Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’

  • 30 Posts
  • 53 Comments
Joined 3 years ago
cake
Cake day: April 25th, 2021

help-circle

















  • Zerush@lemmy.mlOPtoPrivacy@lemmy.mlRetriever
    link
    fedilink
    arrow-up
    1
    ·
    7 months ago

    I think every data sharing tool can be used in malicious way and this one logically isn’t an exception. But you can’t invalid a tool because someone use it maliciouly. It’s a tool to share data iin a privacy friendly way, period.



  • Zerush@lemmy.mlOPtoPrivacy@lemmy.mlRetriever
    link
    fedilink
    arrow-up
    1
    arrow-down
    3
    ·
    7 months ago

    I don’t know, a lot of haters in Lemmy. Retriver is a good tool, a good system to share sensible informations, FOSS. Maybe not so important for occidental users, but for sure for users in countries with restrictive govs.



  • Authors are not conspiranoics

    R. Joseph1*, C. Impey2, O. Planchon3, R. del Gaudio4, M. Abu Safa5, A.R. Sumanarathna6, E. Ansbro7, D. Duvall8, G. Bianciardi9, C. H. Gibson10, R. Schild11, 1Astrobiology Research Center, California, USA2Department of Astronomy, University of Arizona, Tucson AZ 857213Biogéosciences laboratory, University of Burgundy, Dijon, France4Department of Biology, University of Naples Federico II, Italy5Dept. of Applied Physics, Palestine Polytechnic University, Hebron, Palestine6Dept. of Research and Innovation, Eco Astronomy International Research Center, Tetouan, Morocco7Space Exploration Ltd, Boyle, County Roscommon, Ireland.8Dept. of Zoology, Oklahoma State University (emeritus), Stillwater, OK, USA9Università degli Studi di Siena, Italy. 10Center for Astrophysics and Space Sciences, University of California (emeritus), San Diego, USA11Center for Astrophysics, Harvard-Smithsonian (emeritus), Cambridge, MA, USA

    Have you read the paper, also the references at the end? Or is that you belief more in little green mens instead of plasma phenomenons, which explains a lot of the Unidentified Flying Objects?








  • It is logical that any page can see my public IP, at least if I do not use a VPN, but it is one thing to be able to see it and another to log this and my data. So why the hell do I use a front-end to see a fucking Tweet, when then I also have to use VPN, Ad/trackerblocker and others to prevent Twitter from possibly logging my visit or putting crap on my computer, what I do anyway? Resurrecting a dead front-end by putting another front-end on top is simply absurd and causes more problems and privacy attack points than going straight with proper protections. What do you do on Facebook for example or on others that are even worse than Twitter, where there is no valid front-end? What do you do when Twitter definitively turns off the Nitter code and sends this Twiiit to hell with it, put on a tin cap?


  • I don’t see the sense to use an front end for an front end to see a Tweet, apart with one whose PP is quite questionable

    …Here is an example of a request in the log file:

    ::ffff:127.0.0.1 - - [14/Feb/2022:00:02:58 +0000] “GET /jack HTTP/1.1” 302 60 “-” “Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36” Using twiiit.com adds a layer where one’s IP is visible. One’s IP is visible to twiiit.com then to whatever Nitter instance twiiit.com redirects the query to. Is this correct?

    Yes. When somebody uses the site their IP is visible to the service. Once they are redirected to one of the Nitter instances their IP is visible to that particular instance.

    You can use Tor or a VPS to obfuscate your IP address and useragent.

    This last is what I can do also without the need to use Nitter and Twiiit apart of the trackerblocker and randomizing fingerprints which I use anyway. Nitter sadly is dead and patch it with an front end don’t fix it at the long therm. Whats the next, another front end for Twiiit to see a Tweet ocassionaly?


  • Zerush@lemmy.mltoPrivacy@lemmy.mlDuckDuckGo failed me today
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    8 months ago

    5% of non Chromium source code corresponding to the unique UI, 100% auditable and even moddeable by the users. rest of the code degoogled, basic APIs like Google save browsing, Chrome Store, etc. as userchoice in the settings. No red flags, EU browser (overcomming GDPR), don’t spread nonsense



  • PP as it should be, like the one from Andisearch, which everybody can understand

    We promise not to share your data with anyone else.

    We only collect and retain sufficient data to help our customers use the service effectively, when they want to create an account or be remembered between devices and sessions, and to improve the service we provide.

    No data is shared with any other person or company, and personal information is not available to our team members beyond that directly required for customer support and service.

    What we do to try to protect you There is a limit to what we can do while still providing links to external websites and displaying content. But while you’re searching, we do our best to try to shield our users from the worst intrusive aspects of the Web.

    We don’t store any cookies.

    We block Google’s FLoC (Federated Learning of Cohorts) tracking technology from this app.

    We don’t log or store your IP address. It’s used to lookup your approximate location (nearest town) for location searches only, then discarded. It is never passed to third-parties.

    We only use your GPS or detailed location for searches with your express permission, and then only to approximate the area. Your GPS location details are not stored or passed to any third-parties.

    Searches are anonymous and private to you. We don’t log searches.

    We only use analytics within our service to improve it for our users.

    We block referrers on external links and use “nofollow noopener noreferrer” to protect you.

    We do not share any customer data with any third parties.

    We collect only the data needed to provide the service.

    We don’t use any off-site or third-party user tracking. There is no ad tracking such as Facebook’s or analytics platforms like Google Analytics.

    No advertising display or advertising tracking.

    We use randomized proxies to retrieve content for preview and reader mode.

    We use https encryption everywhere including for external links wherever available.

    We proxy images and try to strip third-party cookies from any reader content as much as possible.

    We display embedded videos and content for our customer’s convenience (so you can play a YouTube video in chat), but they are in a sandbox to help protect you, and restricted to only major reputable web services (like YouTube or Spotify). An embedded video might have cookies outside of our control.

    Or this from SSuite, the whole PP (and it isn’t even OpenSource)

    Van Loo Software does not rent, sell, collect, or share personal information about you with other people or nonaffiliated companies except to provide free software or services you’ve requested.

    And that’s guaranteed!

    -All our software is licensed as proprietary freeware.

    • No third-party add-ons, toolbars, installers, or software distributions allowed.
    • We are the foremost provider of free quality office software on the internet today.
    • We are solely supported by donations from our generous and kind software users.

    If a company had nothing to hide, there isn’t a need of long legal texts wich nobody can understand.






  • The best, at least better than selling userdata. Proto use it since a long time ago, all its products are OpenSource, frr versions paid by the Premium accounts with more features, apart of the basics, mre gigas in the mail and clous and more servers for the VPN. With this they can offer an decent free service without ads.