landbanking
Major conflict of interest for a big retailer to hold property beyond what they occupy themselves.
landbanking
Major conflict of interest for a big retailer to hold property beyond what they occupy themselves.
Yep. It works and it’s awesome. I use conversations on android devices and dino and gajim on desktops, various family members use siskin on iOS.
With zero app or server-software or provider lock-in, and an actual in-practice diversity of apps and providers, the whole thing seems pretty immune to enshittification.
What then? Maybe 98% supports + 2% doesn’t support the genocide?
That 2% because a genocide might be a bit inconvenient with an election coming up?
[alt-text for the vision-impaired] Image appears to be a twitter post from Craig Murray posted on 2023-10-14: “To be entirely plain. I have always viscerally opposed war. I have dedicated my life to conflict resolution and reconciliation. But in the coming Gaza genocide, every act of armed resistance by Hamas and Hezbollah will have my support. If that is a crime, send me back to jail.”
Hmm. Could be seen as a rather outlandish thing to say in the immediate aftermath of 2023-10-07, but in hindsight with what we know now in terms of what atrocities the Israeli military forces have brought upon the people of Gaza since that attack on Israel, it seems a reasonable statement to support armed resistance against the coming episode of genocide which indeed materialised and continues today.
Well within the budget of a private investigator or burglar or peeping-tom or abusive ex-partner.
No need to scale; plenty of privacy/security incursions don’t require mass-surveillance.
That said, I’d suggest that the attack does scale economically . Think war-driving but with one of these setups – cruising around in a van through a dense neighbourhood collecting short clips of cctv footage looking for something of interest.
[…] the attack is an extremely expensive nation state level operation that doesn’t scale.
About $250 at most. Quoting the linked page:
Below is a list of equipment we used for the experiments.
- (1) Software Defined Ratio (SDR): Ettus USRP B210 USRP, ~$2100.
- (2) Low Noise Amplifier (LNA): Foresight Intelligence FSTRFAMP06 LNA, ~$200.
- (3) Directional Antenna: A common outdoor Log-periodic directional antenna (LPDA), ~$15.
- (4) A laptop, of course.
Note that the equipment can be replaced with cheaper counterparts. For example, USRP B210 can be replaced with RTL-SDR that costs ~$30.
To reproduce the attack: our GitHub repository provides the codes and instructions for reproducing and understanding the attack. We have prepared a ready-to-use software tool that can produce real-time reconstructions of the eavesdropped videos with EM signal input from the USRP device.
I wonder when (if?) orbital radio receiver arrays (a la starlink) are sensitive and discriminating enough to be used for this type of attack.
Yeah, I made a small batch one year with excess comb/pollen/etc I had left over from a hive, and even after a few months it was, …interesting, but a tasted bad/wrong. I was moving house and discarded (!) the last couple of bottles.
5 years later I was visiting a friend and they’d found a bottle of it that I’d given to them, and it was just awsome… f’ing strong, but so smooth, and woah what depth of flavour.
When: Mar 17, 6:00 PM AEDT
No, the “distributor” is the part which runs on your portable device, receives the push notifications, and wakes up the target apps as necessary.
Spoiler (next season’s twist): CIA also has an “A-Team”.
Conversations can be a unified push distibutor: https://unifiedpush.org/users/distributors/conversations/
…and I’d trust it (battery-wise) with that. I have an old tablet with conversations running without battery restrictions on it, and if I’m not actually picking it up and using it it regularly goes 1-2 weeks on an 80% battery charge before it dies, the whole time giving audible notifications for XMPP messages/calls (which I attend to on other devices).
Apart from the pleasant one on the left, they’re all the worst. The 4th from the right is almost good, but then you notice the creepy-as-fuck centre tine-gap length.
deleted by creator
To be clear though: by E2EE here I mean browser-side encryption with zero-knowledge on the server side.
Etherpad is still encrypted in transit with https; only the server can snoop.
Cryptpad and other web-based E2EE services can still be completely compromised server-side by serving malicious code to the browser, and practically the user would never know.
Cryptpad:
Etherpad:
PrivateBin:
Slavery, abortion, prison, or guns?