privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

SnotFlickerman, in Plex Discover Together shares a bit too much. ...
@SnotFlickerman@lemmy.blahaj.zone avatar

This isn’t an entirely “new” feature, in a way.

You always had access to see what your friends were watching on your own server. This is a consequences of being an admin, you kind of have to have access to that kind of data to manage your system and streams.

This seems to just extend it to showing you what they’re watching on other servers, as well.

Anyway, if the concern is that Plex, the company, has access to this data, then yeah, you probably should have read the privacy policy a little closer.

Jellyfin is there and doesn’t have a parent company to “phone home” data to.

frozen,
@frozen@lemmy.frozeninferno.xyz avatar

It’s unfortunate that Jellyfin is just slightly worse than Plex at pretty much everything. Playback is smooth, sure, but set up is harder, getting good metadata is harder, logging in is harder, etc.

The metadata one really put me off. I set up a Jellyfin instance with the exact same media set as my Plex instance, and it immediately started “recognizing” standard movies and shows as porn and hentai. I’m still going to push through and get it properly set up eventually, but even so, I’m not looking forward to manually managing accounts when people can just SSO with Plex.

RGB3x3,

it immediately started “recognizing” standard movies and shows as porn and hentai.

Jellyfin just knows its users and knows what they want.

cheese_greater,

I wonder if the Romans or any ancient people used jellyfish(es) for alternative purposes…They used sponges to wipe themselves, communally

averyminya,

I’ve had similar issues/experiences with Jellyfin as well.

Sightline,

Metadata has been far better in JF than Plex.

frozen,
@frozen@lemmy.frozeninferno.xyz avatar

I mean, I have a ton of media that Plex recognizes automatically and Jellyfin doesn’t, so… Agree to disagree, I guess. I’m not trying to defend Plex’s recent enshittification, but that doesn’t change the fact that it’s generally a better experience than Jellyfin right now.

_number8_,

Anyway, if the concern is that Plex, the company, has access to this data, then yeah, you probably should have read the privacy policy a little closer.

come on, you know this is a non answer. also plex shouldn’t have this data, it should be for the admin only.

PeachMan,
@PeachMan@lemmy.world avatar

What? Plex is not one of those open source, self-hosted, privacy-centric services. Plex can do whatever the hell Plex wants with your watch history, because you agreed to their broad terms of service that said exactly that when you signed up. You chose to run your traffic and authentication through Plex servers because it’s convenient, not for privacy reasons.

If you don’t like it, use Jellyfin. I’m personally looking into moving, as Plex seems to be getting slowly shittier.

_number8_,

why are you defending them? sure, they’re allowed because they’re a big company so they make the rules, but that doesn’t mean you have to lick their boots and say oh actually that’s fine you made the choice. even big companies SHOULD be ethical. we DESERVE ethical treatment, furthermore, even people who didn’t wade through the terms.

PeachMan,
@PeachMan@lemmy.world avatar

I don’t know how you could read that and think I’m defending them.

I’m just telling you how the world works. If you want real privacy, you need to PAY somebody with a rock-solid privacy agreement or fully host it yourself. Plex is neither of those things. Remember, if something that costs money to run is free, then YOU are the product.

gregorum,

They say they use it to sync up your watch history to your account so it can sync across devices, but I wouldn’t be surprised if they were selling your watch telemetry to advertisers as well.

Contend6248,

At that point i would be surprised if they didn’t

SnotFlickerman,
@SnotFlickerman@lemmy.blahaj.zone avatar

It’s a non-answer that their privacy policy explicitly states that they will collect this type of information and that they stipulate what kind parties they can share that info with?

www.plex.tv/about/privacy-legal/

That’s the straightest answer that you’re going to get. Privacy policies like this are bullshit, but they’re also the norm so acting like it’s a non-answer after 20 years of this being the norm seems a little… naive, perhaps?

ErKaf, in Signal leaked random contacts to me!

I just counted. Signal leaked 56 random people to me.

aaaa, in Why Bluesky over sth like Activitypub?

ActivityPub has nothing to do with privacy. It’s explicitly about publicly sharing everything you share

FiskFisk33, (edited ) in British man Aditya Verma appears in Spanish court over plane-bomb hoax

he wrote “On my way to blow up the plane (I’m a member of the Taliban).” in a private group chat on snap chat

…a private group chat. Nothing stupid like posting it on xitter or other public place.

Its a fucking in-joke. Do I need to worry about what I say to my friends now in private and worry about what my friendly local government spy would think about it… ?

All this invasion of privacy all these years and all they have to show for it are a few false positives.

JohnnyCanuck,

In general I agree, but there’s no privacy on airport Wi-Fi. And very little at an airport in general.

