Information highway, redux
"Why the hell don't we have a basic web browser?" asked one driver. A reasonable question
Are we really at the point where "why doesn't my car have a web browser?" is a reasonable question?
1600 publicly visible posts • joined 23 Sep 2009
Funny story: Meg is a Republican. In 2010 she was the Republican candidate for governor of California (and lost to uber-Democrat Jerry Brown).
We will transition to a new Windows 10 release cadence [...] targeting annual feature update releases"
So, user surveillance telemetry has shown that it takes a full year for most people to forget how to restore their default browser, PDF reader, etc.?
My company sent me a fire-breathing workstation laptop - 10th gen i7, 64GB RAM, Nvidia RTX graphics, etc.
Word (O362.5 x64 version) absolutely brings it to its f-king knees when I open a 250 page doc. The fan screams at max speed, text onscreen lags behind typing by by 5-10 seconds (!!), scrolling is janky, text search is slow, etc. In contrast, Cyberlink PowerDirector runs very smoothly when editing and rendering FHD video content.
The hardware is not the problem.
I have a hard time believing those numbers.
The iOS setting just blocks the IDFA. Apple's developer TOS says that the app has to respect the "user choice" for third-party ad SDKs it contains, but iOS does not enforce (or check) whether that occurs. iOS sensor permission are also not very granular. Apps can access environmental sensors, gyro & motion, battery level, volume settings, etc. with no permission request needed, making it easy to generate at least a temporary fingerprint on the fly.
Indeed, there have been numerous reports of tracking SDKs simply ignoring "Ask app not to track" and using fingerprinting to create a new unique identifier. None of those were caught by the App Store's vaunted review process.
In addition to loose control of sensor access, iOS has no built-in tool to show what domains your device is reaching out to. Thus, the average user has no way to know that this exfiltration is occurring. For that matter, an app could send fingerprinting diagnostic data points to its own parent domain; if it's encrypted, how would you differentiate that from 'legitimate' app traffic?
There's also the issue of so-called "app analytics," which -- if they come from an ad seller such as Google or FB -- can return device data points to their mothership that the advertising systems can access to create a fingerprint indirectly.
Given the billions at stake, it seems likely that numerous ( if not most?) apps are tracking people anyway, by hook or by crook. As such, I think it's reasonable to assume that "Ask app not to track" is not really the ad-pocalypse that advertisers portray it as.
Google has locked my Gmail account because I will not give them a phone number that they can call and/or text for "two-factor authentication."
This is required to "protect" my account, they claim. Which is obvious bullshit, because they support other 2FA methods such as their Authenicator app and TOTP. However, they will not allow me to log in to select one those other 2FA methods unless I first provide a phone number.
I tried using a couple of burner number sites, but could not find one that would allow sufficient functionality to meet Google's requirements unless I provide them with ... wait for it ... a real-world phone number that they can call and/or text for "account verification."
I suspect that the percentage willing to pay will drop substantially when prompted to enter their credit card number.
This also raises the issue of privacy only being available to those with the means to pay for it, while everyone else gets their lives strip-mined in the name of 'relevant' ads.
That said, the scenario posted by ComputerSays_noAbsolutelyNo is probably more likely. Does anyone think that Google (e.g.) actually stops collecting your location and browsing data when you turn off location history and browsing history? Of course not. They just don't show it to you anymore.
Unidentified users get generic ads for either extra-small condoms or exciting career opportunities in adult entertainment.
Users whose, um, private pics are backed up to Google Photos get 'relevant' ads based on their Chrome incognito browsing history.
This is nation-state level stuff. Huawei (and Cisco, for that matter) also make the hardware, so the software source code is not a complete picture. There are lots of ways to hide things in programmable controller firmware, seemingly-safe utility chips that are not in fact what they appear to be, chips hidden within a multi-layer PCB, components added inside connectors etc.
Then there are the not-insignificant issues of ensuring that the code you audited is what is actually running on the device, that every single board and component in the system is truly as described, and that those conditions are true for every single unit that you purchase. If you're buying, say, 100 "identical" routers, it might only take one back-doored unit to compromise your network.
And of course, you can't exclude the possibility of compromise without participation by the vendor.
Sounds the like we're actually saying the same thing.
The "normal military mode" you describe is resistant to (or at least, suspicious of change) change. Fear of change is almost always because change is risky. That risk might be organizational (e.g., "we might lose a war if we fight it using unproven methods") or personal (e.g., "I know how to fight the old way, but what if I can't learn this new way?").
How do you fight change without looking like an obstructionist or dinosaur? In most cases, you study it to death. "I'm open to the idea, but we really need to examine how this will affect X, Y, Z etc." Which takes time, which is one reason that bureaucracies are slow.
Eventually, someone has to sign off on a project for it to go forward. For whoever does that, the last thing they see will be a bus undercarriage if said project goes badly. Hence the need to have a committee to "get buy-in from all the stakeholders," which (a) further slows down the process, and (b) provides at least partial ass cover in the event of failure.
Then again, Logitech claimed that "The Logi Bolt USB receivers provide a strong, reliable, drop-off-free connection up to 10 meters (33 feet)
That's the same range they quote for the Unifying receiver. I've never had one of those work reliably at a distance of more than about 20-25 cm (8-10 in), and even then only with clear line of sight. With towers, I have to use a USB A male to female extension cable to get the receiver right up onto the desktop.
My work laptop sits on my desk in my home office, but putting the receiver on the "far" side of the computer (where the USB-A ports are) is too far. The keyboard dropped keystrokes, the mouse missed clicks, etc. Had to use a short USB extension to bring the receiver around to center of the desk. Even then -- at 5-10 cm and with new batteries -- the keyboard was unreliable. Maybe the workstation-class laptop gives off too much EMI/RFI? Whatever the reason, I gave up on the Enraging Receiver stuff in favor of an old USB wired keyboard and a vintage MS Wireless Mouse.
I came to Linux one night in 2016. I pushed the 'reset' button on my PC halfway through a bare metal Win98 install (3.5hrs in and counting)
I'm guessing that should have been 2006? I can't imagine why on earth anyone would be installing Windows 98 in 2016.
I hope it was at least 98 Second Edition...
Apple has said it will not bow to demands to add non-CSAM images to its database.
Apple complies with Beijing's demands and censors some content in China, saying it complies with the laws in the countries it operates.
So, when countries inevitably pass (or decree) laws requiring Apple to add non-CSAM images to its database, Apple will NOT comply with the laws in the countries it operates?
Why do they get away with destroying privacy and society? Because we choose to let them, by using their product.
We can't actually nuke them from orbit, but there's still a nuclear option:
Delete your account.
Run an ad blocker and/or PiHole to eliminate all of their comment / like / share / login with FB / tracking scripts / pixels / etc crap.
If you have apps from any tentacle of FB on any of your devices, delete them.
I've done the above, for both FB and Google -- to the point of switching from Android to iPhone specifically to escape Google's panopticon ecosystem.
I do not miss either of them. They are not nearly as necessary or vital as they would like us to believe.