Printers leave a watermark on each page indicating the exact printer that it came from. Are there any other examples of these privacy violations that aren't common knowledge?
One thing I'm concerned about is recording equipment leaving identifiable information without us knowing about it.
like this
nimpnin
in reply to thepompe • • •user_found
in reply to nimpnin • • •null_dot
in reply to user_found • • •like this
TVA likes this.
Klear
in reply to null_dot • • •sqgl
in reply to Klear • • •e8d79
in reply to user_found • • •Banks can track each banknotes serial number when you receive them from the ATM and when they are returned from the store you spent them at. This data could then be used to create a complete profile of your spending habits.
heise.de/en/news/Bill-tracking…
Bill tracking: Increasing cash tracking worries data protectionists
Stefan Krempl (heise online)like this
TVA likes this.
Peppycito
in reply to e8d79 • • •e8d79
in reply to Peppycito • • •like this
TVA likes this.
SchmidtGenetics
in reply to e8d79 • • •That’s completely made up. Most bills are given out to other customers once used in a store, the amount of bills that are used once and returned to the bank would be well under 5%.
Fantastic fabricated story though. Money laundering which has been done for decades would defeat this, it’s a scary story to share that has zero basis on reality.
e8d79
in reply to SchmidtGenetics • • •Bargeld-Tracking: Du hast Überwachungsinstrumente im Portemonnaie
netzpolitik.orgSchmidtGenetics
in reply to e8d79 • • •Without some type of visual confirmation, it’s all noise.
On my way home from work, I grab $600 from the atm, $300 for my wife’s tattoo, $200 for me, and $100 for wife spending money.
After the appt the tattoos artists wife takes $200 and flys across country that night. I spend my $200 at the peelers, all those go to a dozen different girls and servers. My wife the next day goes shopping at an outlet mall and spends her $100 at 4 stores. The tattoo artist spends his $100 on beer.
We live on the same block and I pulled the money out across town. Who’s is the original takers purchases….?
It’s 95% noise, it’s useless unless you’re an investigator and have boots on the ground.
Again, it’s a fun story to share around the campfire though. Is it possible, yes, can it be done in actual practice, absolutely not. Not without some other information.
e8d79
in reply to SchmidtGenetics • • •SchmidtGenetics
in reply to e8d79 • • •I ONLY give other people cash, all my other purchases are debit/credit. Like MOST people and stores since Covid
The only time this works, is if it’s targeted, and that means an investigator is doing it. An automated system wouldn’t know what to do with any of the data. You’re severely overestimating how much people spend cash around them, that’s usually when it’s plastic. People use cash in “sketchier” places.
Again, zero basis on reality, it gets “destroyed” at every step without some manual intervention.
Arthur Besse
in reply to SchmidtGenetics • • •If you always use card payments whenever it's possible, it obviously isn't necessary to analyze your cash transactions to learn where you are because you are already disclosing it 😀
There are close to 2 billion unbanked people in the world. In the US, it's less than 6% nationally, but over 10% in some states.
Many people who are not unbanked also often avoid electronic payments for privacy/security and other reasons.
The cash serial number tracking being described in this thread is useful for locating the neighborhoods frequented by someone who (a) avoids using electronic payments, and (b) maybe obtains cash from an ATM (or perhaps check-cashing service, in the case of an unbanked person) in places other than the neighborhoods they live in or frequent.
SchmidtGenetics
in reply to Arthur Besse • • •……
If they don’t use a bank, how are they pulling money out for it to be tracked?
See, none of it makes any sense lmfao.
Which is useful to who…? The only time that information is useful, would be for an investigator, so… again… someone, boots on the ground, and doing visual verification. And an investigator and plenty of other useful metrics with less noise.
It
Makes
Zero
Sense
In
Reality!
The person originally started talking about spending habits, and shifted to finding criminals. Those are two whole-fully different situations that need different information points, and are also gathered in significantly different methods.
Arthur Besse
in reply to SchmidtGenetics • • •One example I mentioned in my comment you're replying to is check cashing services. Millions of people in the US receive money via things like check or money order and need to change it to cash despite not having a bank account to deposit it in; this usually involves identifying themselves.
