Zero to racism in less than a few hours
Dessalines
- 127 Posts
- 690 Comments
Dessalines@lemmy.mlOPto
Lemmy@lemmy.ml•Anyone with experience using anubis on their lemmy server, have a good config?English
2·5 days agoI’m not an expert, but I think the fact that you need to set a
TARGETin anubis, IE, where does anubis send you after passing it, means that you do need separate anubis’s for each site.
Dessalines@lemmy.mlOPto
Lemmy@lemmy.ml•Anyone with experience using anubis on their lemmy server, have a good config?English
4·5 days agoLemmy has a separated UI and backend hosted on different ports, so its trivial for us to just only use anubis for the front end. We couldn’t put it in front of everything due to apps also.
Dessalines@lemmy.mlOPto
Lemmy@lemmy.ml•Anyone with experience using anubis on their lemmy server, have a good config?English
7·5 days agoYep, essentially the
botPolicy.yamlthere could be a collectively developed anubis config, based on what works best.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•Your phone is a snitch in your pocket, and the law won't save you. It's time to break the surveillance machine.
91·7 days agoIf phones did this, especially to custom-tailor ads, like I’ve seen claimed countless times, then security researchers would be perfectly capable of uncovering this behavior without someone on the inside.
When you make calls via these services, the entirety of that data is being routed through their service. What you’re asking is if google/apple actually stores that data. You should always assume they do, for a threat analysis.
I suggest reading about the Crypto AG honeypot scandal, which was a secure service that ran for over 60 years before it was revealed to be an CIA honeypot. Leaks in the future will likely reveal the same for US surveillance capital services.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•Your phone is a snitch in your pocket, and the law won't save you. It's time to break the surveillance machine.
141·7 days agoWould take a whistleblower to expose these things, and usually its done many years after.
Also its not that there’s some person currently listening. Its that they’re storing and probably transcribing all communications for all time, so that at any moment in the future, they can target a person and look up that history.
Also we know google and apple have been forwarding all these to the US goverment also, since at least ~2011, via the prism program, and thanks to Snowden and Manning’s leaks.
“The western world” in politics doesn’t usually refer to geography, but to the high income euro-amerikkkan countries who benefitted from hundreds of years of theft (much from the countries you mentioned), who based themselves on individualism, private property, and capitalism, and prided themselves on their opposition to the collectivist policies of eastern countries.
This is why Cuba for example is not considered part of the western world, yet japan and south korea are.
Marxists also generally use the term “global south” or “the periphery” to refer to lower-income / exploited via unequal exchange, even though there are some “middle” / lower income countries in the global north also. It gets confusing I know.
These are all incredibly weak justifications wrapped in legalese, that’s really just a thin posturing as to their position, which is white/western supremacy, and refusing to hold themselves accountable for hundreds of years of ongoing theft. The EU also refuses to vote for the condemnation of nazism using the same type of legalistic justifications.
I don’t have time to go through each of their sentences, but someone easily could ala the style of Marx’s critique of the gotha programme, because there’s hidden meanings and psychology behind almost every sentence that requires a paragraph.
Dessalines@lemmy.mlto
World News@lemmy.ml•The UN has voted 123-3 in favour to condemn the enslavement of Africans and the trans-Atlantic slave trade. Something, something, same map.
121·19 days agoOkay then, we’re taking all your stuff. When your kids want it back, we’ll say:
there’s no meaningful benefit to be gained by looking backward rather than forward.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
12·23 days agoYou have no idea what code their server is running, and its impossible to host your own signal since its a centralized service.
They went a whole year without publishing server code updates also, until they got a lot of backlash for it. Still, even publishing those is moot since its a centralized service.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
91·23 days agoWhat’s your normal standard of trust that a hosted, open source project is running the same code that they’ve made public?
Its a centralized service, you have no idea what code they’re running. You can’t host your own.
Also they went a whole year one time without publishing any server code updates until they got a lot of backlash for it. Still, since its centralized, it can’t be trusted to be running what they say they are.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
4110·24 days agoPRODUCT PITCH: Hey everyone, I have a great idea for a secure / private messaging service.
It’s hosted in the US, subject to its pervasive spying laws including national security letters.
Also I need all your phone numbers.
Also no you can’t host this yourself, I run the only server.
Everyone who uses signal and supports it, is falling for this pitch.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
62·24 days agoYour phone number is the biggest metadata you could possibly give (it means your real identity, including your current address), and signal has it.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
42·24 days agoNot true at all, you still need a phone number to sign up.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
25·24 days agoGive me ssh access to their centralized server so I can verify this “sealed sender” idea is working.
Otherwise this is a “trust me bro” claim.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•out of the loop, what's the problem with signal?
24·24 days agoSomething being easy to use has nothing to do with privacy or security. Apple, just like signal, also sold it’s products as secure, yet they also were forwarding all communications to the US government as part of the prism program.
Signal is not a stepping stone, it’s a honey pot. Best to avoid US services that require your identity entirely.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•Sheesh, the US is sure getting scary. Well, it's a good thing it would be impossible to trace Signal to someone via metadata like a phone number, right?
4·24 days agoThat isn’t true. You still need a phone number to sign up.
Dessalines@lemmy.mlto
Privacy@lemmy.ml•Sheesh, the US is sure getting scary. Well, it's a good thing it would be impossible to trace Signal to someone via metadata like a phone number, right?
62·24 days agoYour entire social network graphs, and timestamped message history.
No one can “prove” signal doesn’t store everything. If you give me ssh access to their server, then I can verify. Otherwise it’s “just trust me bro”.
















lemmy.ml seems to have a fairly low send queue to kbin.earth, but lemmygrad was behind and picked up within the last day
See if its resolved now.