Why exactly does vehicleprivacyreport want my VIN instead of year make and model? That’s me giving an unvetted third party website the unique tracking token for my car….
Why exactly does vehicleprivacyreport want my VIN instead of year make and model? That’s me giving an unvetted third party website the unique tracking token for my car….
And only some e-bikes have a built-in cell phone.
My personal opinion is that concealed filming in public should be illegal. Open filming should be courteous, and if someone requests they not be filmed (and they’re not a public figure/government employee), the filmer should honor that.
Otherwise, I see no problem with it, and I’ve been filmed in public a LOT.
I miss the roflcopter.
Ah; but do they have plans /not/ to phase out v2?
Because if they don’t, phasing it out will eventually be the easiest way to maintain their codebase and performance.
I guess my suggestion wouldn’t be useful then… I was a GrandCentral customer in 2006. When Google bought them I became a Google Voice customer and still am. It’s been convenient to have the same US numbers for 18 years. I wouldn’t run anything private through the service though.
Not quite; the contents all go in a bag labeled “trash” — someone still has to remove it from the locker.
Indeed. If true, it means Apple’s technology doesn’t work the way they claim. Which is a really big issue.
You cross posted twice?
If you use it for everything, when you use it ceases to be useful information for data gatherers.
It’s why companies have data retention policies. That way they can’t be accused of intentionally destroying data to hide things, because they destroy ALL data like that.
It happens in English too — just think about how many people never learned how to properly use paragraphs, quotations, hyphens, parentheses and footnotes.
It’s just the human condition to attempt to communicate in known blobs without thinking about what you’re actually trying to communicate and how it can be most effectively done with the tools at hand.
We’re all single hammer hominids at heart.
At least they can observe the patterns….
Bless your heart.
Not to mention, SMS was removed because it’s inherently insecure at every level. Keeping it would mean there’d be an insecure side channel into the protocol. While it’s a useful onboarding mechanism, it can also be abused — and was. So eventually it got removed to prefer privacy and security over convenience.
So? Tor is in a similar boat.
Government agencies need secure crypto to hide their activities, and it doesn’t work if they’re the only ones using the technology.
I saw a user’s hash just this week — it was in a ransom note. They required their victims to sign up for the service and text a code to their userhash to kick off sending the attacker cryptocurrency so they’d send a decryption key and not make stolen data public.
Other than that use case, it hasn’t picked up many users that I’m aware of.
Anyone have a TL;DR?
This sounds like you’d have to spend a lot of time managing it and that you’d have to trust the people you know for it to be private.
My rule has always been: everything should be done anonymously online unless you want everyone (including automated dragnets) to know about it.
And this is why you never ever use ISP DNS, run DNS over HTTPS in the browser, and always use encrypted networking.
And use VPNs appropriate to the activity, when appropriate.
Oh, and never turn on ISP-supplied WiFi, as that gives them full access to the traffic from every device on your LAN, what physical hardware you own, and even where it is located in your home (and when it leaves and comes back to your home).
Oddly, it sounds like the facial recognition actually worked. Most such systems have a huge FP rate, so are useful for narrowing the search but not dependable for identifying that someone in footage is actually that person.
The problem here is more the intel backing it and the actions taken as a result; it sounds like the actual use of the tech is being done in an appropriate manner to account for potential FPs.
In other words, the problem is persecuting and killing Palestinians and equating alleged association with guilt, not with facial recognition tech.
Theoretically, the SIM has its own MAC that’s used for routing on the cellular network; however, the network is required to route 911 calls even without a SIM, and that’s done via IMEI.