Skip to content

ICEBlock climbs to the top of the App Store charts after officials slam it

Technology
99 59 1
  • 35 Stimmen
    5 Beiträge
    0 Aufrufe
    M
    At the company I work for we had one best korean for two weeks before he got suspended. From what I understand the providers of corpo spyware that they put on your laptop enables them to detect patterns that are common in setups like that.
  • We caught 4 states sharing personal health data with Big Tech

    Technology technology
    12
    1
    327 Stimmen
    12 Beiträge
    33 Aufrufe
    M
    Can these types of post include countries in the title? This USA defaultism makes the experience worse for everyone else with no benefit whatsoever
  • 100 Stimmen
    60 Beiträge
    62 Aufrufe
    jimmydoreisalefty@lemmy.worldJ
    We all get emotional on certain topics; it is understandable. All is well, peace.
  • 429 Stimmen
    102 Beiträge
    36 Aufrufe
    D
    That is bullshit, the economy is created to force you into the labor market. This is just a symptom of capitalism.
  • 479 Stimmen
    81 Beiträge
    67 Aufrufe
    douglasg14b@lemmy.worldD
    Did I say that it did? No? Then why the rhetorical question for something that I never stated? Now that we're past that, I'm not sure if I think it's okay, but I at least recognize that it's normalized within society. And has been for like 70+ years now. The problem happens with how the data is used, and particularly abused. If you walk into my store, you expect that I am monitoring you. You expect that you are on camera and that your shopping patterns, like all foot traffic, are probably being analyzed and aggregated. What you buy is tracked, at least in aggregate, by default really, that's just volume tracking and prediction. Suffice to say that broad customer behavior analysis has been a thing for a couple generations now, at least. When you go to a website, why would you think that it is not keeping track of where you go and what you click on in the same manner? Now that I've stated that I do want to say that the real problems that we experience come in with how this data is misused out of what it's scope should be. And that we should have strong regulatory agencies forcing compliance of how this data is used and enforcing the right to privacy for people that want it removed.
  • 229 Stimmen
    10 Beiträge
    22 Aufrufe
    Z
    I'm having a hard time believing the EU cant afford a $5 wrench for decryption
  • 143 Stimmen
    30 Beiträge
    59 Aufrufe
    johnedwa@sopuli.xyzJ
    You do not need to ask for consent to use functional cookies, only for ones that are used for tracking, which is why you'll still have some cookies left afterwards and why properly coded sites don't break from the rejection. Most websites could strip out all of the 3rd party spyware and by doing so get rid of the popup entirely. They'll never do it because money, obviously, and sometimes instead cripple their site to blackmail you into accepting them.
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    20 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry