• 1 Post
  • 32 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle

  • The simplest explanation is that OP doesn’t have good opsec, and got a few tracking cookies after deleting cookies, before setting up their proxy/VPN. Then, on the VPN, the advertiser recognized their VPN IP address, and chose to exclude that from generating location data, deferring instead to the location indicated in their existing tracking cookies.

    Privacy is hard. The system is rigged against privacy. You have to do everything perfectly, because one simple mistake could leak your IP address.











  • Copyright’s purpose is to improve the public domain. If it doesn’t do that, then its harmful and should be reduced or abolished.

    To keep copyrighted content relevant at the point it enters the public domain, copyright should be shortened to 20 years for creative works (films, music, paintings, Spongebob).

    Consider the current public domain, which contains things like fairy tales. People remix and retell fairy tales all the time, and it makes for good stories.








  • Post-quantum isn’t really a big problem because it will be a very long time before there are viable quantum computers (maybe never). You should focus on the very real risks of security breaks from normal negligence and design errors.

    Threema seems pretty unpopular, so the risk is highest. Signal and Matrix are both popular and have a lot of scrutiny on their cryptography.

    All 3 have open source clients, but Signal contains some binary blobs. Only Matrix has an open source server, though end-to-end encryption enforced by the client alleviates most of the concern of proprietary servers. All 3 support end-to-end encryption.



  • This article seems like a lot of FUD written from an anti-FOSS perspective. In their second point, they say that F-droid’s inclusion policy is “ridiculous” for requiring programs exclude proprietary software. I think the author is ridiculous for asking for this. This is what F-droid is for. I don’t want any proprietary apps or libraries on my phone. If developers only want to work on their proprietary software, they don’t get into F-droid. If they make a modified FOSS version and put it in F-droid, and let it bitrot and go unpatched when vulnerabilities are discovered, and F-droid issues a security advisory for that program, that’s not F-droid’s fault.