« Dans une interview de Wired UK, le président de Softbank, une entreprise japonaise qui a récemment créé un fonds d’investissement de 100 milliards de dollars, a dit : nous sommes la nouvelle #noblesse. Il explique ouvertement qu’il souhaite connaître tout ce qui vous concerne : vos appels téléphoniques, l’hôpital où vous allez, le restaurant où vous mangez… Car selon lui, ceux qui connaissent tout cela contrôlent les #données et contrôlent le #monde. C’est une #autocratie, et les dirigeants de cette autocratie ne s’en cachent même plus. Ce n’est pas de la science-fiction. »#Gafam #Logiciel #Surveillance #Riche #SurRiche #Oligarchie #Ploutocratie #Totalitarisme par le #Numérique - Solution : #LogicielLibre #OpenSource #Décentralisé
Not content to only wield its creepy surveillance infrastructure against warehouse workers and employees considering unionization, Amazon is reportedly gearing up to install perpetually-on cameras inside its fleet of delivery vehicles as well.This is the company that paid workers less than they promised and even used workers' tips to pay them. Now they not only want to surveil their ~~slaves~~ drivers, they want to distract their driving with verbal warnings!
Not content to only wield its creepy surveillance infrastructure against warehouse workers and employees considering unionization, Amazon is reportedly gearing up to install perpetually-on cameras inside its fleet of delivery vehicles as well.gizmodo.com
The privacy issue has been raised most insistently with respect to the creation and maintenance of longitudinal data files that assemble information about persons from a multitude of sources. Files of this kind would be highly valuable for many kinds of economic and social research, but they are bought at too high a price if they endanger human freedom or seriously enhance the opportunities of blackmailers. While such dangers should not be ignored, it should be noted that the lack of comprehensive data files has never been the limiting barrier to the suppression of human freedom. The Watergate criminals made extensive, if unskillful, use of electronics, but no computer played a role in their conspiracy. The Nazis operated with horrifying effectiveness and thoroughness without the benefits of any kind of mechanized data processing.As we know now, Nazi German DID have extensive mechanised data processing, supplied, contracted, supported, and organised by IBM: https://www.ibmandtheholocaust.com/
There was a time when people who were exploring computational technology saw it as the path toward decentralization and freedom worldwide. What we have ended up with, instead, is a world that is increasingly centralized, subject to surveillance, and unfree. How did that come to be? In a keynote at the online 2021 linux.conf.au event, Cory Doctorow gave his view of this problem and named its source: monopoly.https://lwn.net/SubscriberLink/844102/a23d1543b5a55cae/
There was a time when people who were exploring computational technology saw it as the path toward decentralization and freedom worldwide. What we have ended up with, instead, is a world that is increasingly centralized, subject to surveillance, and unfree. How did that come to be? In a keynote at the online 2021 linux.conf.au event, Cory Doctorow gave his view of this problem and named its source: monopoly.lwn.net
Tout a commencé par une phrase lue dans un livre ...www.franceinter.fr
Depuis deux jours, un nombre croissant d’utilisateurs reçoivent un message d’information de Facebook en ouvrant WhatsApp : de nouvelles conditions d’utilisation et politique de confidentialité doivent être acceptées d’ici le 8 fév...www.nextinpact.com
... Due to porous data protection measures in Russia, it only takes some creative Googling (or Yandexing) and a few hundred euros worth of cryptocurrency to be fed through an automated payment platform, not much different than Amazon or Lexis Nexis, to acquire telephone records with geolocation data, passenger manifests, and residential data. For the records contained within multi-gigabyte database files that are not already floating around the internet via torrent networks, there is a thriving black market to buy and sell data. The humans who manually fetch this data are often low-level employees at banks, telephone companies, and police departments. Often, these data merchants providing data to resellers or direct to customers are caught and face criminal charges. For other batches of records, there are automated services either within websites or through bots on the Telegram messaging service that entirely circumvent the necessity of a human conduit to provide sensitive personal data.https://www.bellingcat.com/resources/2020/12/14/navalny-fsb-methodology
For example, to find a huge collection of personal information for Anatoliy Chepiga — one of the two GRU officers involved in the poisoning of Sergey Skripal and his daughter — we only need to use a Telegram bot and about 10 euros. Within 2-3 minutes of entering Chepiga’s full name and providing a credit card via Google Pay or a payment service like Yandex Money, a popular Telegram bot will provide us with Chepiga’s date of birth, passport number, court records, license plate number, VIN number, previous vehicle ownership history, traffic violations, and frequent parking locations in Moscow. A sample of the baseline information provided can be seen below, with key personal details censored. ...
