Do you mean to say that Google is the actual paying customer?
It seems like such a bizarre thing to bring up at all.
But she explains why that is different in the video.
The idea is the hotspot is an entirely separate device, that just provides Internet access/VPN access. Your not logging in to your VoIP provider or your messaging applications using that hotspot. You can also purchase the device and service anonymously making it much harder to connect to your identity to the hotspot.
This separates the baseband processor from our sensitive data that is stored on our phone. This also forces your phone to actually use the VPN. (There has been reports that Apple and Google bypass the VPN in some cases if you use a VPN on your phone.)
Yeah tried it like a month ago and it was too buggy for me as well. Safari on iOS does already support ad blockers though they’re not as good as ublock origin most likely.
Cool! Are you talking about something like pi-hole or something else? In what way is it going to lead to better outcomes? I already have a pretty much flawless experience with my adblockers (especially when it comes to easily creating custom rules, using the element zapper, and testing new blocklists).
I find that my suite of browser extensions serves me really well, and it keeps working even when I enable my VPN, but something like pi-hole stops working if you do that.
How does the solution you’re talking about differ? How does it provide a better experience?
It’s the other way around. DNS based filters are more efficient since connection attempt is simply dropped, but browser based adblocks are a lot more feature rich allowing blocking specific HTML elements not just domains. Additional CPU power to have such extension is miniscule compared to what you gain.
Honestly, Mozilla doesn’t even have the resources to maintain a proper WebKit-based version of Firefox on iPadOS, when a large amount of the work is handled for them by Apple. (See, for example, the fact that it still does not support multiple windows, a feature that has been available since 2019.) It would seem a mistake for them to try taking on a much larger load of work when they can’t handle what they’ve already taken on.
he wrote “On my way to blow up the plane (I’m a member of the Taliban).” in a private group chat on snap chat
…a private group chat. Nothing stupid like posting it on xitter or other public place.
Its a fucking in-joke. Do I need to worry about what I say to my friends now in private and worry about what my friendly local government spy would think about it… ?
All this invasion of privacy all these years and all they have to show for it are a few false positives.
All the airport wifi could do is see the DNS requests (and the modern trend is to have DoH or DoT enabled by default, for example in the up to date versions of Android)
A court in Madrid heard it was assumed the message triggered alarm bells after being picked up via Gatwick’s Wi-Fi network.
Public wifi without a VPN is like sex without a condom. The connection may not be encrypted (very risky) and even if it is, you are still susceptible to man-in-the-middle attacks: garlandtechnology.com/…/how-to-monitor-encrypted-…
I guarantee there will be a flood of articles about this over the next few days because of what I quoted above.
It’s also possible that one of his “friends” reported him or something like that.
“A key question in the case was how the message got out, considering Snapchat is an encrypted app.
One theory, raised in the trial, was that it could have been intercepted via Gatwick’s Wi-Fi network. But a spokesperson for the airport told BBC News that its network “does not have that capability”.
In the judge’s resolution, cited by the Europa Press news agency, it was said that the message, “for unknown reasons, was captured by the security mechanisms of England when the plane was flying over French airspace”.”
Please explain to me how using Public WiFi is unsafe if the traffic is encrypted with TLS. Unless they somehow installed a keylogger on everyone connected to said Wifi and picked it up from there, the only way this was possible was on some quick text analysis and recognising the IP address from Snapchat
On its website, in a section titled “How We Work with Law Enforcement Authorities”, Snapchat says one of its goals is to “maintain a safe and fun environment where Snapchatters are free to express themselves and stay in touch with their real friends”.
It adds: "We also work to proactively escalate to law enforcement any content appearing to involve imminent threats to life, such as school shooting threats, bomb threats and missing persons cases, and respond to law enforcement’s emergency requests for disclosure of data when law enforcement is handling a case involving an imminent threat to life.
Yes, especially in the UK, since they’re a surveillance state.
