• 3 Posts
  • 71 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle
  • Having been a teenage boy myself, I wouldn’t dream of trying.

    But I knew it wasn’t OK to climb a tree with binoculars to try to catch a glimpse of the girl next door changing clothes, and I knew it wasn’t OK to touch people without their consent. I knew people who did things like that were peeping toms and rapists. I believed peeping toms and rapists would be socially ostracized and legally punished more harshly than they often are in reality.

    Making and sharing deepfakes of real people without their consent belongs on the same spectrum.




  • Much like many of the iPhone users when you asked the converse question, it’s not so much that something is stopping me, but that I have no interest in it. I don’t see any benefits that I care about, and it would cost time and money to switch.

    Let’s pretend for a moment that I did have some desire to switch, perhaps due to some new hardware from Apple or changes to Android I found unpalatable. Here are some things I’d consider major barriers:

    • Sideloading - I want to install stuff without permission from the hardware or OS vendor. Maybe I’ll even write a niche app without asking permission.
    • Administrative access - I have root on my Android phone, and I didn’t have to fight it to gain root (I know that’s not true of every device). If I don’t have root or can’t get it easily, it’s not really mine.

    That’s… basically it, but those are big things and Apple’s position on them is so opposite mine that they’re risking severe sanctions from the EU to comply with the EU’s sideloading regulations in the most useless way they can.










  • The alternative is safeStorage, which uses the operating system’s credential management facility if available. On Mac OS and sometimes Linux, this means another process running in the user’s account is prevented from accessing it. Windows doesn’t have a protection against that, but all three systems do protect the credentials if someone copies data offline.

    Signal should change this, but it isn’t a major security flaw. If an attacker can copy your home directory or run arbitrary code on your device, you’re already in big trouble.




  • If someone can read my Signal keys on my desktop, they can also:

    • Replace my Signal app with a maliciously modified version
    • Install a program that sends the contents of my desktop notifications (likely including Signal messages) somewhere
    • Install a keylogger
    • Run a program that captures screenshots when certain conditions are met
    • [a long list of other malware things]

    Signal should change this because it would add a little friction to a certain type of attack, but a messaging app designed for ease of use and mainstream acceptance cannot provide a lot of protection against an attacker who has already gained the ability to run arbitrary code on your user account.




  • Sure: don’t use Mastodon to participate in Lemmy communities.

    You can of course, which you clearly already know. Tagging a community in s top-level post even results in a good experience, but subscribing to communities does not, and you can’t vote.

    Maintaining accounts on both is a good idea.