What could they possibly tell me about my health by visually inspecting my shit? I see the website mentions detecting blood, but pretty sure I can do that too...
Pulse of Truth
Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).
This community is automagically fed by an instance of Dittybopper.
toilet. camera.
ummm… no thanks
Don't forget there's a monthly sub too! You can pay every month to have an AI train on your shit.
To be fair, that still may be end to end encrypted, just not the ends you were hoping for.
Rear end to backend
Requiem for a video stream
Enshittification
Something that starts as shit is distinctly not enshittified. It's just shit. Don't muddy the term.
shittification.
FecAI™
a subsidiary of excrement LLc.
I don’t know what is more stupid, that this exists or that it’s $600 plus $7/month.
Yes.
Exposed port 31337.
I like how they refer to BO as a administration tool when really it was an exploit tool that had the side effect of some nifty administration ability,
It was significantly more reliable than sub7, which usually was itself infected.
Shut up and take my upvote..
TFW you spend $600 a month on a subscription iot toilet camera just to find out it's been taking pictures from inside your toilet and sending them over the internet!
Why do people want a toilet cam in the first place?
Cancer and stuff
Like....butt stuff?
Is this a low-key kink shame or genuine ignorance?
You’re saying it’s a kink thing?
💀
WTF?
https is end to end
surely, once I read this article, I'll find they implemented ssl
edit:
as I suspected, Kohler is one of the ends of the e2ee. and it is implemented. what is the news here exactly
Https is the transit. End to end encrypted means it's encrypted before, during, and after transit. Ie the data at rest would/should be encrypted
and Kohler said they are encrypting the data at rest
They also said they decrypt after transit before they encrypt at rest, so it's not encrypted in between and they can look at your data. So it's not e2e if you want both ends to be you.
That's not what end to end encryption means. All encrypted transmissions are not end to end encrypted.
if Kohler is the other end of your transmission, and the data is encrypted til they decrypt it, it's e2ee. if you disagree, try explaining why.
Because that's plainly not what end to end encrypted means. That's just HTTPS.
if Kohler is the other end of your transmission
They're providing the service. End to end encryption maintains an encrypted communication channel between two clients that the service provider cannot decrypt.
By your definition, all HTTPS traffic would be end to end encrypted.
The term "end to end encryption" is just not applicable to this context and using it as marketting to users in order to give them a false sense of security is disingenous.
From the perspective of the Kohler toilet camera being the sender and the Kohler shit-reviewing service being the recipient, TLS can technically be end-to-end encryption. As long as the shit-reviewing server is doing the TLS termination itself—and not Cloudflare or a reverse proxy—that meets the definition insofar as only the two communicating parties having the ability to see the cleartext. That's assuming the server has disk encryption and no employee has access to it while the disk is unlocked.
Kohler calling it E2EE is still disingenuous as fuck regardless of my above hypothetical, however.
Again, nope. Not what end to end encryption means. That's just HTTPS.
Wait... this is a thing? I never thought someone would actually make this when it's been the butt of many gags in the media.
When the Man-in-the-middle hacks into it, he may not like what he sees.