There are some things that will always get flagged on any platform. This, drugs, and connections to sanctioned countries, for example. I’ve heard of people in the US having their Venmo accounts suspended because they put “Havana” in the transaction description. Havana is a local dance club.
I’ve tried all the other popular apps, and keep coming back to Connect.
The main features that pull me back are profile-specific settings so I can set up different accounts without having to reconfigure everything every time I switch instances, and the ability to customize post card quick actions, specifically the Mark As Read quick button combined with the persistent Hide All Read toggle. It’s just so convenient, I keep coming back even though it deletes my account info every time it logs me out.
It’s just an NTP pool. The device is trying to update it’s time. Likely it made many other requests to other servers when this one didn’t work.
Maintaining up to date lists of anything is a game of whack a mole, so you’re always going to get weird results.
If you’re actually unsure, pcap the traffic on your pfsense box and see for yourself. NTP is an unencrypted protocol, so tshark or Wireshark will have no problem telling you all about it.
That said, I’d still agree with the other poster about local integration with home assistant and just block that sucker from the Internet.
Agreed. To add to this because the traffic is being blocked it keeps retrying so it’s inflating the traffic size. I have about 14 tplink WiFi switches on a vlan and my pfsense rule for NTP is less than 6 megabytes. OP is conflating legitimate NTP traffic with Tor.
As a European company, it is obliged to comply with existing privacy laws (GDPR) in order to operate. The necessary income is obtained through the Ghostery Enterprise. Similar to what Proton does, although Proton is OpenSource, they require revenue for the servers for the mail service and the VPN, but they offer these for free without ads or tracking in a reduced form, in mail with the storage limit and the VPN with a reduced number of servers (21 in 3 countries), financed with premium accounts.
There are many methods of creating income on the Internet and they are normally US companies that use the method of surveillance advertising, trafficking in user data, these practices are not used in the EU due to existing privacy regulations and even large corporations have to take care of them. An example is comparing Microsoft’s privacy in the US and the EU (where it is not perfect either but light years better)
The best, at least better than selling userdata. Proto use it since a long time ago, all its products are OpenSource, frr versions paid by the Premium accounts with more features, apart of the basics, mre gigas in the mail and clous and more servers for the VPN. With this they can offer an decent free service without ads.
Your computer, your IP address, your message to a destination gets encrypted in a couple layers and passed on.
Your ISP knows exactly who you are and that you’re reaching out to server 1. They can’t see your data but to them, you’re using a VPN probably.
The first server also necessarily knows who you are, unpacks one layer of your request and sends it on to a second server (in Invisiv’s case, Fastly; in Apple’s, Cloudflare).
The second server now knows that data was requested from the first server, and it can see the name of the domain you’re requesting (YouTube, for example) but because the request came from the first server, it theoretically won’t know it’s you making that request
The data moves on from the second server to the destination, with the destination only knowing it’s receiving data from the second server, and not knowing about the first server.
The obvious issues here:
Do you trust the people providing the multi-hop VPN-like service?
Do you trust the two servers, which have necessarily entered into an agreement of some sort, to not collaborate regarding transmitting data?
How easy is it to audit the code we can see?
What else is going on with your data?
In the case of Apple/Cloudflare, reputation is rather poor. From PRISM to false advertising to notification telemetry, Apple hasn’t exactly delivered on their promise. In terms of Invisiv, the company has some big names on board but Fastly and Cloudflare both have a rather significant grip on the internet (with Cloudflare’s being bigger) but any CDN gets a good view into personal data most of the time.
Update: in the case of Cloudflare/Apple, Apple adds additional location data to your request, making its “private” relay leak approximate location data the same way your IP address could leak it. To wit:
Apple relays geolocate user IP addresses and translate them into a “geohash”. Geohashes are compact representations of latitude and longitude.
But on the bright side: a VPN has far more issues than either of these, as it’s basically #4 above except the same service also has your identity by necessity. An untrustworthy VPN is as harmful as an untrustworthy ISP, with very little separating them.
