Syn_Attck

@Syn_Attck@lemmy.today

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Syn_Attck, (edited )

Boy A and Boy B are now the most popular kids in school.

Kid was 2 years older? Totally legal and the top category on every porn site.

Syn_Attck,

Notice how it says it was consensual and they were at the age if consent?

Syn_Attck, (edited )

Hitman denies being hitman and you believe him, that’s your angle? I know you’re being intentionally obtuse, but it’s clear I was talking about the teenagers, not the woman trying not to be arrested.

Syn_Attck,

Also fonts like ::: spoiler spoiler OpenDysleiebnn

Syn_Attck, (edited )

My 6th grade English teacher was the hottest teacher in the school. She’d sit in a boys lap and then ask them to come to the board to answer a problem.

Later it came out publicly that much of the school administration and teachers, city council, and some of the religious leaders were involved in a large and well-known (among the adults, I guess?) swingers club. Small towns get down.

It did largely change the dynamic of the town after they all moved and got fired from what I hear. The abusive kids elementary gym teacher and later high school boy’s weight lifting coach became the principal, one or two principals after one fled the country because of rumors of inappropriate relations with a minor.

Edit: I’m curious if this is going to be one of those comments that get 10 replies from 10 different people from small towns of “Was this in Y city/state?”

Syn_Attck,

Make sure you take a big deep breath when testing the bag of ginger dust.

It’s a unique experience.

Syn_Attck,

There are many things you can do with JavaScript, and tor can only protect against so many without completely breaking many sites. Set your slider all the way to maximum and it will no longer detect windows, but it will very likely also no longer run.

Syn_Attck, (edited )

Tor browser from the arch repos is not stock torbrowser. Add repos for torproject/guardian project/whatever it’s called now, or use the torproject.org installer.

Syn_Attck,

I believe that is the case, if you inspected the HTTP headers and found if to show Linux instead of Windows. my last experience with that would have been years ago. Arch does like to compile things from source instead of using binary blobs, and compilers and configs can undo a lot of the work the torproject has done to combat fingerprinting, which is why it’s recommended to run the pre-built binary and install no plugins. However it’s important to note that it ALSO gives you a unique JavaScript fingerprint every time, when tools use as much information as possible to generate a fingerprint, because it generates new information on every reload. That’s why OPSEC is important and for can’t help you if you use it wrong. If you login to 2 different unlinked sites in the same session, and you don’t want them to be linked, too bad now they’re linked via JS fingerprinting. JavaScript is more or less a programming language within the browser, and you’ll never escape JavaScript fingerprinting. Which is why it’s important to learn how to use tor properly, and leave JS disabled as much as you can.

One thing you can do with your arch build is use the fingerprinting tool to see how unique you are, then get a new identity, then go back and do it again. Does it now say you’re one of 2 people who have used the tool, or does it show you’re (again) unique? If the latter, then it’s working (at least enough) properly.

Syn_Attck,

Thanks for the correction.

Syn_Attck,

They make it a whole lot harder, asking for photos of ID and selfies and bank statements directly from your bank, etc.

Amazon specifically. Unsure about other sites.

Syn_Attck,

Please tell me you work in tech. I want my daily lmfaoizzle.

Syn_Attck, (edited )

you can’t easily add it to any picture you want (if it’s implemented well

Edit for the downvoters: StackExchange - How do I add exif data to an image?

Going to need you to elaborate on this. EXIF data is just bytes in a file, like any of the other bytes in the file. It can be changed and is often changed without the users consent. Are you proposing we create a new type of hardware, something akin to Secure Enclave, and then mass-produce and add it to every consumer CPU to ensure some specific types of exif data isn’t tampered with?

Syn_Attck,

Current mental help methods for pedophiles include acceptance of their desires as normal, just not something to act on IRL.

I am not aware of the research in this area although I have a minor psych background so that’s interesting and makes sense in hindsight. My understanding is that a large part of the compulsion is driven by guilt, shame, feelings of worthlessness, prior victimizations of themselves, etc. Essentially trying to gain a sense of power by taking it from those more vulnerable than them, like an abuser beating their spouse because someone at work put them down. So it makes sense to encourage a sense of power and lessen any sense of guilt and shame.

