• 5 Posts
  • 135 Comments
Joined 9 months ago
cake
Cake day: October 20th, 2023

help-circle




  • Even ignoring the ideological reasons to not want facebook integration: There are only so many hours in the day and so many dollars in the donation bucket. If an open source project is dedicating a disproportionate percentage of that on a feature that a significant part of the community actively do not want: That is exactly WHY you fork a project.

    And once we consider the ideological and safety related reasons to not want facebook and giant corporate interests involved?

    I have a lot of issue with the people who decide the answer is harassment and hate. But if enough development and organizational energy want to fork this? Fuckin’ A.


  • Not sure if google is particularly different but the way this works for the other services is basically low energy bluetooth scanning coupled with the phones providing their location*. So basically all the devices on that scanning/spy network periodically ping/listen for nearby devices/trackers. When it finds one, it sends a quick message to the servers with that phone’s location and the ID of the tracker. Get enough of those pings and you can triangulate the position of the tracker pretty precisely.

    Which… is why this fundamentally does not work with “hacker” solutions that allegedly emphasize privacy. Because you just don’t have enough devices listening. This was painfully obvious with tile back in the day and is still an issue with Samsung in some countries.

    *: Via a combination of gps, cell tower, and wifi network scanning. The less obvious part of that being wifi networks which is the majority of how interior positioning works.


  • I mean… bluetooth is literally broadcasting your position (sort of/it depends on the implementation). It is not at all a stretch that you should turn that off if you care about privacy. Same with not scanning for what wifi networks are available or even pinging GPS satellites (because that leaves a log). Hell… cell tower logs are a treat for cops/TLAs for a reason.

    Aside from that? Good for you. If you actually follow through on that I can respect it. My point is more that this particular solution seems like the worst of all worlds.

    Either you are demolishing your battery with regular phone homes to a server you hopefully control or you are relying on a push via SMS and the hope that you lose your phone somewhere you havea reception. And you still only have YOUR phone and YOUR network to track it which has significant drawbacks if you travel.


  • If people truly change their lives and focus on it, you can do a lot. But it does not take much, at all, to become compromised to one degree or another and people vastly underestimate the amount of redundancy. Or even the impact of a sibling or partner or even friend.

    Instead, the common case is people will tweak one small aspect and think that does anything other than inconvenience them. Or, worse, they’ll watch a youtube and decide to put EVERYTHING through their vpn which… defeats the purpose because they are still one easily collated set of profiles/cookies that can trivially reveal that “Fred Smith in Afghanistan” is really “Fred Smith in North Carolina”

    Which is why my approach is that there is data I very much want to protect and data I know I can’t. So I focus on understanding the former while doing what I can with the latter.

    And something like this? There are probably specific niche use cases for this. But it is a product/service that fundamentally requires aggregated data. And, depending on the implementation, it is going to fuck with your battery hard.



  • I guess. But it is really going to depend on where you live and just how frequently it does dial home.

    My personal use for these networks is luggage tags. But a friend lost her phone on a hike a few years back and the find my phone stuff was more or less useless due to poor reception and ever dwindling battery.

    The real benefit is the low energy bluetooth magic and OTHER devices to do the phoning home. Because maybe I have shit reception but someone hiking a hundred feet away has good reception and updates the ping.


  • Took a bit to figure out what it was even claiming to do

    When enabled your phone constantly sends e2e encrypted your location to the server where you can than access it from a webbrowser.

    God no. Just take a hatchet to my battery and be done with it.

    Also: Until a month or two ago, sure. But google finally got their shit together-ish and set up a tracking network the same as apple and samsung. And that is what you are sacrificing your privacy for. Yes, you give Big Tech tracking information… that they already have. In exchange you can actually have peace of mind of knowing your luggage is in the same airport or even where you parked. And you can’t really self-host a crowd-sourced network.





  • NuXCOM_90Percent@lemmy.ziptoFediverse@lemmy.worldLemmy.ml tankie censorship problem
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    1 month ago

    Again, how does that work if c/linux is “the same” on every instance?

    Will comments and posts exist on the world view of c/linux but not the zip view? At which point… what are we actually getting over the status quo? Because you can bet that anyone who has hexbear unblocked would see two different versions of every single thread because nobody else would see the hexbear posted thread.


  • There have been a number of articles (pop and scholarly) about malicious code being social engineered into codebases over the past few years. And, in this case, the malice is “expected” from one of the long time developers to begin with.

    Also: We got INCREDIBLY lucky that Andres Freund detected it when he did. Because that was hitting right around the time a lot of the major distros were preparing their major releases (Fedora basically escaped by the skin of their teeth).

    Malicious manipulation of open source projects has always been a concern. And the vast majority of us do the equivalent of signing whatever form we are given because “oh it just looks like a standard contract”.


  • What you are describing is basically Mastodon (or, if you like porn and hatespeech, twitter… non-consensual porn because a lot of Mastodon instances are REALLY horny).

    The moment you aggregate communities across instances you remove the ability to moderate them. Because maybe a hexbear mod wants to remove all mention of the Uyghur people, an ml mod wants to remove all mention of genocide against them, and a zip mod wants to remove all the comments about why genocide is good in a thread about god damned Bluey.

    Do they all get to delete everything across every instance? Do you start having different views of the same community depending on your home instance?


  • All moderator elections would do is let chuds stack the ballot. Look up shit like the sad puppies debacle.

    The answer is that a site needs to decide what its rules are and then moderators need to enforce those rules, regardless of how the community feels. Which, ironically, is what ml is doing (even if they don’t publicize those rules). And if the community dislikes the rules, you disassociate with them.

    The issue with the fediverse is that you need to defederate or else you are tacitly approving of their bullshit.


  • NuXCOM_90Percent@lemmy.ziptoFediverse@lemmy.worldLemmy.ml tankie censorship problem
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    edit-2
    1 month ago

    You… should probably pay more attention to the news.

    It is very possible for bad actors to inject malicious code into an open source project. And it is very probable for people to not notice because the vast majority of developers never read a single line of the open source code they claim to value so much.

    “Any bad code will be detected by the armies of people who do rigorous code analysis of every single pull request” was always nonsense.