rockmoose
his flabber is totally gastered
Yep. Every time the thought enters my head, he sends me a dick pic.You started getting pictures of Cameron Smith?
Sent from my SM-G780F using Tapatalk
Yep. Every time the thought enters my head, he sends me a dick pic.You started getting pictures of Cameron Smith?
I lost interest in this thread. not ignoring your questions. But I think to sum up the responseOther than your claims on device ID (which may be accurate), I'm still waiting for you to provide any actual detail/links on what what that whole bunch of shit is. though! I'm not saying I don't believe you, I'm sure it's actually true. I'm just looking for some, any detail.
bingo.@Minlak That Smart TV thing is terrifying. How complacent have we become to even allow a scenario like that to play out.
We bought a Thermomix a while ago and I opted for the previous model purely because it didn't connect to the internet. I didn't want my food processer even capable of automatic software updates or one day finding that certain functions are ransomed to a subscription service.
If you ask people, would you allow a 3rd party to open your snail mail, read it, slip a couple of coupons in based on what they read and close it up again, most would say no way; but that's Gmail in a nutshell. Most people clearly have no understanding of the power of consolidating minute packets of seemingly innocuous data over time, and defer to the 'if you've got nothing to hide you've got nothing to worry about' argument to hide their ignorance.
The big question that always remains for me is, how responsible is the user for their privacy when the device, apps and services are actively trying to obfuscate what the product actually is, or what they do with the data. Should the default be caveat emptor or caveat venditor, and why? Can you even have 'buyer' beware when most of the offenders are 'free' service based on the collection of freely given information.
That is proper fucked.Even then, is it really when it still can act on voice commands from its "off" state? hmmm
Crypto you had to ID verify yourself to the exchange to buy and sell?Oh well, it didn't cost much, I paid in crypto too.
initially then.... something somethingCrypto you had to ID verify yourself to the exchange to buy and sell?
Desolder all of the things!!Even then, is it really when it still can act on voice commands from its "off" state? hmmm
Reminds me of a project I saw a while back too.That is proper fucked.
It's all fucked, we are all fucked
depends. If the white noise generated was a prerecorded loop/soundbite then absolutely. You'd do this by inverting the phase of the loop and playing it at the same time. The oppositely phased identical sounds cancel each other out to reveal all other sound. Kinda a neat audio trick.But can [insert tech overlord here] simply determine your white noise signature and then filter it out to hear everything anyway?!? Who knows...
I don't care about what the rest of the world is doing and I don't know why you keep on trying to convince me about that. I'm trying to understand the technological approach to protecting privacy. You mentioned the issue of of device ID and how that is used to identify us and our actions and I asked you to post some useful info on that so I can understand it. I don't know why you aren't doing that instead of trying to convince me of something I understand, accept and don't care about.Now I KNOW that's not what you're saying, and I fundamentally understand your point of view. I'm just arguing that its unrealistic and unreasonable. The majority of world users have proven already they don't understand what they are doing with technology on a daily basis or how it works and they for the most part implicitly trust it. Its perfect
Man your quotes are messed up. I come back here reading the last post first, I get to this. Crypto? Wtf?Crypto you had to ID verify yourself to the exchange to buy and sell?
Not overly, if you use a decent VPNThrough a VPN?
Be fucking slow though
Yeah dunno what happened thereMan your quotes are messed up. I come back here reading the last post first, I get to this. Crypto? Wtf?
You mentioned the issue of of device ID and how that is used to identify us and our actions and I asked you to post some useful info on that so I can understand it. I don't know why you aren't doing that instead of trying to convince me of something I understand, accept and don't care about.
Dude, if you want to act like a dickhead, you can bow out of the thread, no one was rude to you. You came into this thread shooting your mouth off and to this point you've provided nothing of actual substance except for agreeing with others and stating what everyone already knows.I posted a link to how your device id gets used in several ways. Did you want me to find every usefull piece of info for you? Take a look at a software called threatmetrix and how it's implemented.
Is a search engine something you've opted out of also?
The user chooses to use Apple Wallet, the User DLs the app..., etc.I'll just leave this here
Australians first for big iPhone change
Australians will be the first users in the world to have contactless digital health insurance cards built into their Apple Wallet system, the tech giant has announced.www.news.com.au
Of course, user driven. Untill it's not.
I'd argue that you were rude.Dude, if you want to act like a dickhead, you can bow out of the thread, no one was rude to you. You came into this thread shooting your mouth off and to this point you've provided nothing of actual substance except for agreeing with others and stating what everyone already knows.
And for the record, you posted a link to a marketing company that didn't explain shit about the technology or how it works.
Untill that's the only way a company will interact with you. Woods through the trees man.The user chooses to use Apple Wallet, the User DLs the app..., etc.
All user driven from start to finish.
Yeah, I know I wasn't rude and I don't understand why you decided to be.I'd argue that you weren't rude.
In anycase. I'm not here to convince you or do your research for you. BUT you might want to Reload the page and look at the last comment. I've left you some more stuff you could look into of you actually care. But I'm telling you now, your online privacy doesn't exist, whatever you decide to do to protect it. Software like threatmetrix has that sorted, don't worry