Skip to content

A Health Privacy ‘Check-Up’: How Unfair Modern Business Practices Can Leave You Under-Informed and Your Most Sensitive Data Ripe for Collection and Sale

Technology
1 1 15
  • Microsoft exec admits it 'cannot guarantee' data sovereignty

    Technology technology
    19
    1
    297 Stimmen
    19 Beiträge
    89 Aufrufe
    S
    The cloud is just someone else’s computer.
  • 109 Stimmen
    11 Beiträge
    55 Aufrufe
    th3dogcow@lemmy.worldT
    Reader view on most browsers will bypass articles like this. It worked for me.
  • Spotify X Mod APK

    Technology technology
    1
    2
    1 Stimmen
    1 Beiträge
    18 Aufrufe
    Niemand hat geantwortet
  • When tech hardware becomes paperweights

    Technology technology
    19
    1
    124 Stimmen
    19 Beiträge
    220 Aufrufe
    I
    Stopkilling?
  • 111 Stimmen
    24 Beiträge
    327 Aufrufe
    O
    Ingesting all the artwork you ever created by obtaining it illegally and feeding it into my plagarism remix machine is theft of your work, because I did not pay for it. Separately, keeping a copy of this work so I can do this repeatedly is also stealing your work. The judge ruled the first was okay but the second was not because the first is "transformative", which sadly means to me that the judge despite best efforts does not understand how a weighted matrix of tokens works and that while they may have some prevention steps in place now, early models showed the tech for what it was as it regurgitated text with only minor differences in word choice here and there. Current models have layers on top to try and prevent this user input, but escaping those safeguards is common, and it's also only masking the fact that the entire model is built off of the theft of other's work.
  • 120 Stimmen
    21 Beiträge
    219 Aufrufe
    T
    I thought Trump and Elon had a major falling out? Actually now that I think of it, news about that fizzled out very quickly. Did they silently kiss and make up behind closed doors or something?
  • 808 Stimmen
    152 Beiträge
    1k Aufrufe
    C
    Do you mean investors are trying to manipulate stocks by planting stories? Yeah, I think so. But intelligence agencies have whole training programs on how to manipulate narratives, and a very long track record of doing so. See: Israel's hasbara apparatus, GCHQ leaked documents on infiltrating and derailing socialist discussions, Church Committee Hearings, "The Cultural Cold War" by Frances Stonor Saunders.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    481 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.