On a side note, I can’t imagine having their name plastered everywhere does anything but trigger the compulsion to re-offend. Maybe when we advance more as a society, we can separate individuals into categories of has-offended and child-attracted, with the former being on a public danger list and the latter having frequent discreet visits by social workers and mandatory counselors, etc. To lessen the chance of offense and possibly start helping them before they get to the offense stage (those that were ever going to offend.)

Syn_Attck,

Source: his arse?

Even then, in his arse, they’d have to prove the person locked it.

But what’s worse, getting a tampering with evidence charge, or giving them everything?

Still would like to see his source.

Syn_Attck,

That’s not completely true. In most states if they are knocking down your door with a search warrant and you flush a kilo of heroin down the toilet, you’re getting an evidence tampering charge that will hold up in court.

Syn_Attck,

There’s a whole lot of caselaw surrounding this, and they will get someone to destroy the pipes to find out when they were flushed (their word goes, good luck finding someone impartial to say that wasn’t what happened). I wish court cases were built on 1’s and 0’s like computer code but that’s just not the way the world works.

www.augustachronicle.com/story/…/14540952007/

Syn_Attck,

Once this bill passes, there is absolutely nothing stopping the NSA from doing an IP lookup on this comment/my account, and putting me into a “potential domestic terrorist - watch closer” list. A list that will eventually be used later, for some reason or another, so let’s just hope we never get an authoritarian in the White House with stacked courts! That could never happen here, could it?

P.S. If you live in the US, just part of your connection going to another country (be it a CDN or server hosted in Canada, or US server gets overwhelmed and switches to Canada) - full content logs for you.

Cointelegraph is (was at least?) a reputable source for national security news. It’s mainly for OSINT and national security interested folks who know better than to do the majority of their research on a smartphone, so it may not be great on mobile, I don’t know.

Snowden chose Russia because the other option was life as a political prisoner without a chance at a fair trial. Egotist, sure, but at least we know what we know now. Can you imagine how fucked we’d be if he never leaked them?

And regardless of the source, (site or person quoted), what he’s saying is absolutely true. The NSA is about to be able to gather ALL mass communications and look at them whenever, without a warrant which was the only safeguard before.

I’m legitimately about to throw my tech into a fucking dumpster and get a dumbphone and a smartphone with all hardware removed besides what’s required by Briar.

Most will read this and think I’m being overly paranoid. When I talked about the FVEY (now 14EYES) surveillance dragnet before the Snowdon leaks, everyone thought the same.

https://lemmy.today/pictrs/image/3729ed0b-95b9-4b6f-af04-47dcfd7879ef.jpeg


Since some people are having issues with the site, here it is from the ACLU:

aclu.org/…/congress-passing-bill-that-massively-e…

ACLU Statement on Congress Passing Bill that Massively Expands the Government’s Power to Spy on Americans Without a Warrant

This bill would reauthorize Section 702 surveillance for two more years without any of the necessary reforms to protect Americans’ civil liberties

WASHINGTON — The House of Representatives passed a bill today that will reauthorize Section 702 of the Foreign Intelligence Surveillance Act for two years, expand the federal government’s power to secretly spy on Americans without a warrant, and create a new form of “extreme vetting” of people traveling to the United States.

When the government wants to obtain Americans’ private information, the Fourth Amendment requires it to go to court and obtain a warrant. The government has claimed that the purpose of Section 702 is to allow the government to warrantlessly surveil non-U.S. citizens abroad for foreign intelligence purposes, even as Americans’ communications are routinely swept up. In recent years, the law has morphed into a domestic surveillance tool, with FBI agents using Section 702 databases to conduct millions of invasive searches for Americans’ communications — including those of protesters, racial justice activists, 19,000 donors to a congressional campaign, journalists, and even members of Congress — without a warrant.

“Despite what some members would like the public to believe, Section 702 has been abused under presidents from both political parties and it has been used to unlawfully surveil the communications of Americans across the political spectrum,” said Kia Hamadanchy, senior policy counsel at the American Civil Liberties Union. “By expanding the government’s surveillance powers without adding a warrant requirement that would protect Americans, the House has voted to allow the intelligence agencies to violate the civil rights and liberties of Americans for years to come. The Senate must add a warrant requirement and rein in this out-of-control government spying.”

