@firefly@neon.nightbulb.net cover
@firefly@neon.nightbulb.net avatar

firefly

@firefly@neon.nightbulb.net

I am a #bibliologer and a #cryptologer. I study the Bible, codes, and ciphers among other things. I enjoy #poetry. I like #neologisms. I burn with insatiable curiosity about everyone and everything.

This profile is from a federated server and may be incomplete. View on remote instance

firefly ,
@firefly@neon.nightbulb.net avatar

@jack_william

You could ditch gmail and run your own VPS with a mail server and website and move your Linkedin CV data to your own site.

All surveillance problems solved for about $50 per year.

firefly ,
@firefly@neon.nightbulb.net avatar

Telegram: We keep you private. Now enter your phone number to sign up.

firefly ,
@firefly@neon.nightbulb.net avatar

@SnotFlickerman @CoderSupreme

Some digital cameras and phone cameras can also embed the GPS coordinates in the pixel data so that even if you delete the EXIF metadata the GPS location and device serial number are still present in the image. Many document printers also embed device serial number and other data on printed documents by using nearly invisible dot encodings.

firefly ,
@firefly@neon.nightbulb.net avatar

@match @CoderSupreme

What should you do about surveillance technology? Ask a Amish hacker!

firefly ,
@firefly@neon.nightbulb.net avatar

No easy way at all. The specs would be in-house manufacturer docs. Recall that digital cameras used to embed date and time visibly in images in a corner. The logical progression was to embed other data such as device serial number, geotag data, etc.

Regarding the schemes for steganographic identification in devices such as cameras and printers, this information is usually kept a trade secret. The Secret Service would probably already have the spec docs for data hiding. Many manufacturers already have working agreements to provide back door assistance and documentation for the hardware surveillance economy. Ink chemistry profiles are registered with the Secret Service. The subterfuge is to 'investigate counterfeiting' but it is also used to identify whistleblowers and objective targets by their printer serial number or ink chemistry, or the data embedded in any images they are naive enough to publish.

If you are a undercover reporter secretly video recording, unbeknownst to you the video could have metadata encoded using a secret scheme. If you registered that product for a warranty, or bought it online and had it shipped, or paid with a credit card or check, or walked beneath the electronics store cameras without a hat and sunglasses to pay cash, it is easy for the state organs to then follow the breadcrumbs and identify the videographer.

Almost all 'free' wifi hotspots offered by chain restaurants and hotels are logged with the data being stored indefinitely, showing your mac address. It takes only a little bit of investigation and process of elimination to find the user on a camera feed history, to see who was connected when a certain message or leak was sent. If you use a wifi hotspot in a McDonalds, Wendy's, Starbucks, etc. smile for the surveillance camera which will also have your device's unique MAC address in the wifi history. This MAC address data is automatically sent to a central station, for example at the Wandering Wifi company, and God only knows how long they store it.

None of this nonsense makes anyone safer. These people hate us.

firefly ,
@firefly@neon.nightbulb.net avatar

Try Polaroid.

firefly ,
@firefly@neon.nightbulb.net avatar

@hperrin

VPN + Tor = incognitopottamus

firefly ,
@firefly@neon.nightbulb.net avatar

@helenslunch

"I have nothing to hide ..."

Nice story, bro.

When you post a real photograph of yourself, wife, kids, and all your social security numbers and bank account numbers, along with a complete history of all video rentals and library books, and your private confessions of folly, vice, and sin-- post all that on your Lemmy profile, then I'll believe you have nothing to hide.

firefly ,
@firefly@neon.nightbulb.net avatar

@magnetosphere @Glass0448 @Valmond

Nuance? Isn't that a racial slur? Mastodon is too based for me.

firefly ,
@firefly@neon.nightbulb.net avatar

@magnetosphere @Glass0448

Looky here, we found this nifty thing called, 'qualified immunity'.

firefly ,
@firefly@neon.nightbulb.net avatar

You can have it now. We don't want it any more!

firefly ,
@firefly@neon.nightbulb.net avatar

@ItsComplicated

Forty years ago police had to have a basic level of intelligence and they investigated. Now some of them just rely on arm-twisting and plea bargain threats to find any patsy they can to stuff in a cell. They can have no crime, no complaint, no witness, no evidence, and still arrest you, and the D.A. will offer you a plea deal for something that didn't even happen. Your public pretender defense lawyer will tell you to take the deal. Don't laugh... it can happen to anyone.

firefly ,
@firefly@neon.nightbulb.net avatar

The court system in USA is absolutely and irredeemably corrupt. Many prosecutors in USA are vile criminals and most of them belong in prison themselves. They have no respect for the Constitution or Bill of Rights that they are by law subscribed and sworn to uphold. They will use bogus criminal charges to affect or chill the outcome of an unrelated civil matter, to 'shut you up' in street parlance. People think America is free. It is an authoritarian hell run by delusional nutters. People like to scoff at that, until it's their turn to ride the courthouse railroad.

firefly ,
@firefly@neon.nightbulb.net avatar

Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

Operation Rubicon
https://en.wikipedia.org/wiki/Operation_Rubicon

Crypto AG
https://en.wikipedia.org/wiki/Crypto_AG

If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you have no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data privacy.