... Due to porous data protection measures in Russia, it only takes some creative Googling (or Yandexing) and a few hundred euros worth of cryptocurrency to be fed through an automated payment platform, not much different than Amazon or Lexis Nexis, to acquire telephone records with geolocation data, passenger manifests, and residential data. For the records contained within multi-gigabyte database files that are not already floating around the internet via torrent networks, there is a thriving black market to buy and sell data. The humans who manually fetch this data are often low-level employees at banks, telephone companies, and police departments. Often, these data merchants providing data to resellers or direct to customers are caught and face criminal charges. For other batches of records, there are automated services either within websites or through bots on the Telegram messaging service that entirely circumvent the necessity of a human conduit to provide sensitive personal data.https://www.bellingcat.com/resources/2020/12/14/navalny-fsb-methodology
For example, to find a huge collection of personal information for Anatoliy Chepiga — one of the two GRU officers involved in the poisoning of Sergey Skripal and his daughter — we only need to use a Telegram bot and about 10 euros. Within 2-3 minutes of entering Chepiga’s full name and providing a credit card via Google Pay or a payment service like Yandex Money, a popular Telegram bot will provide us with Chepiga’s date of birth, passport number, court records, license plate number, VIN number, previous vehicle ownership history, traffic violations, and frequent parking locations in Moscow. A sample of the baseline information provided can be seen below, with key personal details censored. ...
This year has seen a rush amongst government snoops for a new and sometimes contentious data set: location data grabbed by smartphone popular apps. Customs and Border, the FBI, the U.S. military and other federal agencies have been keen buyers, though it’s caused a furor amongst privacy and human rights watchdogs. The outcry this week led Apple and Google to kick apps containing location-grabbing code from Reston, Virginia-based provider X-Mode out of their respective app stores.#technology #tech #security #privacy #hacking #surveillance #DataProtection
But Israeli surveillance vendors are also getting in on the act, Forbes has learned.
The tools have the ability to track someone’s location using their phone and one product promises “mass collection of all internet users in a country.”www.forbes.com
I looked at rock type (Sandstone), color (red and white - no black streaks like found on higher cliffs in Utah), shape (more rounded indicating a more exposed area and erosion), the texture of the canyon floor (flat rock vs sloped indicating higher up in a watershed with infrequent water), and the larger cliff/mesa in the upper background of one of the photos. I took all that and lined it up with the flight time and flight path of the helicopter - earlier in the morning taking off from Monticello, UT and flying almost directly north before going off radar (usually indicating it dropped below radar scan altitude. From there, I know I am looking for a south/east facing canyon with rounded red/white rock, most likely close to the base of a larger cliff/mesa, most likely closer to the top of a watershed, and with a suitable flat area for an AS350 helicopter to land. Took about 30 minutes of random checks around the Green River/Colorado River junction before finding similar terrain. From there it took another 15 minutes to find the exact canyon. Yes... I'm a freak.-- /u/Bear__Fucker @ reddit
You have: ln((.3 * 4 * (earthradius^2) * pi)/10m^2)/ln(2)
Definition: 43.798784
You have: ln((1 * 4 * (earthradius^2) * pi)/10m^2)/ln(2)
Definition: 45.535749
* What is called censorship when practiced by a government is content filtering when practiced by an organization. Many companies want to keep their employees from viewing porn or updating their Facebook pages while at work. In the other direction, data loss prevention software keeps employees from sending proprietary corporate information outside the network and also serves as a censorship tool. Governments can use these products for their own ends.https://www.schneier.com/essays/archives/2013/03/it_for_oppression.html
* Propaganda is really just another name for marketing. All sorts of companies offer social media-based marketing services designed to fool consumers into believing there is “buzz” around a product or brand. The only thing different in a government propaganda campaign is the content of the messages.