In the last year alone, the FBI conducted over 200,000 warrantless “backdoor” searches of Americans’ communications. The standard for conducting these backdoor searches is so low that, without any clear connection to national security or foreign intelligence, an FBI agent can type in an American’s name, email address, or phone number, and pull up whatever communications the FBI’s Section 702 surveillance has collected over the past five years.

The House passed all the amendments to expand this invasive surveillance that were pushed by leaders of the House Permanent Select Committee on Intelligence (HPSCI), the committee closest to the intelligence agencies asking for this power. The bipartisan amendment that would have required the government to obtain a warrant before searching Section 702 data for Americans’ communications failed 212-212.

Syn_Attck,

They don’t. They actively work with them to bypass all legal anti-mass-surveillance frameworks in place.

If you think you’re safe from the global internet surveillance dragnet just because you don’t live in the US, then boy do I have some news for you.

Syn_Attck,

Another day, another database.

Syn_Attck,

They can, but before (we learned from the Snowden docs) they had to have a legal reason and request a warrant if it was an American citizen, unless there was imminent harm. Now they don’t require that warrant.

Syn_Attck,

Tinfoil hat time… Repeated misquotes like this make me wonder if it’s a signal to someone who he isn’t able to contact directly because his communications are closely monitored.

It’s easy to say he’s just dumb, but clearly he’s quite capable. But maybe he’s just using filler words because he has fuck-all to say.

Syn_Attck,

So dumb he managed to find himself elected president of the United States, even.

‘Trump dumb’ is dangerous thinking.

Syn_Attck,

Signal is a great example of this but I don’t think you’ll find any ways to do it non-VoIP.

Syn_Attck,

Is hCAPTCHA not acceptable? There are other privacy-respecting CAPTCHA solutions available as well.

Got tracked down for my school reunion

Today I was contacted by someone at work. She graduated school with me and our 20 year reunion was coming up. Why did she contact me at work? It was the only way they were able to track me down. I was included in promotional material by name. She told me I "was the hardest to track down"and I had to smile....

Syn_Attck,

Um, why does it matter? He matured and changed. It’s a positive attribute, not a negative one.

Syn_Attck,

I see. Textual communication has a pesky habit of not conveying tone unless you intentionally craft it to. It bugs me that there are so many people who negatively judge someone for decades-old attitudes and worldviews, when positive change should be commended.

Not you, since your comment was in jest, but I question the motives of those think that way unironically.

Syn_Attck,

DMT already did it.

Syn_Attck,

With that username, this photo is all you should ever comment.

Syn_Attck,

If everyone gets busted all at once (2022-2024 market takedowns is as close to that as it could come IMO) then everyone immediately stops using tor and starts using i2p or freenet or whatever system they may not have broken yet. That’s baaahd for business, said the wolf in sheep’s clothing.

Although they did run a cp site for months before shutting it down, so they’re clearly not opposed to the long-game, especially if it involves national security (it does.)

Syn_Attck,

What I’m talking about wrt tor is traffic shaping or node DoS leading to a Sybil attack. When the (state)actor has the ability to drop all packets from you to NON attacker-controlled guard nodes, and then once you’re connected to a dirty guard, drop all connections to non-controlled relay and exit nodes, it’s done. There’s also an ongoing DoS attack that is able to make any guard/entry/relay/exit use 100% CPU making them unusable and it’s been going on for months now. You can see it on the tor forums (relay-operators) and someone posted about it in more detail on the monero subreddit the other day.

Syn_Attck,

It’s not even a matter of gaining control of nodes, they can simply blackhole your access to good nodes so you end up with nodes controlled by them. Easy but loud, although it seems to be what’s going on in a number of cases, and not many people are talking about it. Tor used to alert you to this, but now it’s quietly tucked away into a log file. There are other vulnerabilities present in tor and the tor project devs don’t seem particularly interested in them, with the DoS attacks requiring the community itself to step in with hacky solutions. I’m of the mind (never would have found myself saying this) that the tor project at large is compromised.

Monero is currently being hit by a (likely) black marble attack which is why it’s so slow. They’re basically flooding transactions (1/3 to 2/3 of all transactions able to be processed at any given time) so that the anonymity that makes monero work is severely degraded. Whether it breaks past transactions remains to be seen, but it absolutely weakens the anonymity of transactions done during (possibly shortly before and after) the attacks.