Deckweiss, (edited )

Shouldn’t it be all encrypted with SSL?

All the airport wifi could do is see the DNS requests (and the modern trend is to have DoH or DoT enabled by default, for example in the up to date versions of Android)

sir_reginald,
@sir_reginald@lemmy.world avatar

it’s probably some sort of Snapchat automatic alert detecting the words bomb or Taliban.

JohnnyCanuck,

From the article:

A court in Madrid heard it was assumed the message triggered alarm bells after being picked up via Gatwick’s Wi-Fi network.

Public wifi without a VPN is like sex without a condom. The connection may not be encrypted (very risky) and even if it is, you are still susceptible to man-in-the-middle attacks: garlandtechnology.com/…/how-to-monitor-encrypted-…

I guarantee there will be a flood of articles about this over the next few days because of what I quoted above.

It’s also possible that one of his “friends” reported him or something like that.

CrypticCoffee,

“A key question in the case was how the message got out, considering Snapchat is an encrypted app.

One theory, raised in the trial, was that it could have been intercepted via Gatwick’s Wi-Fi network. But a spokesperson for the airport told BBC News that its network “does not have that capability”.

In the judge’s resolution, cited by the Europa Press news agency, it was said that the message, “for unknown reasons, was captured by the security mechanisms of England when the plane was flying over French airspace”.”

www.bbc.co.uk/news/world-europe-68099669

MigratingtoLemmy,

Please explain to me how using Public WiFi is unsafe if the traffic is encrypted with TLS. Unless they somehow installed a keylogger on everyone connected to said Wifi and picked it up from there, the only way this was possible was on some quick text analysis and recognising the IP address from Snapchat

JohnnyCanuck,

The link I provided explains it. They can decrypt traffic through their own devices.

FiskFisk33,

All this invasion of privacy all these years and all they have to show for it are a few false positives.

I wouldn’t expect my data to be secure, but I would expect to not be prosecuted for an in-joke

FiskFisk33,

I wouldn’t expect my data to be secure, but I wouldn’t expect to be prosecuted as if I had willfully made it a public statement.

grayman,

Snapchat gave the info to police. From BBC:

On its website, in a section titled “How We Work with Law Enforcement Authorities”, Snapchat says one of its goals is to “maintain a safe and fun environment where Snapchatters are free to express themselves and stay in touch with their real friends”.

It adds: "We also work to proactively escalate to law enforcement any content appearing to involve imminent threats to life, such as school shooting threats, bomb threats and missing persons cases, and respond to law enforcement’s emergency requests for disclosure of data when law enforcement is handling a case involving an imminent threat to life.

mariusafa,
FiskFisk33,

The spying is not what suprises me, it’s the prosecution. I see why the term matched, I just don’t see why it would be illegal.

possiblylinux127, (edited )

Honestly I hope that this trial is swift and that the government ends up paying him for lost time and money.

On the other hand this is a really good reason to use encrypted communications

Zoop,

He was acquitted, thankfully.

Gooey0210,

And then you see the recent news about some presumably terrorists having “tails” and “signal” as evidence in their case

SheeEttin,

Yes, especially in the UK, since they’re a surveillance state.

There are some things that will always get flagged on any platform. This, drugs, and connections to sanctioned countries, for example. I’ve heard of people in the US having their Venmo accounts suspended because they put “Havana” in the transaction description. Havana is a local dance club.

gerryflap, in Google Researchers’ Attack Prompts ChatGPT to Reveal Its Training Data
@gerryflap@feddit.nl avatar

Obviously this is a privacy community, and this ain’t great in that regard, but as someone who’s interested in AI this is absolutely fascinating. I’m now starting to wonder whether the model could theoretically encode the entire dataset in its weights. Surely some compression and generalization is taking place, otherwise it couldn’t generate all the amazing responses it does give to novel inputs, but apparently it can also just recite long chunks of the dataset. And also why would these specific inputs trigger such a response. Maybe there are issues in the training data (or process) that cause it to do this. Or maybe this is just a fundamental flaw of the model architecture? And maybe it’s even an expected thing. After all, we as humans also have the ability to recite pieces of “training data” if we seem them interesting enough.

Cheers,

They mentioned this was patched in chatgpt but also exists in llama. Since llama 1 is open source and still widely available, I’d bet someone could do the research to back into the weights.

Socsa,

Yup, with 50B parameters or whatever it is these days there is a lot of room for encoding latent linguistic space where it starts to just look like attention-based compression. Which is itself an incredibly fascinating premise. Universal Approximation Theorem, via dynamic, contextual manifold quantization. Absolutely bonkers, but it also feels so obvious.