See also payday loans, etc.
I assume you didn't click (and translate) the link in the comment prior to mine which you replied to?
If you do, from there you can find some industry news about Serial Number Reading (SNR) technology.
I don't know how widely deployed that technology is, but there is clear evidence that it does exist and is used for various purposes.
Serial Number Reading (SNR) Series of Projects: Providing Cash Visibility for more Efficiencies - International Association of Currency Affairs
sbaxter@currencyaffairs.org (International Association of Currency Affairs)SchmidtGenetics
in reply to Arthur Besse • • •…
Those are done at a teller, not an ATM. An ATM requires a bank card, cashing a cheque at a teller does not. The post and everything that’s being discussed is about ATM tracking…
It doesn’t make sense when you actually understand how the system works… but of course people that don’t quite understand the system can be fooled by how it’s possible. But it isn’t, and not for the reasons you’ve suggested, as I’ve countered. It just doesn’t make sense because of all the NOISE.
e8d79
in reply to SchmidtGenetics • • •SchmidtGenetics
in reply to e8d79 • • •Except most people use multiple cards, multiple banks etc. there will absolutely need to some visual verification to be able to ever establish a starting point. It just doesn’t work.
It’s a neat proof of concept, but in reality, that would never hold up in court.
Give your head a shake, I’ve got a bridge to sell you if you actually believe this is being used or can be used for what you claim.
Peppycito
in reply to e8d79 • • •SchmidtGenetics
in reply to Peppycito • • •Peppycito
in reply to SchmidtGenetics • • •ColeSloth
in reply to SchmidtGenetics • • •SchmidtGenetics
in reply to ColeSloth • • •ColeSloth
in reply to SchmidtGenetics • • •Most places don't do cash back, and the ones that do tend to have a limit of like $40. Wal Mart is a bit of an exception, as they'll do $100, but you aren't getting a $100 bill from them through their self checkout. You'll only get 20's.
So if you go to Wal Mart, and you go to one of the few real people to check you out, and you ask for it back in a $100 bill, and the teller happens to have gotten a $100 in since they had started that day, and the front lead hadn't already cashed out the register since they received that $100 bill, then yes. In that case you'll get a $100 bill and will slightly fuzz up the tracking metrics they could theoretically do.
SchmidtGenetics
in reply to ColeSloth • • •I would expect a couple hundreds back if I use a thousand dollar bill.
Still legal tender, still required to be accepted.
There’s Noise everywhere, it’s a neat proof of concept, but it’s not gonna be used for what the user claimed.
ninja
in reply to Peppycito • • •SchmidtGenetics
in reply to ninja • • •alsimoneau
in reply to SchmidtGenetics • • •It sucks.
SchmidtGenetics
in reply to alsimoneau • • •alsimoneau
in reply to SchmidtGenetics • • •SchmidtGenetics
in reply to alsimoneau • • •ColeSloth
in reply to ninja • • •They give out $100's if you aren't a poor people.
But seriously though. A lot of ATM's will do 100's, anymore.
grandel
in reply to thepompe • • •~~Ive never noticed this or heard that printers do that.~~
~~Is this maybe specific to the USA?~~
Edit: TIL, thank you!
theskyisfalling
in reply to grandel • • •digital watermark which certain color laser printers and copiers leave on every single printed page, allowing to identify the device with which a document was printed and giving clues to the originator
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)like this
TVA likes this.
Ardens
in reply to grandel • • •It's not specific to USA... They do it everywhere - with color-printers. Don't know if they do it with B/W printers.
They claim it's to track people who try to print money, but if it were, then they wouldn't really do it on laser printers too...
If you print a photo on a regular paper, and then shine an UV-light on it, you can see it. It's mostly small yellow dots.
like this
TVA likes this.
मुक्त
in reply to Ardens • • •Ardens
in reply to मुक्त • • •मुक्त
in reply to Ardens • • •You wrote more, much; but left this to inference.
I highlighted one bit: yellow.
pirat
in reply to मुक्त • • •grey_maniac
in reply to Ardens • • •Ardens
in reply to grey_maniac • • •waldo_was_here
in reply to grandel • • •Ardens
in reply to thepompe • • •Isn't it common knowledge? I've known about it for at least two decades...