A bit less private because things are going through one fewer hop, in addition to having to sign up. In my experience with Invisiv, it’s much faster and more reliable than Tor, but slower and much less stable than a traditional VPN.
It would be cool if more commercial VPN companies adopted this kind of tech.
They rent their servers, so it depends on what you consider as running the server. They have virtual access to it, but they don’t own the hardware. At least, that’s the case for countries I checked, maybe they have their own servers somewhere too.
My main concern is that cloudflare knows what content it is serving and it is certainly fingerprinting your browser. So regardless of how you request the data, cloudflare knows.
After reading their documentation a little closer, I discovered something else unsavory about Private Relay: it “relays” your approximate location, as it could usually be derived from your IP address.
Hate to break it to you but all the major CDN providers do the exact same things. My employer runs multiple websites mainly for US and European users. We use Akamai for both CDN and WAF services. For any CDN and/or WAF to operate properly it needs access to unencrypted content. Part of Akamais WAF tools includes what they call Bot Manager, which can identify traffic coming from over 1000 known bots and can also classify unknown ones. Part of how it works is by browser fingerprinting as well as TLS session fingerprinting and other proprietary fingerprinting.
So any time you visit a large website you’re likely being fingerprinted and otherwise analyzed by the CDN and security tools used by those sites.
Hetzner may have the thing for you. IIRC their VPS options don’t have that much storage, but their storage plans are super cheap and easily connect to the VPS.
For those posting suggestions, do the providers also require KYC at some point?
I know for a fact that Vultr, Digitalocean, and Namecheap (and a few others people have mentioned to me before) will need your identity at time of purchase.
I can understand why verifying a customer’s identity is important to these providers, but at the same time, I’m mostly worried that they will be the victims of some data breach in the future.
I’m guessing they want to cover their butt in case their server is used for something illicit. But even in searching for something as locked down as, say, a Minecraft server, I ran into the same issue.
It’s strange, because generally you can use a fake identity and a masked card to purchase… just about anything, really.
Please don’t tell me you wear adidas (founded by a Nazi), or drive a Ford (made by an antisemite), or listen to Wagner, (a racist), or drive a Volkswagen, or play Minecraft, or use wix, or eat at Chick-fil-A, or…etc etc
He wasn’t fired. He voluntarily left. And thus Mozilla is left with an incompetent CEO whose only aim is to increase her paycheck year after year, despite pathetic market share results for FF. Enjoy that.
That said, nobody cares about your “friendly remainders”. We’re talking about software here, not politics.
And, to stay on topic, yes, it happened to me that Strict FP broke some website, in particular those displaying a frame with a map or similar stuff. So I’ve resorted to use “standard” FP myself.
I’m not a shill for Brave. It has its fair share of technical issues but it’s the less worse browser for my use case (better than FF, anyway). Your (or mine) opinion on the CEO has nothing to do with the technical issue discussed in OP’s link.
And no, what MAGA are you talking about? I’m not even 'murican. Take your meds, dude.
Yawn… I’m tired of this shit. You people are really ridiculous. I’m going to just block you. Enjoy your cognitive dissonance and your virtue signaling.
Technology and ethics and politics are not airgapped magically distinct things. Pretending that they are is a strategic political choice you are actively making.
Ok. I’m a bad person because I enjoy using a given browser. I get that.
This is a straw man argument; no one said you’re a bad person for using a certain browser.
nobody cares about your “friendly remainders”. We’re talking about software here, not politics.
This is what they are criticising you about. You could be using Edge or Chrome, it wouldn’t matter here, that wouldn’t make you a bad person. The point is that pretending there is no connection when there is clearly a huge relevance here is massive.
Repeating yourself there buddy? Should probably get your head checked. Maybe if you stopped licking cop boot that would give you time to take some meds.
privacy
Active
This magazine is from a federated server and may be incomplete. Browse more on the original instance.