In a way it makes perfect sense. Human cognition is clearly doing more than just storing and recalling information. “Memory” is imperfect, as if it is sampling some latent space, and then reconstructing some approximate perception. LLMs genuinely seem to be doing something similar.

j4k3,
@j4k3@lemmy.world avatar

I bet these are instances of over training where the data has been input too many times and the phrases stick.

Models can do some really obscure behavior after overtraining. Like I have one model that has been heavily trained on some roleplaying scenarios that will full on convince the user there is an entire hidden system context with amazing persistence of bot names and story line props. It can totally override system context in very unusual ways too.

I’ve seen models that almost always error into The Great Gatsby too.

TheHobbyist,

This is not the case in language models. While computer vision models train over multiple epochs, sometimes in the hundreds or so (an epoch being one pass over all training samples), a language model is often trained on just one epoch, or in some instances up to 2-5 epochs. Seeing so many tokens so few times is quite impressive actually. Language models are great learners and some studies show that language models are in fact compression algorithms which are scaled to the extreme so in that regard it might not be that impressive after all.

j4k3, (edited )
@j4k3@lemmy.world avatar

How many times do you think the same data appears after a model has as many datasets as OpenAI is using now? Even unintentionally, there will be some inevitable overlap. I expect something like data related to OpenAI researchers to reoccur many times. If nothing else, overlap in redundancy found in foreign languages could cause overtraining. Most data is likely machine curated at best.

Pantherina, in A question about secure chats

No Telegram lol. Thats way worse. Whatsapp sais they are E2EE but its all “trust me bro” because you cannot look at the code.

With Telegram its a little pain to open encrypted chats and groups are always unencrypted. So its useless.

Let them try Signal, its nearly identical but you can trust it.

Kultronx,
@Kultronx@lemmygrad.ml avatar

Iunno if I would say that Signal can be trusted considering their ties to the US State Dept

rmuk,

The beauty of using Signal with an open-source Signal client is that you don’t need to trust them, which is kind of the point.

Saff, in New Outlook update sends passwords and mails on private servers to MS. Ulrich Kelber, TheCommissioner for Data Protection of Germany plans to submit inquires on Tuesday

Honestly the thing that annoys me the most about this isn’t the privacy aspect. It’s the fact that they called it “new outlook”. Which means now at work I have to explain that no, this isn’t real outlook it’s just MS being useless wankers and not being able to come up with a new name for a new product. See also, teams vs teams for work and school. They did the same thing with Skype and Skype for business back in the day and still pisses me off.

Pyr_Pressure,

I fucking hate Microsoft so goddamn much for their bullshit naming process.

I also hate everyone for the stupid process of separating work and personal accounts. It’s caused me nothing but grief.

Catsrules, in Cops Used DNA to Predict a Suspect’s Face—and Tried to Run Facial Recognition on It

Didn’t facial recognition get some poor guy arrested and raped in prison and he was completely innocent of everything?

ignotum,

Considering how common rape is in American prisons and how often innocent people are getting locked up, that does not sound unlikely

Darken,
@Darken@reddthat.com avatar

I know some people who are banned for life for such “haha sry my bad” gov stunts

Badeendje, in Why you shouldn't use a SIM card and use an hotspot as an alternative
@Badeendje@lemmy.world avatar

I’m not going to watch a video on some premise that is disconnected from any practical use in everyday life.

fl42v,

That depends, tho. I personally don’t make much phone calls so it would work just fine… If I lived in USA, that is.

Also, that depends on the phone: one of the main concerns of the video is that gapps can bypass the vpn… And, well, I have no gapps 🤷

BearOfaTime,

GApps definitely bypass VPN, I’ve seen it on a phone I can’t root.

Pretty interesting to see first hand.

And, of course they can, they’re system apps.

Engywuck,

This

TexMexBazooka,

This is such a weird thing I’ve noticed on this community. There was a guy not too long ago that would make new accounts like daily so he wasn’t posting under the same username and it’s like… why?

I get you want privacy, but there’s a line where it just stops making sense, and your personal info isn’t that valuable. Anyway

ExtremeDullard, (edited )
@ExtremeDullard@lemmy.sdf.org avatar

I get you want privacy, but there’s a line where it just stops making sense, and your personal info isn’t that valuable. Anyway

Actually, you don’t need perfect privacy. You just need good enough privacy, and here’s why:

If you’re a low-value target - i.e. a random internet user, that’s you and me - always remember that your value is low: Google, Microsoft, Amazon, Facebook… expend a certain amount of resources to fish for enough of your data to earn them a return on their investment. We’re low-value targets, so they first and foremost go for the low hanging fruits: the people who don’t know, don’t care, wallow in social media without any restraint and make it particularly easy to gather data from.

