4oh9do | 3 years ago | on: Texts, web searches about abortion have been used to prosecute women
4oh9do's comments
4oh9do | 3 years ago | on: Rare video games collection heist
> He’d had a kind of philanthropic hubris as an owner and collector, someone who never gave a second thought to keeping his legendary game collection a secret. He’d gladly let YouTubers film in the back; he would even open the safe back there and show them, item by item, his Louvre. Other collectors had rare games, sure, but in the back room of his store, and especially in the safe, he was proud to own 10,000 of what he described as “cherry” copies—his preferred term for virgin condition.
and again...
> And though the value of retro games had exploded in the past few years, he’d never been concerned about the safety of the thousands of games from his legendary collection—some of the most valuable video games on earth.
and yet again...
> Though the vault door didn’t work then and was mainly for show, that anything behind it could be, would be, stolen seemed unimaginable.
It is repeated time and time again that these items are valuable, that the collector was keenly aware that they are extremely valuable, and yet he also repeatedly seemed to refuse to acknowledge that you need to take steps to protect valuables, and the more valuable something is the more steps you need to take to protect it.
I don't want to 'victim blame', suffering a burglary is a horrible experience, but it is one compounded by foolhardiness.
4oh9do | 3 years ago | on: Coinbase is reportedly selling geolocation data to ICE
I'm curious, however, why did you not make a similar post to the parent comment...in that the parent comment has presented no evidence whatsoever to support the claim that Coinbase is only using publicly-available information, and therefore by your own reasoning the parent poster should not make the claim.
4oh9do | 3 years ago | on: Coinbase is reportedly selling geolocation data to ICE
Are you familiar with the concept of parallel construction? It's a tactic LEOs use when they don't want to reveal how they actually obtained information. For instance, if they obtain information using method A, but want to conceal method A, they state that they actually obtained the information using method B (because the information actually is, after the fact, obtainable via method B as well, once you know what to look for).
In Coinbase's case the way this would work is Coinbase sources data from their internal databases (method A), and then after the fact they do let's say a Google search or some other public search for the names or whatever they found in their internal databases, and state that all data is sourced from online, publicly available data (method B).
4oh9do | 3 years ago | on: FCC commissioner wants TikTok removed from app stores over spying concerns
4oh9do | 3 years ago | on: FCC commissioner wants TikTok removed from app stores over spying concerns
4oh9do | 3 years ago | on: FCC commissioner wants TikTok removed from app stores over spying concerns
Citizen Lab published a report last year - https://citizenlab.ca/2021/03/tiktok-vs-douyin-security-priv... - which found that the app does not engage in any overtly malicious behavior:
> TikTok and Douyin do not appear to exhibit overtly malicious behavior similar to those exhibited by malware. We did not observe either app collecting contact lists, recording and sending photos, audio, videos or geolocation coordinates without user permission.
And if there's any organization I trust about this sort of thing, it's Citizen lab, owing to their groundbreaking work around Pegasus and other APTs.
4oh9do | 3 years ago | on: W3C to become a public-interest non-profit organization
Where did I do so? Please either provide a quote of me doing so, or retract your statement as it otherwise amounts to libel.
To clarify if somehow you managed to misinterpret my comments: I am in no way defending any $bad_shit that China does/has done, I am pointing out that the other nations involved have likewise done so, and therefore focusing on just one nation is disingenous because it gives all the others a pass.
The war on the free and open web has been waged just as much, if not more so, by Western powers as it has by Eastern ones.
4oh9do | 3 years ago | on: W3C to become a public-interest non-profit organization
Why is MIT? Do you not have an issue with them also getting funding from the American defense department? Or if you're concerned with the open web, do you not remember when they persecuted Aaron Swartz for the heinous crime of downloading knowledge?
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
CafePress was presumably collecting SSNs precisely for tax identification purposes.
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
Your reading of the FTC text seems to be that you think the FTC has conflated account recovery with 2FA, but I don't think that's the case. Instead, my read is that they're suggesting that password breaches can be rendered moot points by requiring 2FA for accounts, so that the compromise of a password would not require an account reset in the first place.
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
> To maintain the integrity of the authentication factors, it is essential that it not be possible to leverage an authentication involving one factor to obtain an authenticator of a different factor. For example, a memorized secret must not be usable to obtain a new list of look-up secrets.
And further:
> Methods that do not prove possession of a specific device, such as voice-over-IP (VOIP) or email, SHALL NOT be used for out-of-band authentication.
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
It is not universal practice, but it is industry-standard, so I don't particularly understand why it is surprising that the FTC is recommending that CafePress adhere to industry standards.
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
And it's not that we love to imprison people in the US, it's that we love to imprison the wrong people.
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
Password resets lead to iterative passwords, which lead to password reuse, which lead to email compromise, which leads to it being pointless to use email as some ersatz second factor.
If we want to move towards a world where phishing attacks and password breaches are obsolete, then we need to press full-throttle to mandating hardware security keys for all accounts.
4oh9do | 3 years ago | on: FTC takes action against CafePress for data breach cover up
4oh9do | 3 years ago | on: Meta is inviting researchers to pick apart the flaws in its version of GPT-3
4oh9do | 3 years ago | on: LibreWolf: A privacy-focused Firefox fork
4oh9do | 3 years ago | on: LibreWolf: A privacy-focused Firefox fork
Sure, but at what rate? If Mozilla releases a critical patch today, and the core maintainer responsible for build maintenance is away on vacation for two weeks, what happens?
I don't understand why this paragraph is buried in the middle of the article. It should be a prominently featured tooltip.