This is one of my favorites to share. It’s a 3D engine with raytracing with no VBA scripting - all of the calculations are done internally with spreadsheet math.
And even if the cooperation doesn’t last, it’s an opportunity for the open source developers to work with the product engineers and get direct information from them right now. There’s nothing as valuable as talking to the guy that actually designed the thing, or the guy who can make changes to the product code.
Even if that relationship doesn’t hold long term, the information gathered in the short term will be useful.
If I were part of this project this is what I’d be going for. Push the company to give you direct contact with the relevant engineers, right now while the negative public opinion is fresh and they’re most willing to make concessions, and then get as much out of that contact as you can. Take them at their word, make them actually back it up, take advantage of the offer to cooperate. Sort the rest of it out later.
The whole point of spreading the word about an incident like this is to get public attention on it, and make the company realize that the way they’ve handled things was bad.
A letter like this indicates that they’ve realized they fucked up and they want to do things differently going forward. That doesn’t mean they’re suddenly trustworthy, but it does mean they can be negotiated with.
The correct response is to accept the offer of working together. We want to encourage companies to be cooperative and discourage insular, proprietary behavior. If you slap away the offered hand then you discourage future cooperation, and now you’re the roadblock to developing an open system.
When you start getting the results that you want, don’t respond with further hostility.
I completely agree with your point of view. If you don’t control your technology, then your technology controls you.
You should know that it’s really incredibly difficult to actually establish privacy on internet connected devices. They are designed to share information. Security is often an afterthought and privacy is often directly opposed to the goals of the corporations. It is possible to get a fair amount of privacy, but it is not easy. It will cost a lot of time in learning and configuring things, money to buy specific devices with specific features, and the sacrifice of the convenience that comes with mainstream products (you will have to do a lot more for yourself). There is no quick solution, it is an endless struggle - but personally I think the learning process is extremely rewarding and the skills you gain will be very useful.
So, where to begin? I would recommend learning about the technology that underpins all of the data gathering - computer networking. In order to make real decisions about how to use the technology and how to secure it, you need to understand how it works. You won’t ever know if you are leaking data if you don’t understand how that data is collected and transmitted.
I would like to point you to Professor Messer’s Network+ training course, starting with the OSI model. This will help you learn the terminology of computer networking, and the concepts that underlie everything on the internet. If you get through the Network+ content, do Security+ also.
I also want to recommend the Selfhosted@lemmy.world community. A major goal of self hosting is separating your internet services from corporate control. This community is great place to learn and ask questions.
You should get a cheap computer (old, out of date hardware is completely fine) and install Linux on it so you can start learning how to use it (you’ll need this to get away from Microsoft and Apple, and more importantly to have some control over your computing environment).
You might also be interested in the Murena 2 smartphone. It has physical switches for turning off the microphone and camera and network connections, and it runs /e/os (a de-Googled Android version).
I like this idea because it fits with finding them in coin hoards and it seems practical - a simpler way for a merchant to check the value of coins without a scale and set of precision weights.
DARPA in particular has invested in several projects to try to develop a synthetic blood alternative. There’s no chance anytime soon of reproducing all of the functionality of real blood. The research is mostly targeting something that could be transfused in an emergency that could keep someone alive while they’re transported to a care facility (maintain pressure and distribute some oxygen without inducing toxicity), especially something that would be field-deployable with a longer shelf life, preferably without refrigeration.