All you have to do is make it hard enough and expensive enough for the corporate surveillance collective to lose money on you: create accounts full of fake data and don’t post personal information - or make up fake personal information in your posts - to poison their wells. Don’t post photos of you or your family. Use throwaway email addresses. Use a deGoogled phone. Don’t browse without an ad blocker set on reasonably high. Use a browser with anti-fingerprinting. Don’t fill out Costco membership cards. Pay with cash stuff that you don’t want anybody to know about. Etc etc.

In other words, adopt a reasonable-enough privacy hygiene so that you’re not part of the low hanging fruits. It doesn’t have to be drastic, just good enough to make you not worth the sonsabitches’ time and effort.

If you’re a high-value target however, a Snowden or an Assange, that’s a different proposition. But for the rest of us, private enough is good enough.

SnotFlickerman, in This is how I KNOW it works as intended
@SnotFlickerman@lemmy.blahaj.zone avatar

Welcome to the Corporate Internet.

Get ready to play by Their Rules on Their Services.

Good thing a lot of them are useless fucking Dinosaurs like CNN that need to die anyway.

anarchy79,
@anarchy79@lemmy.world avatar

Not today.

Not.

Today.

astraeus,
@astraeus@programming.dev avatar

That’s why places like Lemmy and Mastodon are nice, even if big corpo buys up some instances, there’s still the option to just start free ones elsewhere.

ArbiterXero, in How bad is Idea of .Zip as password manager?

In many unzip utilities, they use temp files that you wouldn’t be paying attention to. These temp files will contain your credentials and you won’t know where they are or if they got deleted.

mp3, (edited )
@mp3@lemmy.ca avatar

And even if they’re deleted by the archive program, it’s likely a normal deletion, and not a secure delete where the original data is overwritten with random data before deleting the entry in the file system, which could be potentially recovered.

ArbiterXero,

Also an excellent point

LemmyIsFantastic, (edited ) in Are Phones and Smart Speakers Listening to You? Cox Media Group Claims They Can | Cord Cutters News

And yet thousands of security researchers can’t find a shed of evidence. This shit is tiresome and counter productive. The general public is weary of hearing this made up bullshit.

The technical practice isn’t hard. That’s the claim. The reality is nobody is buying shit doing this and this is just another repost from the same 404 article months ago.

JSens1998,

Bro, I’ll literally be having a conversation with someone about a topic, and all of the sudden Google starts recommending me products related to the discussion afterwards. Smart phones and smart speakers without a doubt listen in on our conversations. There’s the evidence.

LemmyIsFantastic, (edited )

Find a literal shred of evidence. You have no clue how ads work bruh.

library_napper, (edited )
@library_napper@monyet.cc avatar

Eh, surprised that’s happening to someone in this community. Strip Google off your phone and throw out any hardware with a microphone that doesn’t run open source software and this will stop happening.

elbarto777,

That’s not evidence. That’s some random anecdote. Back it up or gtfo.

KpntAutismus, in My "Smart"TV keeps connecting to Netflix, and i don't even have Netflix

do. not. connect. your. TV. to. the. internet.

i would recommend using an SBC as a video input device (single board computer) and using whatever service through that. (ideally under linux)

Kir,

Why, exactly? Honest question

retrolasered,
@retrolasered@lemmy.zip avatar

Maybe overkill, but I had an unused dell optiplex usff, KDE plasma with connect, and chromium web apps for the streaming 🏴‍☠️ services I use

Veraxus, in Gitlab now requires phone number/credit card verification
@Veraxus@kbin.social avatar

I really, really like Gitlab... but this is a MAJOR problem and spectacularly short-sighted.

wintermute, in Gitlab now requires phone number/credit card verification

Glad I switched to Forgejo some time ago, never looked back : )

nakal,
@nakal@kbin.social avatar

It looks like Gitea. Is it a fork?

poVoq,
@poVoq@slrpnk.net avatar

Softfork. Basically the version that runs on Codeberg.org

PropaGandalf, (edited )

And soon with ActivityPub integration? Pls?

poVoq,
@poVoq@slrpnk.net avatar

Work in progress, but it’s taking longer than I expected.

intrepid,

The forgefed spec itself is a work-in-progress. Not yet ready for a proper implementation.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 20975616 bytes) in /var/www/kbin/kbin/vendor/symfony/http-kernel/Profiler/FileProfilerStorage.php on line 171

    Fatal error: Allowed memory size of 134217728 bytes exhausted (tried to allocate 10502144 bytes) in /var/www/kbin/kbin/vendor/symfony/error-handler/Resources/views/logs.html.php on line 38