* Surveillance is necessary for personalized marketing, the primary profit stream of the Internet. Companies have built massive Internet surveillance systems designed to track users’ behavior all over the Internet and closely monitor their habits. These systems track not only individuals but also relationships between individuals, to deduce their interests so as to advertise to them more effectively. It’s a totalitarian’s dream.
* Control is how companies protect their business models by limiting what people can do with their computers. These same technologies can easily be co-opted by governments that want to ensure that only certain computer programs are run inside their countries or that their citizens never see particular news programs.
Technology magnifies power, and there’s no technical difference between a government and a corporation wielding it. This is how commercial security equipment from companies like BlueCoat and Sophos end up being used by the Syrian and other oppressive governments to surveil — in order to arrest — and censor their citizens. This is how the same face-recognition technology that Disney uses in its theme parks ends up identifying protesters in China and Occupy Wall Street protesters in New York.
It turns out that in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn’t realize this, because it’s silent and invisible and it fails instantly and gracefully when you’re offline, but today the server got really slow and it didn’t hit the fail-fast code path, and everyone’s apps failed to open if they were connected to the internet.https://sneak.berlin/20201112/your-computer-isnt-yours/
youtube-dl
Is Not Goneyoutube-dl
is not gone. It's only gone from GitHub, which all right-thinking projects have already left, anyway. (Check out https://codeberg.org/).youtube-dl
now the way we always have.sudo curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o /usr/local/bin/youtube-dl
sudo chmod a+rx /usr/local/bin/youtube-dl
~/bin
is in PATH
like this.curl -L [url=https://yt-dl.org/downloads/latest/youtube-dl]https://yt-dl.org/downloads/latest/youtube-dl[/url] -o ~/bin/youtube-dl
chmod 755 ~/bin/youtube-dl
youtube-dl
without using sudo
. We update youtube-dl
with youtube-dl -U
. It's necessary to update youtube-dl
often.youtube-dl
.... The clear purpose of this source code is to (i) circumvent the technological protection measures used by authorized streaming services such as YouTube, and (ii) reproduce and distribute music videos and sound recordings owned by our member companies without authorization for such use. We note that the source code is described on GitHub as “a command-line program to download videos from YouTube.com and a few more sites.” ...https://github.com/github/dmca/blob/master/2020/10/2020-10-23-RIAA.md
Repository with text of DMCA takedown notices as received. GitHub does not endorse or adopt any assertion contained in the following notices. Users identified in the notices are presumed innocent u...github.com
The case shows how Apple is willing to help even where the context of the crime is controversial, namely the Black Lives Matter protests. That’s despite President #Trump and Attorney General William Barr lambasting the company for failing to help track down serious criminals while caving in to the demands of the Chinese #government.#police #usa #surveillance #crime #blacklivesmatter #technology #tracking #smartphone
Man arrested after the FBI claims that iCloud images indicate that he made Molotov cocktails to torch police cars during protests against police brutality in the Black community.www.forbes.com
The scariest thing about microtargeted ads is that they just don’t work.www.wired.com
Amazon announced a program to scan and store images of customers' palms. Privacy experts call this "a terrible idea."mashable.com
Amazon PR demanding we correct an article because we referred to an Echo as a "microphone"-- Jason Koebler / Vice
While it’s natural to be chiefly concerned about privacy when your apartment comes with an Amazon microphone pre-installed...
Amazon PR demanding we correct an article because we referred to an Echo as a "microphone"nitter.net
The NSA's bulk phone records collection is dead. It died of exposure. And reform. It was Ed Snowden's first leak back in 2013. A few years later, a reform bill prompted by Snowden's leaks revamped the program, forcing the NSA to tailor...www.techdirt.com