TaviRider

joined 2 years ago
[–] TaviRider@reddthat.com 10 points 1 day ago (2 children)

[The bill] includes language that could ban not only VPNs but any method of bypassing internet filters or restrictions.

It sounds to me like I2P and tor would also be illegal.

[–] TaviRider@reddthat.com 8 points 2 weeks ago (1 children)

Stingray phone trackers and similar IMSI catchers are a kind of honeypot.

[–] TaviRider@reddthat.com 10 points 2 weeks ago (1 children)

ANOM wasn’t until it was, and then it shut down. I recommend the Darknet Diaries episode to hear the story.

[–] TaviRider@reddthat.com 3 points 1 month ago (5 children)

According to https://reddthat.com/post/25633 there’s payment options for librepay, ko-fi, and a few different crypto options. This post mentions ~A$22/week in total income revenue, which matches what librepay reports. What’s the income from all the other sources? Are they all ~A$0?

[–] TaviRider@reddthat.com 3 points 2 months ago* (last edited 2 months ago)

We secure your account against SIM swaps…with modern cryptography protocols.

This just dosent make ANY sense. Sim swaps are done via social engeneering.

See this for details. Their tech support people do not have the access necessary to move a line so there’s nobody to social engineer. Only the customer can start the process to move a line after cryptographic authentication using BIP-39.

proprietary signaling protection

If they wanted to be private, it would be Open source.

I’m really tired of this trope in the privacy community. Open source does not mean private. Nobody is capable of reviewing the massive amount of code used by a modern system as complex as a phone operating system and cellular network. There’s no way to audit the network to know that it’s all running the reciewed open source code either.

Voicemails can hold sensitive information like 2FA codes.

Since when do people send 2fa codes via voicemail? The fuck? Just use signal.

There are many 2FA systems that offer to call your number so the system can tell you your 2FA code.

The part where I share your reaction to Cape is about identifying customers. This page goes into detail about these aspects, and it has a lot of things that are indeed better than any other carrier out there.

But it’s a long distance short of being private. They’re a “heavy MVNO”. This means their customers’ phones are still using other carriers’ cell towers, and those can still collect and log IMSI and device location information. Privacy researchers have demonstrated that it is quite easy to deanonymize someone with very little location information.

On top of that, every call or text goes to another device. If it goes through another core network, most call metadata is still collected, logged, and sold.

If we accept all of Cape’s claims, it’s significantly better than any other carrier I’m aware of, but it’s still far from what most people in this community would consider private.

[–] TaviRider@reddthat.com 36 points 2 months ago (1 children)

It sure revealed something about the person who used ChatGPT, so mission accomplished.

[–] TaviRider@reddthat.com 6 points 2 months ago

In market terms, bad news was already priced in. The fact that the steep drop wasn’t as bad as some analysts predicted means it was better news than expected, so the stock went up a bit.

[–] TaviRider@reddthat.com 16 points 2 months ago (3 children)

It’s usually harder to do for admins. They’re usually the ones who do the suspending.

[–] TaviRider@reddthat.com 15 points 2 months ago (1 children)

Okay, partial failure. But they ended up with an epic Viking burial at sea!

 

The legal situation is more complex and nuanced than the headline implies, so the article is worth reading. This adds another ruling to the confusing case history regarding forced biometric unlocking.

view more: next ›