@firefly@neon.nightbulb.net
@firefly@neon.nightbulb.net avatar

firefly

@firefly@neon.nightbulb.net

I am a #bibliologer and a #cryptologer. I study the Bible, codes, and ciphers among other things. I enjoy #poetry. I like #neologisms. I burn with insatiable curiosity about everyone and everything.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Conservative Plan Calls for Dozens of Executions if Trump Wins (www.thedailybeast.com)

A conservative plan for Donald Trump’s potential transition into the presidency calls for dozens of prisoners to be executed, according to HuffPost. An 887-page plan by Project 2025, led by the ultra-conservative Heritage Foundation, says that if elected, Trump should make a concerted effort to execute the remaining 40...

firefly,
@firefly@neon.nightbulb.net avatar

@gregorum @AppleTea

Which equates to 535 kings ruling over 300 million serfs.

Or are they all just sockpuppets for one hidden king?

Smell the democracy!

firefly,
@firefly@neon.nightbulb.net avatar

@iAmTheTot @return2ozma @mibo80 @Plastic_Ramses

You must not have been a civil or criminal defendant in a court room.

firefly,
@firefly@neon.nightbulb.net avatar

Telegram: We keep you private. Now enter your phone number to sign up.

firefly,
@firefly@neon.nightbulb.net avatar

@SnotFlickerman @CoderSupreme

Some digital cameras and phone cameras can also embed the GPS coordinates in the pixel data so that even if you delete the EXIF metadata the GPS location and device serial number are still present in the image. Many document printers also embed device serial number and other data on printed documents by using nearly invisible dot encodings.

firefly,
@firefly@neon.nightbulb.net avatar

@match @CoderSupreme

What should you do about surveillance technology? Ask a Amish hacker!

firefly,
@firefly@neon.nightbulb.net avatar

No easy way at all. The specs would be in-house manufacturer docs. Recall that digital cameras used to embed date and time visibly in images in a corner. The logical progression was to embed other data such as device serial number, geotag data, etc.

Regarding the schemes for steganographic identification in devices such as cameras and printers, this information is usually kept a trade secret. The Secret Service would probably already have the spec docs for data hiding. Many manufacturers already have working agreements to provide back door assistance and documentation for the hardware surveillance economy. Ink chemistry profiles are registered with the Secret Service. The subterfuge is to 'investigate counterfeiting' but it is also used to identify whistleblowers and objective targets by their printer serial number or ink chemistry, or the data embedded in any images they are naive enough to publish.

If you are a undercover reporter secretly video recording, unbeknownst to you the video could have metadata encoded using a secret scheme. If you registered that product for a warranty, or bought it online and had it shipped, or paid with a credit card or check, or walked beneath the electronics store cameras without a hat and sunglasses to pay cash, it is easy for the state organs to then follow the breadcrumbs and identify the videographer.

Almost all 'free' wifi hotspots offered by chain restaurants and hotels are logged with the data being stored indefinitely, showing your mac address. It takes only a little bit of investigation and process of elimination to find the user on a camera feed history, to see who was connected when a certain message or leak was sent. If you use a wifi hotspot in a McDonalds, Wendy's, Starbucks, etc. smile for the surveillance camera which will also have your device's unique MAC address in the wifi history. This MAC address data is automatically sent to a central station, for example at the Wandering Wifi company, and God only knows how long they store it.

None of this nonsense makes anyone safer. These people hate us.

firefly,
@firefly@neon.nightbulb.net avatar

@helenslunch

"I have nothing to hide ..."

Nice story, bro.

When you post a real photograph of yourself, wife, kids, and all your social security numbers and bank account numbers, along with a complete history of all video rentals and library books, and your private confessions of folly, vice, and sin-- post all that on your Lemmy profile, then I'll believe you have nothing to hide.

firefly,
@firefly@neon.nightbulb.net avatar

@magnetosphere @Glass0448 @Valmond

Nuance? Isn't that a racial slur? Mastodon is too based for me.

firefly,
@firefly@neon.nightbulb.net avatar

@magnetosphere @Glass0448

Looky here, we found this nifty thing called, 'qualified immunity'.

firefly,
@firefly@neon.nightbulb.net avatar

You can have it now. We don't want it any more!

firefly,
@firefly@neon.nightbulb.net avatar

@ItsComplicated

Forty years ago police had to have a basic level of intelligence and they investigated. Now some of them just rely on arm-twisting and plea bargain threats to find any patsy they can to stuff in a cell. They can have no crime, no complaint, no witness, no evidence, and still arrest you, and the D.A. will offer you a plea deal for something that didn't even happen. Your public pretender defense lawyer will tell you to take the deal. Don't laugh... it can happen to anyone.

firefly,
@firefly@neon.nightbulb.net avatar

The court system in USA is absolutely and irredeemably corrupt. Many prosecutors in USA are vile criminals and most of them belong in prison themselves. They have no respect for the Constitution or Bill of Rights that they are by law subscribed and sworn to uphold. They will use bogus criminal charges to affect or chill the outcome of an unrelated civil matter, to 'shut you up' in street parlance. People think America is free. It is an authoritarian hell run by delusional nutters. People like to scoff at that, until it's their turn to ride the courthouse railroad.

firefly,
@firefly@neon.nightbulb.net avatar

@return2ozma

Democracy is a religion that glorifies the lesser of two evils.

firefly,
@firefly@neon.nightbulb.net avatar

Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

Operation Rubicon
https://en.wikipedia.org/wiki/Operation_Rubicon

Crypto AG
https://en.wikipedia.org/wiki/Crypto_AG

If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you have no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data privacy.

Watch the phan boiz rage outlet!

firefly, (edited )
@firefly@neon.nightbulb.net avatar
  • 21 ALTERNATIVES TO YOUTUBE *

The Internet Archive https://archive.org offers over 1.8 million free movies and over 12 million free videos.

Here are more options. Most are browser-based. A couple require an app.

ODYSEE
https://odysee.com
VIDLII
https://www.vidlii.com/
INVIDIOUS
https://invidio.us
TIKTOK
https://tiktok.com
9GAG
https://9gag.com
BITCHUTE
https://www.bitchute.com
BILIBILI
https://www.bilibili.tv/en
RUMBLE
https://rumble.com
PEERTUBE
https://peertube.tv/videos/overview
NEWPIPE
https://newpipe.net
TWITCH
https://www.twitch.tv
TED TALKS
https://www.ted.com/talks
VIMEO
https://vimeo.com/
VEOH
https://veoh.com/
LBRY
https://lbry.com/
DAILYMOTION
https://www.dailymotion.com/us
UTREON / PLAYEUR
https://playeur.com/
THE OPEN VIDEO PROJECT
https://open-video.org/
STORYFIRE
https://storyfire.com/
DLIVE
https://dlive.tv/

@Daft_ish

firefly,
@firefly@neon.nightbulb.net avatar

If you were dumb enough to put your thumbprint into the phone in the first place then they already have it and they can access it through the modem. The courts are playing a kabuki theater or cabaret skit.

firefly,
@firefly@neon.nightbulb.net avatar

@TaviRider

First order of business: never enable the thumbprint lock on your phone.

Second order of business: never conduct any sensitive business or communication with a mobile phone.

Third order of business: use a very strong passphrase to lock your phone.

Fourth order of business: understand that all your phone calls and text messages are hoovered up into spook databases.

firefly,
@firefly@neon.nightbulb.net avatar

@Tami

Spend $30 per year on a VPS and you own your own encrypted cloud.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • fightinggames
  • All magazines