BTW - you can easily work around it. Get someone else to buy your printer for you, or trade with someone who has the same printer... Now, they will still be able to match it to the printer, if they find it at your home, but other that that, you are free...
PS. Don't use your printer to blackmail FBI or CIA. 😉
Eheran
in reply to Ardens • • •like this
TVA likes this.
chloroken
in reply to Eheran • • •Ardens
in reply to Eheran • • •Eheran
in reply to Ardens • • •Ardens
in reply to Eheran • • •Eheran
in reply to Ardens • • •Ardens
in reply to Eheran • • •TranquilTurbulence
in reply to Ardens • • •like this
TVA likes this.
मुक्त
in reply to TranquilTurbulence • • •like this
TVA likes this.
pogmommy
in reply to मुक्त • • •मुक्त
in reply to pogmommy • • •MonkderVierte
in reply to Ardens • • •Ardens
in reply to MonkderVierte • • •Mark with a Z
in reply to thepompe • • •Well just recently learned that some printers exfiltrate data from air gapped networks through ink cartridges.
lemmy.world/post/37486114
like this
TVA likes this.
falseWhite
in reply to thepompe • • •MonkderVierte
in reply to falseWhite • • •maccentric
in reply to MonkderVierte • • •मुक्त
in reply to thepompe • • •like this
TVA likes this.
space_comrade [he/him]
in reply to मुक्त • • •like this
TVA likes this.
oscardejarjayes [comrade/them]
in reply to space_comrade [he/him] • • •Cameras generally have barely noticeable, but uniquely identifiable, defects that will consistently affect pictures. So if you post a photo on your personal Social Media, and then you post a photo from the same camera on Hexbear, those two things could be connected. Just because it can happen doesn't mean it's practical, though.
I have no idea if this is what's been used with the Harry Potter thing.
chgxvjh [he/him, comrade/them]
in reply to space_comrade [he/him] • • •The Harry Potter thing was EXIF eff.org/deeplinks/2007/07/harr…
But pictures can also be traced back to a camera based on irregularities in the camera sensor scientificamerican.com/article…
Unlike with the printers, there is probably no database of the CMOS sensor irregularities of all cameras ever made. But if you upload pictures under your government name and the take pictures with the same camera and share them anonymously, this could be traced back to you in theory.
Tracing Photos Back to the Camera That Snapped Them
Wendy M. Grossman (Scientific American)LENINSGHOSTFACEKILLA [he/him]
in reply to chgxvjh [he/him, comrade/them] • • •sensor pattern noise is recognizable to an extent with pros, but usually its paired with highlight rolloff and other similar qualities. For instance, when I watch a movie, I can figure, okay, this was probably one of the arri's rather than a RED, etc. Sometimes, especially with a bit of knowledge on how/where they shot this, you can get an even better idea, close to a specific model. Of course if you're watching an actual movie, this is all after color correction so its more obvious if you have the raw files.
anyway, my point is, people who work with the cameras and files can definitely have at least a good idea of what camera something was shot with, but you'd really need a huge database and computers to do the work to match it exactly. I have colleagues that will show me something they worked on, with cameras they don't own and between the group of us, someone can immediately spot what camera it was shot on. but! like you said, if you post pictures on the internet, and then more pictures/videos with the same camera elsewhere, yeah it should be theoretically possible to match them with sensor noise pattern. they could at least prove its the same model. i'm not sure how much it differentiates between same camera models, but i can recognize my camera models dnp easy peasy. i have not had any caffeine yet so this is likely a jumbled mess of a thought and i apologize.
chgxvjh [he/him, comrade/them]
in reply to LENINSGHOSTFACEKILLA [he/him] • • •And they can do that based on the way your write text posts too, so probably not worth worrying about camera sensor fingerprinting too much.
Just don't post about your insurrection plans on public forums in general, with or without photos.
mapleseedfall
in reply to मुक्त • • •thevoidzero
in reply to mapleseedfall • • •That's the obvious one. But you can also add data to images by adding tiny values to the pixels, it'll still look the same to us (same as printer tiny dots).
