Skip to content

An LAPD helicopter claimed to have ID'ed protesters from above and threatened to "come to your house"

Technology
144 76 0
  • 157 Stimmen
    12 Beiträge
    0 Aufrufe
    W
    that's not just useless defeatism, but also false. effective end to end encryption exists in multiple forms today. signal, maybe even with a custom server. matrix if the server is being ran on trusted hardware. XMPP too with the right extensions.
  • 1 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 35 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • New Supermaterial: As Strong As Steel And As Light As Styrofoam

    Technology technology
    21
    1
    60 Stimmen
    21 Beiträge
    2 Aufrufe
    D
    I remember an Arthur Clarke novel where a space ship needs water from the planet below. The easiest thing is to lower cables from space and then lift some ice bergs.
  • 479 Stimmen
    81 Beiträge
    2 Aufrufe
    douglasg14b@lemmy.worldD
    Did I say that it did? No? Then why the rhetorical question for something that I never stated? Now that we're past that, I'm not sure if I think it's okay, but I at least recognize that it's normalized within society. And has been for like 70+ years now. The problem happens with how the data is used, and particularly abused. If you walk into my store, you expect that I am monitoring you. You expect that you are on camera and that your shopping patterns, like all foot traffic, are probably being analyzed and aggregated. What you buy is tracked, at least in aggregate, by default really, that's just volume tracking and prediction. Suffice to say that broad customer behavior analysis has been a thing for a couple generations now, at least. When you go to a website, why would you think that it is not keeping track of where you go and what you click on in the same manner? Now that I've stated that I do want to say that the real problems that we experience come in with how this data is misused out of what it's scope should be. And that we should have strong regulatory agencies forcing compliance of how this data is used and enforcing the right to privacy for people that want it removed.
  • 93 Stimmen
    42 Beiträge
    0 Aufrufe
    G
    You don’t understand. The tracking and spying is the entire point of the maneuver. The ‘children are accessing porn’ thing is just a Trojan horse to justify the spying. I understand what are you saying, I simply don't consider to check if a law is applied as a Trojan horse in itself. I would agree if the EU had said to these sites "give us all the the access log, a list of your subscriber, every data you gather and a list of every IP it ever connected to your site", and even this way does not imply that with only the IP you could know who the user is without even asking the telecom company for help. So, is it a Trojan horse ? Maybe, it heavily depend on how the EU want to do it. If they just ask "show me how you try to avoid that a minor access your material", which normally is the fist step, I don't see how it could be a Trojan horse. It could become, I agree on that. As you pointed out, it’s already illegal for them to access it, and parents are legally required to prevent their children from accessing it. No, parents are not legally required to prevent it. The seller (or provider) is legally required. It is a subtle but important difference. But you don’t lock down the entire population, or institute pre-crime surveillance policies, just because some parents are not going to follow the law. True. You simply impose laws that make mandatories for the provider to check if he can sell/serve something to someone. I mean asking that the cashier of mall check if I am an adult when I buy a bottle of wine is no different than asking to Pornhub to check if the viewer is an adult. I agree that in one case is really simple and in the other is really hard (and it is becoming harder by the day). You then charge the guilty parents after the offense. Ok, it would work, but then how do you caught the offendind parents if not checking what everyone do ? Is it not simpler to try to prevent it instead ?
  • A Presence-sensing Drive For Securely Storing Secrets

    Technology technology
    9
    1
    18 Stimmen
    9 Beiträge
    2 Aufrufe
    D
    Isn't that arguably the nature of encryption, though? If you lose the key, you're SOL by design.
  • Data Bill: First They Came for Trans People

    Technology technology
    1
    1
    35 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet