Recent comments
Hitler_Was_Right OP wrote
Reply to The Truth About Protonmail by Hitler_Was_Right
Protonmail’s False Claim List
Lie: “Protonmail obeys the law”
In 2017 Protonmail seems to have used illegal cyber warfare capabilities to unlawfully break into a suspected phishing server. You can see the tweet and read about it here. They soon deleted the tweet and said: “We cannot confirm nor deny if anything happened.” In 2013 the European Union parliament voted to make hacking a crime that carried a prison sentence of 2 years. “Hacking back” is also illegal under Swiss law.
Lie : Protonmail offers “Zero Access” or “End to End Encryption”
A professor who teaches computer science and cryptography Nadim Kobeissi proved that Protonmail does not provide End to End Encryption. Protonmail has since publicly acknowledged that they can decrypt anyone’s encrypted content by obtaining their password/passphrase.
Lie: Protonmail protects free speech
Protonmail has stated on Reddit that they are “controlled by the politics of the community that dominates the ProtonMail userbase”. So if a majority of their users wanted to ban an innocent minority group, Protonmail has stated they would “yield to community pressure” and ban all those users from their platform even if their terms of service are not broken. So Protonmail protects free speech as long as it agrees with the majority of their users. Protonmail is not safe for any minority group including Jews, activists or missionaries. If Protonmail has a majority group ask them to ban a minority group of users then Protonmail has stated explicitly that they will do it even if no terms of service are broken. Read Protonmail’s statements here.
Lie: “Protonmail is open source code.”
Their front end code is open source. Their back end code and mobile code is kept private. This can be confirmed by reviewing their open-source code here
Lie: “By default, we do not keep any IP logs”
Protonmail’s Privacy Policy States: “This includes, the sender & receivers, the IP addresses were emails originated from, message subject, messages sent & received times, storage space, total emails and login times.” Protonmail is also legally required to store all users data for 6 months in Switzerland.
Lie: ProtonMail does not require any personally identifiable information to register.
If a user tries to signup without personal information, via VPN or TOR, they detect it and require a “donation” with a credit/debit card or a confirmation with your personal phone.
Lie: “When a ProtonMail account is closed, data and emails are immediately deleted from production servers”
By Swiss law, Protonmail is required to record all data for 6 months. When a user deletes an email, the email and all meta-data must legally be retained for 6 months
Protonmail Claims to be “Independently Audited”.
There is only 1 company listed as conducting an Audit of Protonmail, Cyberkov.com. Cyberkov’s website says it’s connected to Harvard, MIT & CERN. And their team is full of Harvard and MIT grads, exactly like Protonmail. So Protonmail’s audit was probably done by Protonmail’s college friends or colleagues. Protonmail also shows a list of people who’ve audited their code, but anyone can email Protonmail to add their name to the list. Years later Professor Kobeissi did a real independent audit and proved Protonmail doesn’t provide “end to end encryption Privacy Watchdog
Hitler_Was_Right wrote
Reply to comment by Motorbreath in YouTube Enforcing “Thought Crime” Censorship by Motorbreath
It wasn't this video but that's how jewtube is censoring content for me as a viewer.
Motorbreath OP wrote
Reply to comment by Hitler_Was_Right in YouTube Enforcing “Thought Crime” Censorship by Motorbreath
?
weird, i can see the video with no problem even with the tampermonley turned off.
try using a script that turns that off with the extention like tampermonkey.
Hitler_Was_Right wrote
Choose how to verify your age
@gmail.com Use a credit card to verify immediately You won’t be charged. Any transaction fee will be fully refunded. Use your ID Submit an image of a valid ID like your driver’s license or passport. It may take up to 3 days to verify your ID.
TallestSkil wrote
Reply to WARNING !!!!! ZERO Day exploit in fake JPGs being served to Browsers. A revealed exploit on July 21 2021 to add to long list of remote WebP exploits, and now CATBOX suddenly involved! by smartypants
HAHAHAHAHAHHAHAHHAHAHAHA imagine trusting webp, a bullshit “standard” created by Google.
dontvisitmyintentions wrote
Reply to Top U.S. Catholic church official resigns after cellphone data used to track him on Grindr and to gay bars by Rambler
- Original Pillar piece
- WP/MSN version (that linked to Pillar)
- WP follow-up where Grindr officially remained skeptical of the Pillar's data claims, presumably because they thought location data was struck or sufficiently anonymized
- Pillar's followup statement (direct image link), with no new information on what "obtained and authenticated a data set" entailed
Some Twitter replies express frustration in their being so cagey about something they claim is so easy. A few others condemn Pillar's privacy violations, but obviously those are built in to the software.
Still others question whether they contacted the right person in the RCC. I'm beginning to wonder myself whether they went more for bombast than concern. Did they show his superiors the data, or is this all a "trust me, bro" situation? We can't expect the mainstream media to care about the distinction, but this guy's organization would. I imagine they found a lot of other correlations. Was this just the first guy to resign?
I wish we had more information.
Wahaha wrote (edited )
Reply to comment by smartypants in WARNING !!!!! ZERO Day exploit in fake JPGs being served to Browsers. A revealed exploit on July 21 2021 to add to long list of remote WebP exploits, and now CATBOX suddenly involved! by smartypants
I'm already using that one for a long time, since webp generally sucks. But it only works if there's a choice between webp and jpg, if there is no choice, I'll get to see webp.
smartypants OP wrote (edited )
Reply to comment by Wahaha in WARNING !!!!! ZERO Day exploit in fake JPGs being served to Browsers. A revealed exploit on July 21 2021 to add to long list of remote WebP exploits, and now CATBOX suddenly involved! by smartypants
no time to go through all solutions, but this plugin from 12 months ago should do the trick at a perfect brute force way, but I dont know if a bad actor can use browser fingerprint to shove it in anyway.
https://addons.mozilla.org/en-US/firefox/addon/dont-accept-webp/
This extension monitors and edits request headers using the onBeforeSendHeaders API
TRY THAT PLUGIN.
If it works, vile web sites like youtube should show blank white squares for video previews.
many http web development tools including free ones, can do ANYTHING with any data sent or received from firefox and have persistent scripts. "ModHeader" is one fun one.
Wahaha wrote
Reply to WARNING !!!!! ZERO Day exploit in fake JPGs being served to Browsers. A revealed exploit on July 21 2021 to add to long list of remote WebP exploits, and now CATBOX suddenly involved! by smartypants
I don't even have image.http.accept and network.http.accept.default in my about:config for FF90.
Mrwarmind wrote
Reply to Same Seiyuu #8 by Wahaha
Shinobu and fubuki have the same voice? Noice
burnerben wrote
Reply to Aphex Twin - Ageispolis by AWiggerInTime
this is draining
smartypants OP wrote
Reply to comment by BlackWinnerYoshi in HOLY SHIT!!! Apple secretly constantly taking photos of face when phone held and active every 5 seconds and uses INFRARED and got caught! Apple claims its for training the AI to unlock, but now admits its to study EMOTION of user to autoselect emojis and study pupil dilation & facial expressions! by smartypants
Apple did, often since 2017, scan faces for 30,000 data points in 3d FOR EMOTION TRACKING in Animojis in 2017 and later, but now in 2021 they do it on home screen and measure pupil and study gaze direction.
Learn and read. Lots of links support all I just typed.
Wingless wrote
Reply to NSA stores metadata of millions of web users for up to a year, secret files show by Rambler
I would eat my hat if they ever delete them. What kind of spy agency throws away information? They may move it to a subsidiary, sure ... not throw it out!
dontvisitmyintentions wrote
Reply to by !deleted846
In addition to keeping it out of sight, consider a decoy
For example, a broken safe (like a firesafe with a cracked wall or broken lock) or a heavy box that could pass for one, from a thrift store or craigslist. Make it look nice on the outside, put some low-value keepsakes, costume jewelry, or funny money, and non-sensitive copies or fakes of documents in there.
Stick it somewhere out of sight but not out of reach: under the bed, front corner of the closet, a dark shelf. Then if it's been tampered with, you know you have a problem, and it may satisfy them that it's your only hidden stash.
Wahaha wrote
Reply to Valve Announces Steam Deck Handheld Gaming PC, Launches in December 2021 - Niche Gamer by awdrifter
Button placement looks uncomfortable, though.
TallestSkil wrote
Reply to comment by Wahaha in Why we will win the war for general-purpose computing by HMTg927
Yeah, they all have hardware level backdoors that governments can access. There’s really nothing doing here.
Wahaha wrote
Wasn't the war lost nearly a decade ago, when all CPUs had hidden operating systems added to them that will grant them complete control over wireless networks?
Rambler wrote
Reply to by !deleted846
Is there anything else we should look for when deciding on a safe?
Think about placement. Ideally your safe will be in it's final resting place, so to speak, once you've placed it. Out of sight. You'd think this would be obvious but I've had friends who have visible safes in their garage or office or whatever. Even without talking about it, someone may think, "I wonder whats in there?"
So, out of sight. Out of mind.
If you own your home, embedding the safe into the house itself isn't a bad idea. Is it in a closet? Build a it into the wall by building a shelf above it and making it impossible for the safe to now be removed. Not that they could with ease before, because it's mounted to the floor joist and wall studs. And now you just built a wall around it and put a normal cabinet door in front of it to make it all look like original closet storage, or something.
Honestly though, if you just need a safe that'll store paper, maybe some important documents and a small amount of jewelry it makes it so much easier to hide it in a place where it can be secured out of sight. If we're talking a big gun safe... There is a reason why a lot of people just have it mounted in their garage or living room. They're heavy as fuck, the size of a refrigerator or larger and there is the idea that, "That summabitch too heavy for anyone to steal" but it can still be broken into.
And a note about locking mechanisms: Combinations can (easily) be forgotten. Trust me on this, lol. You're convinced you'll remember it, don't need to write it down, etc. Then you have no need to open the safe for a year and are scratching your head when you need to get in. On the flip side, keys can be found and keys can be stolen or locks can be picked. Hand/finger print safes rely on a battery, which can last a long time but not last forever.
If you're storing things that would be absolutely devastating to lose, you've got a lot to think about. If it's some guns, documents like passport or birth certificate and maybe a few thousand dollars worth of valuables then really any mid-range fireproof safe that can be mounted/secured to a wall or floor joists and be hidden should probably do.
Wahaha wrote
Reply to comment by awdrifter in This Man Lives in an Abandoned Japanese School by awdrifter
As long as it works, but god help you if stuff needs repairing.
awdrifter OP wrote
Reply to comment by Wahaha in This Man Lives in an Abandoned Japanese School by awdrifter
It's an abandoned school, so electricity and water shouldn't be a problem. Internet might be, but this story is in Japan, they have good cellular internet.
Wahaha wrote
If there was water, electricity and Internet, I'd also like to live somewhere like that.
Wahaha OP wrote
Playing this game in full HD resolution is pretty neat, I have to say.
awdrifter wrote
Reply to Feel free to post y'alls prints. by Toxicant
I wish I have a 3D printer. But even if I get one, I don't have the CAD skill to design things I want to print.
Wingless wrote
Reply to 10 apps with millions of Play Store downloads found stealing Facebook login info by Rambler
The two horoscope apps make sense. A smart scammer starts by picking a dumb mark.
Rambler wrote
Reply to The Truth About Protonmail by Hitler_Was_Right
The question is, then, who do you trust for secure email? Is email, by design, inherently 'bad' or 'flawed'?
What options does your average Joe have, outside of setting up his own mail server, and expecting his contacts to use PGP Encryption, which, may or may not be crackable by the big agencies.