I don't know if phones actually do this. Just saying it's possible.
But many uploading sites optimize the images, so it'll be gone on reshare, but they could get it on first upload.
hakunawazo
in reply to thevoidzero • • •hiding messages in other messages
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)TheSlad
in reply to mapleseedfall • • •clif
in reply to मुक्त • • •EXIF data?
en.wikipedia.org/wiki/Exif
file format
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)मुक्त
in reply to clif • • •belated_frog_pants
in reply to मुक्त • • •ReversalHatchery
in reply to belated_frog_pants • • •HiddenLayer555
in reply to belated_frog_pants • • •Even without EXIF data I would bet the actual encoding of the image will be identifiable to a specific instance of the camera software.
Similar to how websites fingerprint your browser by rendering something in the canvas or webgl and sending back the rendered image. The exact same rendering procedure will produce slightly different images for each browser instance. I suspect browsers are fully aware and complicit in this because why the actual fuck would they not make the rendering engines deterministic to their inputs?!
मुक्त
in reply to belated_frog_pants • • •In that case, looks like they didn't remove the EXIF data.
मुक्त
2025-10-21 13:48:49
BrilliantantTurd4361
in reply to मुक्त • • •who
in reply to मुक्त • • •To be clear, this is not about EXIF data (which is its own problem).
Digital cameras can be fingerprinted from the images they produce, due to variations between pixels in any given sensor. If you're concerned about an image being traced back to your camera, you might consider some post-processing before distributing it.
MonkderVierte
in reply to thepompe • • •Ohh
in reply to thepompe • • •No... But i've thought about how easy it would be to implement in ebooks and pdfs (e.g. my daily newspaper i can download as pdf). I've thought about this when sailing the high seas.
Is it a thing?
Akrenion
in reply to Ohh • • •Ohh
in reply to Akrenion • • •lemonink.co/home#start-using
monovergent
in reply to Ohh • • •QuizzaciousOtter
in reply to Ohh • • •boboblaw [he/him, they/them]
in reply to Ohh • • •oscardejarjayes [comrade/them]
in reply to thepompe • • •atomicbocks
in reply to thepompe • • •low-bandwidth long-range wireless networking protocol developed by Amazon Inc
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)dysprosium
in reply to atomicbocks • • •No where does it state that customer data is being sent to Amazon. And neither that the technology is implemented in Amazon TVs.
Thanks for giving false info or inaccurate source.
Arthur Besse
in reply to dysprosium • • •At launch (in 2021) the FireTV was not on the list of Sidewalk-enabled products, but given the fact that Sidewalk was enabled without user consent on many existing devices (and has been found to re-enable itself after being disabled) combined with the fact that FireTV devices all have at least the necessary bluetooth radio (even if not the LoRA part, Sidewalk can use both/either) and thus could become sidewalk-enabled by a software update in the future... I would still say that Sidewalk is a reason (among many) to boycott FireTV along with the rest of Amazon's products.
The takeaway that Amazon built their own mesh network so that their products in neighboring homes can exfiltrate data via eachother whenever any one of them can get online is not false.
Amazon Sidewalk, going live today, affects Echos but not Fire TVs — What you need to know and how to turn it off
AFTVnewsdysprosium
in reply to Arthur Besse • • •Auli
in reply to atomicbocks • • •Arthur Besse
in reply to thepompe • • •NSA cotraveler : Edward Snowden : Free Download, Borrow, and Streaming : Internet Archive
Internet ArchiveDr_Vindaloo
in reply to thepompe • • •ReversalHatchery
in reply to Dr_Vindaloo • • •DarkFuture
in reply to Dr_Vindaloo • • •I hate this.
I'm still driving a '99 vehicle and the most advanced thing about it are the power windows. I dread upgrading to a vehicle that can break in so many new ways. I hate that everything has touch screens and the software on many is awful and if it breaks, surprise, you have no music in your car now.
plantfanatic
in reply to DarkFuture • • •RememberTheApollo_
in reply to plantfanatic • • •plantfanatic
in reply to RememberTheApollo_ • • •You’ll be surprised, they take snapshots at certain points. In a collision all vehicles will store last 5 or so seconds of data, speed, see if brakes are engaged, stuff like that, it’s all used in collision investigations. There’s not a single car I think that’s doesn’t do this. As I said, it’s in some form, but your vehicle does know if you’ve sped if it has an obd on it.
What do you think basic OBD stuff is? It’s all that information and that’s used to see if anything’s wrong with the vehicle.
RememberTheApollo_
in reply to plantfanatic • • •plantfanatic
in reply to RememberTheApollo_ • • •No, even ODB from the 70s records you max reached speed, if you’ve hit the governer/rev limiter and how many times.
It’s nothing modern, modern just does it more frequent, more situations, more information, more data points, and mandatory black boxes.
And many vehicles from 2000 onwards have dedicated EDR boxes, what make and model and trim is your 2012?
So sounds like you don’t quite know what’s going on under your hood there ;)
sonstwas
in reply to Dr_Vindaloo • • •Earlier this year during the CCC security conference it was revealed that the tracking info of 800k Volkswagen cars was publicly accessible...
The talk is available in English as well I believe: media.ccc.de/v/38c3-wir-wissen…
Wir wissen wo dein Auto steht
media.ccc.demodus
in reply to Dr_Vindaloo • • •/home/pineapplelover
in reply to modus • • •kalpol
in reply to Dr_Vindaloo • • •7bicycles [he/him]
in reply to thepompe • • •A lot of stores track your movement through the store with the WiFi or bluetooth your phone sends out, unless you have that turned off. Since it's "anonymous" not even stuff like the GDPR requires to notify anyone of this.
Also that's going to get way worse
Scientists Can Now Use WiFi to See Through People's Walls
Tim Newcomb (Popular Mechanics)chillpanzee
in reply to 7bicycles [he/him] • • •ranzispa
in reply to chillpanzee • • •Though, they do annoy me when they say I should have left it outside. They do annoy me a lot.
dysprosium
in reply to 7bicycles [he/him] • • •7bicycles [he/him]
in reply to dysprosium • • •Not really. It doesn't really rely on MAC adresses, it relies on your phone to constantly blast out "IS ANYONE HERE $HOME_NETWORK_NAME?" (or bluetoothely named "DYPROSIUMS AIRPODS!???") and it just catches that and then uses classic triangulating to see where you are. They all do that to quickly connect to WiFi without you having to actually type in the SSID because that shits for nerds.
Would or is also a really good way to sniff WiFi passwords. If anybody says "Well yes, I am indeed $HOME_NETWORK_NAME" your phone just hands them the password. It's probably wrong for THAT network but it does mean you can just collect a whole ass batch of home wifi passwords.
Especially given how many people don't change shit about their ISP-provided network if you just cyle $common_standard_wifi_names you're off to a good start to be able to easily infilitrate half your cities WiFi.
HiddenLayer555
in reply to thepompe • • •Tons of websites record your mouse, keyboard, and scroll activity, and can play back exactly what you saw on your browser window from its backend dashboard as a video. This is called session replay. There are pre-made libraries for this you can import so it's super common, I believe Mouseflow is one of the biggest providers.
When a mobile app, Windows app, or even website crashes nowadays, it automatically sends the crash dump to the app developer/OS vendor (the OS often does this whether the app requests it or not because the OS developer themselves are interested in what apps crash and in what ways). We're talking full memory dump, so whatever private data was in the app's memory when it crashed gets uploaded to a server somewhere without your consent, and almost certainly kept forever. God help you if the OS itself crashes because your entire computer's state is getting reported to the devs.
Your phone's gyroscope can record what you say by sensing vibrations in the air. It may or may not be something humans will recognize as speech if played back because the frequency range is too limited, but it's been shown that there's enough information for a speech recognition AI to decode. Good chance the accelerometer and other sensors can be used in the same way, and using them together will increase the fidelity making it easier to decode. Oh did I mention no device has ever implemented permission controls for sensors so any app or even website can access them without your consent or knowledge?
bountygiver [any]
in reply to HiddenLayer555 • • •Buddahriffic
in reply to bountygiver [any] • • •Though iirc a system crash report can include a kernel dump, which can contain things like private keys.