Watch the phan boiz rage outlet!

firefly ,
@firefly@neon.nightbulb.net avatar

It depends upon your security needs and risk assessment.

Are you a whistleblower?

Are you handling confidential business, financial or legal communication?

Are you being monitored by state agents?

Are you sharing love letters with someone?

Are you discussing or transferring confidential records?

You have to look at and assess your use case before you can decide on a solution.

No matter what your risks are, every solution should ALWAYS include end-to-end encryption in which the parties own and control their own encryption keys and identity on their own devices, not in the cloud.

That is the baseline. Then depending on your situation there are other factors and solutions to consider on top of the baseline.

When you own and control your encryption keys on your own device, then no third party can turn over your keys to a hostile entity. If you encryption is dependent upon a third party, they own your encryption and you have zero security, no matter how much they promise you.

Here are a few secure communication software examples for consideration:

Onionshare: https://onionshare.org/
Retroshare: https://retroshare.cc/
Bitmessage: https://bitmessage.org

firefly , (edited )
@firefly@neon.nightbulb.net avatar
  • 21 ALTERNATIVES TO YOUTUBE *

The Internet Archive https://archive.org offers over 1.8 million free movies and over 12 million free videos.

Here are more options. Most are browser-based. A couple require an app.

ODYSEE
https://odysee.com
VIDLII
https://www.vidlii.com/
INVIDIOUS
https://invidio.us
TIKTOK
https://tiktok.com
9GAG
https://9gag.com
BITCHUTE
https://www.bitchute.com
BILIBILI
https://www.bilibili.tv/en
RUMBLE
https://rumble.com
PEERTUBE
https://peertube.tv/videos/overview
NEWPIPE
https://newpipe.net
TWITCH
https://www.twitch.tv
TED TALKS
https://www.ted.com/talks
VIMEO
https://vimeo.com/
VEOH
https://veoh.com/
LBRY
https://lbry.com/
DAILYMOTION
https://www.dailymotion.com/us
UTREON / PLAYEUR
https://playeur.com/
THE OPEN VIDEO PROJECT
https://open-video.org/
STORYFIRE
https://storyfire.com/
DLIVE
https://dlive.tv/

@Daft_ish

firefly ,
@firefly@neon.nightbulb.net avatar

There are twenty alternatives in the list. Did you try any of them?

I added No. 21, DLIVE https://dlive.tv/

firefly ,
@firefly@neon.nightbulb.net avatar

If you were dumb enough to put your thumbprint into the phone in the first place then they already have it and they can access it through the modem. The courts are playing a kabuki theater or cabaret skit.

firefly ,
@firefly@neon.nightbulb.net avatar

@TaviRider

First order of business: never enable the thumbprint lock on your phone.

Second order of business: never conduct any sensitive business or communication with a mobile phone.

Third order of business: use a very strong passphrase to lock your phone.

Fourth order of business: understand that all your phone calls and text messages are hoovered up into spook databases.

firefly ,
@firefly@neon.nightbulb.net avatar

@Tami

Spend $30 per year on a VPS and you own your own encrypted cloud.

kde , to KDE
@kde@floss.social avatar

We write all recipes for our juiciest empanadas in our notebooks. Version 1.1.0 available now!

https://carlschwan.eu/2024/04/01/marknote-1.1.0/

Flatpak coming today!

@kde

firefly ,
@firefly@neon.nightbulb.net avatar

@kde

Is there a Debian package or a Debian build script for Marknote?

firefly ,
@firefly@neon.nightbulb.net avatar

"Haiku is an open-source operating system that specifically targets personal computing. Inspired by the BeOS, Haiku is fast, simple to use, easy to learn and yet very powerful."

https://www.haiku-os.org/

@Zerush

firefly ,
@firefly@neon.nightbulb.net avatar

Welcome to Mastodon and the fediverse. If you don't agree with the hive-mind 'consensus' then your speech is a 'violation' of some ambiguous 'policy' and must be censored. They will always invent spurious reasons for censoring things they hate, such as, 'misinformation' or 'hate' or 'square dancing in a round room.' This is how psychotic bolsheviks lord their power over others.

@downpunxx

firefly ,
@firefly@neon.nightbulb.net avatar

@glovecraft

'tortious interference'

Musk is a wart on Pinocchio's nose. I feel no pity for him after all the lies he tells.

Many of his haters are his own kind of people envious that he climbed on the gravy train and they didn't.

firefly ,
@firefly@neon.nightbulb.net avatar

Difference between Bloods and Crips ... or Mexican cartel vs. Columbian cartel.

firefly ,
@firefly@neon.nightbulb.net avatar

No. You are not clarifying. You are insinuating and muddying the water. My comment is about hypocrisy and vague rules made by hypocrites, rules designed to hide the real motives for censorship. They hide their real motives for censorship behind fake tropes and social signalling objectives. It doesn't matter if it is X, Facebook, Mastodon, or any other platform. A huge chunk of the moderators of such platforms are criminally insane and are only interested in suppressing speech based upon partisan objectives rather than objective reality or objective morality or objective civility. Basically it is gangs competing for power in the mindshare space and that power is enforced through acceptable speech policies that have nothing to do with civility and everything to do with compliance and obedience to the gang.