Syn_Attck,

Literal torture. There’s a reason LSD proved to be an ineffective truth serum… What’s going on inside the head is far worse than what could possibly go on outside the head.

Always trip with someone with actual experience, kids. There are ways to escape a bad trip, so ask your trip-buddy how they plan to ease a trip that’s going south, and if they can’t tell you 5 things off the top of their head, they’re full of it. But the best way is to start small and ease into it. Once you’ve gauged the dose and purity, you can have a bigger trip next weekend.

Syn_Attck, (edited )

Friendly reminder that Bluetooth has a larger network stack than Wi-Fi. Much more code, much larger available attack base. There have been many numerous Bluetooth vulnerabilities that allow remote code execution or theft of files.

This is truly becoming a surveillance state, in no way that can be debated. That want to be able to access everyone’s innermost thoughts (texts, notes, recordings, calendars, contacts, photos, you get it) without any chance of someone being able to protect against it.

Reminder that Google was the 2nd or 3rd company to commit to NSA’s PRISM program of feeding American’s data for future analysis.

Syn_Attck,

Find a good girl that doesn’t mind. Mine doesn’t care at all, she has her interests and I have mine. I’ll sit there and listen to her 5 minute lectures on makeup and perfumes, and every once in a while I’ll tell her about a vulnerability or something cool I found, and I know she’s paying as much attention as I do about makeup, but at least I can understand the basics of makeup without years of experimentation and learning.

True, it makes it harder to stay secure when people around you don’t care or don’t know how, but its still possible. Just have to set some solid boundaries sometimes.

Syn_Attck,

Mass centralization. Old school forums like phpBB and SMF and vBulletin and new-school forums like self-hosted discourse are also centralized, but by one small user calling the shots, and it’s very clear immediately which forums are well-run. If a forum isn’t well-run with a good community, a ‘competitor’ will quickly pop up that is, and people will go to it. Sure, you have to have some tech skills but there are easy guides for all of it. Discourse is a simple docker image and it’s the best for features and engagement IMO.

Sure you have to sorry about DDoS attacks and staying patched, but you can use OVH or another host with a large infrastructure that had DDoS resistant servers. Or, god forbid, cloudflare.

Syn_Attck,

On a federal level I don’t believe you have to register a gun if it’s given to you as a gift or sold by an individual, but it definitely varies by state.

Anyone know exactly what info Youtube captures from you from its browser version (and by what means)?

I know the prevailing sentiment for a long time in the privacy community has been “DAE Youtube bad?” though I have always thought that it is kinda overblown. Besides, I am using Firefox which is supposed to isolate tabs so they can’t speak to each other, so I felt a small amount safer using Youtube....

Syn_Attck,

No you’re not being paranoid its how it works. No browser isolates tabs like you’re talking about unless you use containers. Google owns the largest ad company on the internet, so any site that embeds their tracking scripts (most of the Western internet) will send the page you visited to Google, so they know what pages you’re going to, and highly likely use that information to inform the YouTube algorithm about you. Even if you have a tracker blocker installed, like unlock Origin, if you use Google they still know which link you clicked and what you searched.

Syn_Attck,

not this again.

it’s ketchup mfer, 57 varieties of tomatoes!

Syn_Attck,

Interesting thumbnail strategy on this ad. It’s hard to see it as just a seat. My mind keeps trying to make it into a human palm, so I’m seeing a tiny Polly Pocket tablet and stylus.

Syn_Attck,

Ah yes, the infamous rib removal. That’s why he doesn’t walk anymore, he just kind of stumbles in the direction he’s currently flailing in.

Syn_Attck,

What guarantees do you have that Malus doesn’t copy your key to their cloud?

I remember when I used a Samsung Galaxy as by daily driver a couple years back. I enabled full disk encryption and thought okay great, now that’s done. I noticed a very small, brief popup on my screen that lasted a few seconds, and it was a notice that my key had been sent to Samsung servers. Apparently you have to disable that option that’s hurried deep in the settings somewhere no one would think to look, and change your password again. If I hadn’t caught that brief notification at the bottom of the screen (not the normal location for notifications), I’d never have known.

The encryption password is also a max of 15 characters.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • fightinggames
  • All magazines