Though realistically, Microsoft controls your OS. They could easily add code to allow them to grab whatever they want from your system without any logging (by your system anyways).
That actually makes me wonder if there are any apps that run on both a system and the router that system is connected to to determine if the internet traffic as reported by the system (to the user) is the same as what the router sees as a way to detect anything using network resources but bypassing the normal network stack.
prole
in reply to Buddahriffic • • •They most certainly do not.
Buddahriffic
in reply to prole • • •Yeah, sorry, I meant for anyone worried about windows crash reports.
Microsoft controls your windows OS.
bountygiver [any]
in reply to Buddahriffic • • •Truscape
in reply to HiddenLayer555 • • •Correction: GrapheneOS has implemented permission controls for sensors. It also has sandboxing and permission scopes to prevent many of those leaks.
However, Graphene is not available to everyone, and it's still problematic due to bystanders/passerby.
JustVik
in reply to thepompe • • •Buddahriffic
in reply to JustVik • • •I've wondered for a while if something like this is why Google allowed their bootloaders to be unlocked, because they can get at everything anyways.
And I bet that if that was the case, they've backed off that for future phones because of those stories about law enforcement seeing having those phones as suspicious, which could hurt sales, since I bet the majority of pixel users don't switch operating systems.
Truscape
in reply to Buddahriffic • • •chipset that was developed and promoted by the NSA
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)Evil_Shrubbery
in reply to JustVik • • •DarkAri
in reply to JustVik • • •They run a mini Linux distro and you can ssh or tyy into them if you have a serial port. They have access to much of the hardware but usually over something like a serial interface but still can inject code and stuff. They are a completely secret self-contained computer and I don't even think they get updated for security. They could easily be hacked by anyone probably mostly government regimes. There is only a few companies that make them and they are ultra secretive and protective over them. This is the main reason it's nearly impossible to get an open source phone. Arm is proprietary, modems are proprietary. They run blobs. I have probably the one phone in existence that can run an open source modem firmware, and interestingly I have figured out that there is basically no security whatsoever on the cell networks. (Monopolies gonna monopoly) So that might be one reason they are so secretive about it, another reason is because they don't want citizens being able to just have open source radios that they can't easily hack or sell to drug cartels or something.
It does have complete access to your mic and Bluetooth and other stuff since they share buses, it has access to all your data being sent. It can record phone calls. It can triangulate your position. It can even imitate other modems to pick up people's messages and calls, which means not only can it spy on you but also it can spy on other people around you. I don't think it's really possible to disable these things completely outside of physically cutting power. They boot up with the phone and can probably run even when the phone is powered off since it's a self contained system, often with a direct connection to the battery.
Between Bluetooth, and cellular modems, they have basically complete access to many bands around you, as well as sensor data and sound and video, and with satellites recording the entire planet, they can trace anyone who doesn't have a device back in time anyways. Cell towers can triangulate you as well and do. It's part of location services in all phones now. The modems can connect to almost any towers at least for "emergency purposes".
Basically the only place that's safe now is inside your own head but even that's becoming unsafe because of AI that can read your facial expressions and infer your mental state.
The ways they get around the legalities is originally with the eyes programs, where countries would spy on their allies citizens to escape domestic laws like those pesky constitutions, but nowadays they just literally sell everyone's personal data to the highest bidder, international or domestic. The CCP can buy this I do just as easily as Black Rock can, not that Black Rock is or every was an American company. These are international corporations that exist outside of the idea of a state.