Their acts of censorship and the fake motives they give expose their true character as fundamentally orwellian and dishonest.

A person who is orwellian and anti-goldstein would not understand. A totalitarian never thinks of himself as a totalitarian. He is a hero and genius in his own mind. Gangbangers think their gangs are in a war with, 'the man' and the same goes for politcos.

> "... let you screech anything you want ..."

They are the ones screeching. Even their nebulous and inconsistent censorship rules are a screech. Almost everything they say in public is screeching. And if you don't screech with them, you are the one who gets muzzled. If you screech with them, you're a 'freedom fighter' or 'warrior' or 'hero' or 'virtuous' or 'patriotic' or a 'true OG' or whatever.

firefly ,
@firefly@neon.nightbulb.net avatar

If there is no such thing as a hive mind then how do you know that, 'nobody likes' me? Either you surveyed everyone alive, or you telepathically intuited this grand revelation.

Your comment is some 3rd-grade level, witless name-calling. Take your pre-pubescent frustrations to your guidance counselor.

firefly ,
@firefly@neon.nightbulb.net avatar

No, you once again are playing the smug, snide troll just insinuating your cult speak nonsense. I explained the true motives behind censorship, as opposed to the pretexts supplied by the liars. My point was that these people are liars who play mind games and wordsmithing games, just like you are doing. You are a false accuser and a slanderer trying to pump his preconceived cult notions. Your arguments are banal, childish, and simple-minded.

Don't bother responding. I won't see it. The next time you nymshift to harass me I will immediately block you and report you to the system administrator. Quit following me around the Internet, creepy stalker kook.

firefly ,
@firefly@neon.nightbulb.net avatar

> "can’t convince people to use software that only works half the time."

Why not? M$OFT managed to do so for years ...

firefly ,
@firefly@neon.nightbulb.net avatar

Have you considered the International Harvester Scout?

firefly ,
@firefly@neon.nightbulb.net avatar

What about the Unimog? That's a bog hopper mobile.

firefly ,
@firefly@neon.nightbulb.net avatar

@JRepin

Elitists who make money from nothing or off the backs of others also invent catchy phrases to glorify and sanitize their worthless activities.

firefly ,
@firefly@neon.nightbulb.net avatar

@Varyk @davel

If we wanted national data and communication security we would shut off the transatlantic cables and physically separate the U.S. Internet from the rest of the world. All matters of diplomacy could be conducted in public courts at the coastlines instead of over telephone wires and emails. Problem solved. We could set up a nice star-spangled curtain and let all the globalists rot from the fallout.

firefly ,
@firefly@neon.nightbulb.net avatar

They've been promising quantum computers for three decades with zilch results. I've lost count of how many times and how many startups and even major market players claimed to have working quantum computers, which of course to this day are all just smoke and mirrors.

They've been promising artificial intelligence for three decades with zilch results. Then they redefined what AI means to get venture capital pointing the money hose at it. Now people think a glorified autocomplete and grammar engine is 'artificial intelligence.'

I'll believe it when I see it.

firefly ,
@firefly@neon.nightbulb.net avatar

Let's pray they don't find a way to detonate the batteries!

firefly , (edited ) to Technology
@firefly@neon.nightbulb.net avatar

[Thread, post or comment was deleted by the author]

  • Loading...
  • firefly OP , (edited )
    @firefly@neon.nightbulb.net avatar

    What is the application name of the Lemmy client that is crashing? Responding here should pass it on to the instance server developer.

    @grunfink

    firefly ,
    @firefly@neon.nightbulb.net avatar

    Privacy aside, in my experience over a long time Brave load up and response time is significantly faster than Firefox. And Brave renders the windowing geometry and toolbars correctly on Linux, while Firefox does not. I also do not consider Mozilla free speech friendly or privacy friendly because of this:

    "We need more than deplatforming"

    There is no question that social media played a role in the siege and take-over of the US Capitol on January 6."

    https://blog.mozilla.org/en/mozilla/we-need-more-than-deplatforming/

    There was no 'siege' or 'takeover' of the capitol. Nobody stormed the place with guns or weapons. That is a fantasy tale. This choice of politically charged words turns the reality of the event into a fictional lie. This is all political theater. It's a patent lie. Those who are going along with this lie to promote censorship are a wart on a worm's rump.

    A few FBI agents and FBI-paid provocateurs smashed some stuff and made some noise, then the clowns on Capitol hill who organized for and gave the orders for the FBI to do this, called it an "insurrection." So Mozilla is promoting censorship and deplatforming based on a fake insurrection. Just. Like. The. Nazis. And. Communists. did during WWII to crack down on Jews, Gypsies, and non-Catholic Christians.

    Mozilla can keep their voluntary fascist browser.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines