Rebecca Joynes allegedly became pregnant after having sex with one of her victims, known as boy B, Manchester Crown Court heard - she denies the allegations against her....
Hitman denies being hitman and you believe him, that’s your angle? I know you’re being intentionally obtuse, but it’s clear I was talking about the teenagers, not the woman trying not to be arrested.
Edit to say because I kinda feel bad now: I have nothing against English teachers! Please don’t send your mafia of learned lit nerds after me! …Or do, lit nerds are hot.
My 6th grade English teacher was the hottest teacher in the school. She’d sit in a boys lap and then ask them to come to the board to answer a problem.
Later it came out publicly that much of the school administration and teachers, city council, and some of the religious leaders were involved in a large and well-known (among the adults, I guess?) swingers club. Small towns get down.
It did largely change the dynamic of the town after they all moved and got fired from what I hear. The abusive kids elementary gym teacher and later high school boy’s weight lifting coach became the principal, one or two principals after one fled the country because of rumors of inappropriate relations with a minor.
Edit: I’m curious if this is going to be one of those comments that get 10 replies from 10 different people from small towns of “Was this in Y city/state?”
Hey all, I'm trying to be a little more economical and reduce the amount of food I waste, and was wondering if there were any open-source apps that can track the best-before dates of the foods I buy so I can improve my meal-planning....
It was at the Securedrop website. How did I end up there ? I read something about Sequoia and encryption and then wanted to see what Securedrop entailed....
There are many things you can do with JavaScript, and tor can only protect against so many without completely breaking many sites. Set your slider all the way to maximum and it will no longer detect windows, but it will very likely also no longer run.
Tor browser from the arch repos is not stock torbrowser. Add repos for torproject/guardian project/whatever it’s called now, or use the torproject.org installer.
I believe that is the case, if you inspected the HTTP headers and found if to show Linux instead of Windows. my last experience with that would have been years ago. Arch does like to compile things from source instead of using binary blobs, and compilers and configs can undo a lot of the work the torproject has done to combat fingerprinting, which is why it’s recommended to run the pre-built binary and install no plugins. However it’s important to note that it ALSO gives you a unique JavaScript fingerprint every time, when tools use as much information as possible to generate a fingerprint, because it generates new information on every reload. That’s why OPSEC is important and for can’t help you if you use it wrong. If you login to 2 different unlinked sites in the same session, and you don’t want them to be linked, too bad now they’re linked via JS fingerprinting. JavaScript is more or less a programming language within the browser, and you’ll never escape JavaScript fingerprinting. Which is why it’s important to learn how to use tor properly, and leave JS disabled as much as you can.
One thing you can do with your arch build is use the fingerprinting tool to see how unique you are, then get a new identity, then go back and do it again. Does it now say you’re one of 2 people who have used the tool, or does it show you’re (again) unique? If the latter, then it’s working (at least enough) properly.
A sex offender convicted of making more than 1,000 indecent images of children has been banned from using any “AI creating tools” for the next five years in the first known case of its kind....
Going to need you to elaborate on this. EXIF data is just bytes in a file, like any of the other bytes in the file. It can be changed and is often changed without the users consent. Are you proposing we create a new type of hardware, something akin to Secure Enclave, and then mass-produce and add it to every consumer CPU to ensure some specific types of exif data isn’t tampered with?
Current mental help methods for pedophiles include acceptance of their desires as normal, just not something to act on IRL.
I am not aware of the research in this area although I have a minor psych background so that’s interesting and makes sense in hindsight. My understanding is that a large part of the compulsion is driven by guilt, shame, feelings of worthlessness, prior victimizations of themselves, etc. Essentially trying to gain a sense of power by taking it from those more vulnerable than them, like an abuser beating their spouse because someone at work put them down. So it makes sense to encourage a sense of power and lessen any sense of guilt and shame.
On a side note, I can’t imagine having their name plastered everywhere does anything but trigger the compulsion to re-offend. Maybe when we advance more as a society, we can separate individuals into categories of has-offended and child-attracted, with the former being on a public danger list and the latter having frequent discreet visits by social workers and mandatory counselors, etc. To lessen the chance of offense and possibly start helping them before they get to the offense stage (those that were ever going to offend.)
It’s much better to go through the list of data brokers manually and submit your information twice a year, if you have the time. Like doing taxes, but for privacy.
The legal situation is more complex and nuanced than the headline implies, so the article is worth reading. This adds another ruling to the confusing case history regarding forced biometric unlocking.
That’s not completely true. In most states if they are knocking down your door with a search warrant and you flush a kilo of heroin down the toilet, you’re getting an evidence tampering charge that will hold up in court.
There’s a whole lot of caselaw surrounding this, and they will get someone to destroy the pipes to find out when they were flushed (their word goes, good luck finding someone impartial to say that wasn’t what happened). I wish court cases were built on 1’s and 0’s like computer code but that’s just not the way the world works.
Once this bill passes, there is absolutely nothing stopping the NSA from doing an IP lookup on this comment/my account, and putting me into a “potential domestic terrorist - watch closer” list. A list that will eventually be used later, for some reason or another, so let’s just hope we never get an authoritarian in the White House with stacked courts! That could never happen here, could it?
P.S. If you live in the US, just part of your connection going to another country (be it a CDN or server hosted in Canada, or US server gets overwhelmed and switches to Canada) - full content logs for you.
Cointelegraph is (was at least?) a reputable source for national security news. It’s mainly for OSINT and national security interested folks who know better than to do the majority of their research on a smartphone, so it may not be great on mobile, I don’t know.
Snowden chose Russia because the other option was life as a political prisoner without a chance at a fair trial. Egotist, sure, but at least we know what we know now. Can you imagine how fucked we’d be if he never leaked them?
And regardless of the source, (site or person quoted), what he’s saying is absolutely true. The NSA is about to be able to gather ALL mass communications and look at them whenever,without a warrant which was the only safeguard before.
I’m legitimately about to throw my tech into a fucking dumpster and get a dumbphone and a smartphone with all hardware removed besides what’s required by Briar.
Most will read this and think I’m being overly paranoid. When I talked about the FVEY (now 14EYES) surveillance dragnet before the Snowdon leaks, everyone thought the same.
ACLU Statement on Congress Passing Bill that Massively Expands the Government’s Power to Spy on Americans Without a Warrant
This bill would reauthorize Section 702 surveillance for two more years without any of the necessary reforms to protect Americans’ civil liberties
WASHINGTON — The House of Representatives passed a bill today that will reauthorize Section 702 of the Foreign Intelligence Surveillance Act for two years, expand the federal government’s power to secretly spy on Americans without a warrant, and create a new form of “extreme vetting” of people traveling to the United States.
When the government wants to obtain Americans’ private information, the Fourth Amendment requires it to go to court and obtain a warrant. The government has claimed that the purpose of Section 702 is to allow the government to warrantlessly surveil non-U.S. citizens abroad for foreign intelligence purposes, even as Americans’ communications are routinely swept up. In recent years, the law has morphed into a domestic surveillance tool, with FBI agents using Section 702 databases to conduct millions of invasive searches for Americans’ communications — including those of protesters, racial justice activists, 19,000 donors to a congressional campaign, journalists, and even members of Congress — without a warrant.
“Despite what some members would like the public to believe, Section 702 has been abused under presidents from both political parties and it has been used to unlawfully surveil the communications of Americans across the political spectrum,” said Kia Hamadanchy, senior policy counsel at the American Civil Liberties Union. “By expanding the government’s surveillance powers without adding a warrant requirement that would protect Americans, the House has voted to allow the intelligence agencies to violate the civil rights and liberties of Americans for years to come. The Senate must add a warrant requirement and rein in this out-of-control government spying.”
In the last year alone, the FBI conducted over 200,000 warrantless “backdoor” searches of Americans’ communications. The standard for conducting these backdoor searches is so low that, without any clear connection to national security or foreign intelligence, an FBI agent can type in an American’s name, email address, or phone number, and pull up whatever communications the FBI’s Section 702 surveillance has collected over the past five years.
The House passed all the amendments to expand this invasive surveillance that were pushed by leaders of the House Permanent Select Committee on Intelligence (HPSCI), the committee closest to the intelligence agencies asking for this power. The bipartisan amendment that would have required the government to obtain a warrant before searching Section 702 data for Americans’ communications failed 212-212.
They can, but before (we learned from the Snowden docs) they had to have a legal reason and request a warrant if it was an American citizen, unless there was imminent harm. Now they don’t require that warrant.
Tinfoil hat time… Repeated misquotes like this make me wonder if it’s a signal to someone who he isn’t able to contact directly because his communications are closely monitored.
It’s easy to say he’s just dumb, but clearly he’s quite capable. But maybe he’s just using filler words because he has fuck-all to say.
Today I was contacted by someone at work. She graduated school with me and our 20 year reunion was coming up. Why did she contact me at work? It was the only way they were able to track me down. I was included in promotional material by name. She told me I "was the hardest to track down"and I had to smile....
I see. Textual communication has a pesky habit of not conveying tone unless you intentionally craft it to. It bugs me that there are so many people who negatively judge someone for decades-old attitudes and worldviews, when positive change should be commended.
Not you, since your comment was in jest, but I question the motives of those think that way unironically.
If everyone gets busted all at once (2022-2024 market takedowns is as close to that as it could come IMO) then everyone immediately stops using tor and starts using i2p or freenet or whatever system they may not have broken yet. That’s baaahd for business, said the wolf in sheep’s clothing.
Although they did run a cp site for months before shutting it down, so they’re clearly not opposed to the long-game, especially if it involves national security (it does.)
What I’m talking about wrt tor is traffic shaping or node DoS leading to a Sybil attack. When the (state)actor has the ability to drop all packets from you to NON attacker-controlled guard nodes, and then once you’re connected to a dirty guard, drop all connections to non-controlled relay and exit nodes, it’s done. There’s also an ongoing DoS attack that is able to make any guard/entry/relay/exit use 100% CPU making them unusable and it’s been going on for months now. You can see it on the tor forums (relay-operators) and someone posted about it in more detail on the monero subreddit the other day.
It’s not even a matter of gaining control of nodes, they can simply blackhole your access to good nodes so you end up with nodes controlled by them. Easy but loud, although it seems to be what’s going on in a number of cases, and not many people are talking about it. Tor used to alert you to this, but now it’s quietly tucked away into a log file. There are other vulnerabilities present in tor and the tor project devs don’t seem particularly interested in them, with the DoS attacks requiring the community itself to step in with hacky solutions. I’m of the mind (never would have found myself saying this) that the tor project at large is compromised.
Monero is currently being hit by a (likely) black marble attack which is why it’s so slow. They’re basically flooding transactions (1/3 to 2/3 of all transactions able to be processed at any given time) so that the anonymity that makes monero work is severely degraded. Whether it breaks past transactions remains to be seen, but it absolutely weakens the anonymity of transactions done during (possibly shortly before and after) the attacks.
Literal torture. There’s a reason LSD proved to be an ineffective truth serum… What’s going on inside the head is far worse than what could possibly go on outside the head.
Always trip with someone with actual experience, kids. There are ways to escape a bad trip, so ask your trip-buddy how they plan to ease a trip that’s going south, and if they can’t tell you 5 things off the top of their head, they’re full of it. But the best way is to start small and ease into it. Once you’ve gauged the dose and purity, you can have a bigger trip next weekend.
Friendly reminder that Bluetooth has a larger network stack than Wi-Fi. Much more code, much larger available attack base. There have been many numerous Bluetooth vulnerabilities that allow remote code execution or theft of files.
This is truly becoming a surveillance state, in no way that can be debated. That want to be able to access everyone’s innermost thoughts (texts, notes, recordings, calendars, contacts, photos, you get it) without any chance of someone being able to protect against it.
Reminder that Google was the 2nd or 3rd company to commit to NSA’s PRISM program of feeding American’s data for future analysis.
Find a good girl that doesn’t mind. Mine doesn’t care at all, she has her interests and I have mine. I’ll sit there and listen to her 5 minute lectures on makeup and perfumes, and every once in a while I’ll tell her about a vulnerability or something cool I found, and I know she’s paying as much attention as I do about makeup, but at least I can understand the basics of makeup without years of experimentation and learning.
True, it makes it harder to stay secure when people around you don’t care or don’t know how, but its still possible. Just have to set some solid boundaries sometimes.
Mass centralization. Old school forums like phpBB and SMF and vBulletin and new-school forums like self-hosted discourse are also centralized, but by one small user calling the shots, and it’s very clear immediately which forums are well-run. If a forum isn’t well-run with a good community, a ‘competitor’ will quickly pop up that is, and people will go to it. Sure, you have to have some tech skills but there are easy guides for all of it. Discourse is a simple docker image and it’s the best for features and engagement IMO.
Sure you have to sorry about DDoS attacks and staying patched, but you can use OVH or another host with a large infrastructure that had DDoS resistant servers. Or, god forbid, cloudflare.
On a federal level I don’t believe you have to register a gun if it’s given to you as a gift or sold by an individual, but it definitely varies by state.
I know the prevailing sentiment for a long time in the privacy community has been “DAE Youtube bad?” though I have always thought that it is kinda overblown. Besides, I am using Firefox which is supposed to isolate tabs so they can’t speak to each other, so I felt a small amount safer using Youtube....
No you’re not being paranoid its how it works. No browser isolates tabs like you’re talking about unless you use containers. Google owns the largest ad company on the internet, so any site that embeds their tracking scripts (most of the Western internet) will send the page you visited to Google, so they know what pages you’re going to, and highly likely use that information to inform the YouTube algorithm about you. Even if you have a tracker blocker installed, like unlock Origin, if you use Google they still know which link you clicked and what you searched.
Interesting thumbnail strategy on this ad. It’s hard to see it as just a seat. My mind keeps trying to make it into a human palm, so I’m seeing a tiny Polly Pocket tablet and stylus.
Apparently Apple can end-to-end encrypt your iCloud, but it’s opt in because they still want to profit off your data >_ iCloud -> Advanced Data Protection...
What guarantees do you have that Malus doesn’t copy your key to their cloud?
I remember when I used a Samsung Galaxy as by daily driver a couple years back. I enabled full disk encryption and thought okay great, now that’s done. I noticed a very small, brief popup on my screen that lasted a few seconds, and it was a notice that my key had been sent to Samsung servers. Apparently you have to disable that option that’s hurried deep in the settings somewhere no one would think to look, and change your password again. If I hadn’t caught that brief notification at the bottom of the screen (not the normal location for notifications), I’d never have known.
The encryption password is also a max of 15 characters.
Teacher accused of having sex with two students says she ruined her 'dream job' with stupid 'mistakes', jury hears (news.sky.com)
Rebecca Joynes allegedly became pregnant after having sex with one of her victims, known as boy B, Manchester Crown Court heard - she denies the allegations against her....
My favorite photo from my vacation! (lemmy.world)
superfile - A pretty fancy and modern terminal file manager (raw.githubusercontent.com)
github.com/MHNightCat/superfile
I learned so much (lemmy.world)
Edit to say because I kinda feel bad now: I have nothing against English teachers! Please don’t send your mafia of learned lit nerds after me! …Or do, lit nerds are hot.