It's also not the CIA or NSA spying on you, but private companies. Even the people in the CIA and NSA aren't allowed to know about the extent of the true intelligence apparatus which is completely secret, outside the law, and contained entirely in international corporations. The entire Internet has been saturated with bots since 2001 or something probably. The internet is just a massive psyop and propaganda program. The average person in the 90s would be horrified at the opinions of common people today. Nukes are also probably not real. Just a way to scare people into believing Russia and America and China are actually enemies while they partial up and nationalist culture that doesn't want to give all its resources up to the international secret world management and finance corporation. Fiat currency too is a giant scam to make sure the working person never acquires wealth, and has to work forever, and corporations and wealthy humans who's names will never be spoken publicly, can own anything and have unlimited leverage and I finite money without ever having to work or produce anything of value. The text books in nearly every school in America are made by a company in Israel who was co-founded by glisten Maxwell's father. The left in U.S politics is fake, and the whole social justice warrior movement was a clever psyop to push all the countries further right wing run by internationalist corporations btw. 25% of Americans are addicted to legal amphetamines, more on other drugs like weed which reduces people's ability to understand what's real, Md nearly half of working age people in America cannot or won't find work. Wages have been dropping for decades and now IQs are dropping. Most of human genetics have been completely ruined, as we as humanity has destroyed nearly every honest, principled and empathetic human on the planet for profit.
xav
in reply to DarkAri • • •DarkAri
in reply to xav • • •funkless_eck
in reply to DarkAri • • •extreme doubt, my dude
DarkAri
in reply to funkless_eck • • •funkless_eck
in reply to DarkAri • • •DarkAri
in reply to funkless_eck • • •I sometimes wonder if they are even actually real but all the hysteria around them is definitely manufactured. I do think all these countries get together like the U.S, Russia, and China to pretend to hate each other so they can justify having huge national security states and surveillance networks and trillions of dollars in defense spending. I think once you get into their club there is no such thing as borders or nations, just psyops to keep the common people controlled and on the plantations of capitalism or authoritarianism. It's not just me by the way but this used to be the common opinion of nearly everyone, even people like Dwhite D. Eisenhower, who was the supreme commander of the entire allied forces during WW2. Not that you will really find any of that information today. They have been scrubbing the internet of any and all references to real history and expanding copyright every year so they can carefully control what kind of information is available to the public.
Yes it sounds crazy but it is also much closer to the truth then what you believe. This is why people in the news media started wearing brightly colored ties now. They are clowns. They are actors. The president doesn't have any power, he is just a clown to distract the masses. The state has no power. It's just a police force for the rich to steal all of our labor and keep us from overthrowing them. Why would the CIA do anything when they have to comply with all the regulatory and transparency laws, when private companies can do it better without a need to keep records? That would be stupid at this point. I don't buy any of it and I know enough real history to realize what's going on. Yes nukes are fake, maybe they actually exist in some rusted pieces of crap somewhere built 60 years ago, but no the rich can't nuke the whole world just because you don't want to worship them.
username123
in reply to DarkAri • • •DarkAri
in reply to username123 • • •Yes the pinephone has an open modem firmware you can install, but in order to make the pinephone slightly usable you need to have phosh, because KDE is way to slow. It's not a device that's easy to use unless you are comfortable with tweaking, and are tech savvy. It also has some issues, like a small battery and heavy energy use. Mobian with phosh helps a bit here, but it's just not really a good replacement for android phones rn. The hardware is slow because there isnt really any open hardware with documentation that exists.
There is a few android phones that you can install Linux onto that are better but you have to deal with the headache if googles bullshit and Qualcomm and mediateks bullshit in terms of bootloaders and stuff.
I'm working on my own fork of mobian for the pinephone specifically that will hopefully make it more usable as an everyday device, but it's 4g only so it only really has a year or two left of life. In a few years we will hopefully see better open phones since there is a real market opening up for them, with the desolation of android by Google.
username123
in reply to DarkAri • • •DarkAri
in reply to username123 • • •HugeNerd
in reply to JustVik • • •infuziSporg [e/em/eir]
in reply to thepompe • • •For audio recordings, there is usually a trace of electric hum in the background that has enough randomness to yield info on when (and sometimes where) the recording took place.
It's not as much of a privacy violation as a privacy vulnerability, but it's still relevant.
forensic technique to validate audio recordings
Contributors to Wikimedia projects (Wikimedia Foundation, Inc.)whats_a_lemmy
in reply to thepompe • • •technologyreview.com/2024/02/2…
WiFi-based human motion detection through barriers
How Wi-Fi sensing became usable tech
Meg Duff (MIT Technology Review)