Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’

  • 69 Posts
  • 520 Comments
Joined 4 years ago
cake
Cake day: April 25th, 2021

help-circle
  • Well, real privacy don¡t exist in the same moment you goes online. Google controls half the internet and MS and Apple the rest, direct or indirect. Even the Dark web isn’t so private as people think.

    An advanced user can reduce the privacy holes, gutting Windows, leaving it in an OS as is, the same with Google products, but also only up to a certain limit so as not to turn navigation into pure text or get blocked in most the pages. For this reason, we must focus on which data deserves to be protected or hidden and which are of a purely technical aspect that ensure the proper functioning of the sites we visit.

    I don’t care that the page knows what country I live in, but if it has to be avoided that it knows my address, I don’t care that it knows the OS I use and the exact resolution of my screen, since this helps the pages not to be out of order or download links take me to downloads for another OS.

    This is all data that matches millions of other users and is not a privacy issue. These problems arise with data that identifies the user directly, such as email addresses, which are unique and perfectly traceable, personal photos published on the Internet, bank details in these very convenient mobile payment apps, posting on Fakebook until when are we going to go pee or when we go on a vacation trip (surely some of the 5637 followers are very interested when your house is empty)…

    There is a lot that the user can do to have a certain privacy at the computer level, but the worst security hole is always the user themselves and the lack of common sense…




  • 01101001 00100000 01110100 01111001 01110000 01100101 01100100 00100000 01110100 01101000 01101001 01110011 00100000 01100011 01101111 01101101 01101101 01100101 01101110 01110100 00100000 01110111 01101001 01110100 01101000 00100000 01110100 01101000 01100001 01110100 00100000 01101011 01100101 01111001 01100010 01101111 01100001 01110010 01100100 00100001

    01001110 01101111 00100000 01110000 01110010 01101111 01100010 01101100 01100101 01101101 00101100 00100000 01101001 01110100 00100111 01110011 00100000 01100110 01110101 01100011 01101011 01101001 01101110 01100111 00100000 01100101 01100001 01110011 01111001











  • It would be very desirable. AlternativeTo is perhaps the best and most complete service to find Software and services, for any OS and license. It shouldn’t be missing from anyone’s bookmarks, even so, a shortcut in Lemmy wouldn’t be bad. Community driven, most with user reviews and ratings, warnings if a soft or service is discontinued, with Malware or Bundleware, all links to the corresponding Homepages for use or download.




  • These are my thoughts regarding FOSS for a long time. The sense of facilitating the development and freedom of the project has been distorted years ago, when large corporations put their hands on this project, controlling it. Just look at the amount of “OpenSource” soft and services controlled by Google, M$, Amazon, FB … Yes, they are free to distribute and modifiable by devs, but mostly full of APIs from these corporations, not controllable by the user, subtracting their sovereignty and only modifiable with effort by people capable of understanding the scripts and redirects they contain. For a normal user it is increasingly irrelevant whether the project is FOSS or proprietary, while these products and the internet in general are in the hands of these companies.

    A simple question is enough, which one do you prefer to use? FOSS projects from large corporations, or Freeware from small independent startups, if you don’t have the knowledge to review the script anyway, almost impossible in millions of lines, with external references from large apps and services? It becomes decisions of mere trust, perhaps with the help of external services, such as WebKoll, Blacklight, Unfurl and similar, where in the end the license that the product has is irrelevant, with respect to security and privacy, often in question or not, in some like others. In the end only the intentions and ethics of the developer matter.

    Yes, of course, the concept of OSS, FOSS and FLOSS requires a profound review and update, so that it does not become a destroyer of what it aims to protect and promote, a free internet.









  • Smartphones by definition are Spyware, at least if you use the OS as is, because in them all aspects are controlled and logged, either by Google on Android or by Apple on iOS. Adding the default apps that cannot be uninstalled on a mobile that is not rooted. As COX alleges, they also use third-party logs and therefore can track and profile the user very well, even without using this technology that they claim to have.

    Although they feel authorized by the user’s consent to the TOS and PP, the legality depends directly on the legislation of each country. TOS and PP itself, to be a legal contract, must comply in all its points with local legislation to be applicable to the user. For this reason, I think that these practices are very different in the EU from those in the US, where legislation regarding privacy is conspicuous by its absence, that is, that US users should take these COX statements very seriously in their devices, although in the EU they must also be clear that Google and Apple know exactly what they do and where users live, although they are limited from selling this data to third parties.

    Basics:

    – READ ALWAYS TOS AND PP

    • Review the permissions of each app, leaving only the most essential ones
    • Desactivate GPS if not used
    • Review in Android every app with Exodus Privacy, maybe Lookout or MyCyberHome in iOS (Freemium apps !!!)
    • Use as less possible apps from the store
    • Be aware of discount apps from the Supermarket or Malls
    • Don’t store important data in the Phone (Banking, Medical…)