Administrator of thelemmy.club

Nerd, truck driver, and kinda creeped that you’re reading this.

  • 8 Posts
  • 359 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle


  • With a traditional download, examplesite.com sends a file to your computer, that’s it.

    With torrents, instead of that you download little pieces of the file from many different computers. Sometimes hundreds of different computers. Then once you’ve downloaded the file you can then start sharing pieces to other people downloading. The more people doing this, the faster the downloads will be for everyone else and the less strain it will put on each computer’s Internet connection.

    Also if not many people are seeding, there’s a danger that the file will have 0 seeders and nobody can download it at all.

    This is also why torrenting is good for privacy. Shutting down one website isn’t so hard. Shutting down hundreds of random personally owned computers is very hard.









  • Cox got caught buying that data, and when confronted about it, Google, Amazon, and Meta all failed to deny that they also buy that data from those malicious app makers

    But what is that based on? This paragraph?

    A spokesperson for CMG told Newsweek that “CMG businesses have never listened to any conversations nor had access to anything beyond third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.”

    I don’t think that explicitly means they had datasets made up of clandestinely recorded conversations in the wild.

    third-party aggregated, anonymized, and fully encrypted data sets that can be used for ad placement.

    Really could describe ANY possible set of tracking data… Unless you put this quote into a clickbaitey article and strongly imply it’s something sinister.


  • Someone back this up with proof. Security researchers would’ve noticed this. They’d’ve had to have hacked their way around the microphone permission systems and microphone use indicator (depending on OS) on your phone and upload that data without being caught by security analysts. That kind of bug would probably be worth a fairly decent bounty too.

    The article talks about a slide in a PITCH to advertisers. But not a concrete system. Then it goes on to say advertisers bought a dataset from other sources. What dataset? From where? It doesn’t say. Transcriptions from voice assistants? Maybe. But without hard evidence I don’t believe random apps are just recording clandestinely in the background.


  • See email is one of the few things I don’t host. I host a webmail frontend, and use my domain. But PurelyMail is an amazing service that’s so cheap it’s basically free at personal scale with very few limits. I didn’t really care to try and deal with having all my mail sent to spam.