Open Source apps to monitor the best-before dates of foods?
Hey all, I'm trying to be a little more economical and reduce the amount of food I waste, and was wondering if there were any open-source apps that can track the best-before dates of the foods I buy so I can improve my meal-planning....
Today I got greeted on a Tor friendly website (lemmy.ml)
It was at the Securedrop website. How did I end up there ? I read something about Sequoia and encryption and then wanted to see what Securedrop entailed....
PSA: Twitch Shadowbans Users on VPN + Linux
If you notice your chat messages show up in the chat feed but don’t appear on the streamers in-screen chat, you have been shadowbanned....
Listen, libs... (lemmy.world)
High Court In India Rules That Viewing, Downloading Child Porn Is Not A Crime - The Publica (www.thepublica.com)
Sex offender banned from using AI tools in landmark UK case (www.theguardian.com)
A sex offender convicted of making more than 1,000 indecent images of children has been banned from using any “AI creating tools” for the next five years in the first known case of its kind....
Is there such a thing as a data broker map?
So, this is probably naive of me, but so far I haven’t really been able to find the answer on the web....
Cops can force suspect to unlock phone with thumbprint, US court rules (arstechnica.com)
The legal situation is more complex and nuanced than the headline implies, so the article is worth reading. This adds another ruling to the confusing case history regarding forced biometric unlocking.
NSA ’just days from taking over the internet’ warns Edward Snowden (cointelegraph.com)
cross-posted from: lemmy.world/post/14393091...
Comedy World Righteously Roasts Trump Over Gettysburg Gaffe (newrepublic.com)
People can’t stop cracking up over the former president’s bizarre, bumbling speech....
How to encrypt regular phone calls?
Is it even possible on android? Is there a FOSS dialer to optionally encrypt some phone calls (non voip) using a pre-shared key with other party?
Web Devs: is there a phone-number-less AUTH that still prevents bots?
I make websites...
Got tracked down for my school reunion
Today I was contacted by someone at work. She graduated school with me and our 20 year reunion was coming up. Why did she contact me at work? It was the only way they were able to track me down. I was included in promotional material by name. She told me I "was the hardest to track down"and I had to smile....
Progress! (lemmy.world)
Microsoft is silently installing Copilot onto Windows Server 2022 (mastodon.gamedev.place)
https://lemmy.ml/pictrs/image/51faa0ca-2b47-4eba-bc8c-d9edabba5ca9.png
Downsides of Signal alternatives compared to Signal?
I’m thinking of the things listed on the Privacy Guides real-time communication section...
He revealed the secrets ! (jlai.lu)
Things are less overwhelming in the basement (lemmy.world)
Android 15 will run Bluetooth with your phone still turned off. (security.googleblog.com)
I saw this on infinity for Reddit earlier, I don’t know if there’s a workaround for this or not.
Discord is nuking Nintendo Switch emulator devs and their entire servers (www.theverge.com)
Republican state representative left a loaded handgun in Colorado Capitol bathroom (coloradosun.com)
I'm not bored or anything, it just feels like forever. 60 more years left of my shift on earth... (lemmy.world)
I am actually ridiculously good at keeping myself entertained. I could stay in the basement forever…
Anyone know exactly what info Youtube captures from you from its browser version (and by what means)?
I know the prevailing sentiment for a long time in the privacy community has been “DAE Youtube bad?” though I have always thought that it is kinda overblown. Besides, I am using Firefox which is supposed to isolate tabs so they can’t speak to each other, so I felt a small amount safer using Youtube....
Ask ChatGPT to pick a number between 1 and 100 (jlai.lu)
Kobo's new color E Ink eReaders start at only $150 (www.pocket-lint.com)
RIP in pieces (lemmy.world)
How to end-to-end encrypt your iCloud
Apparently Apple can end-to-end encrypt your iCloud, but it’s opt in because they still want to profit off your data >_ iCloud -> Advanced Data Protection...