I like these kinds of tests, a sort of real world 'state of the thing', that thing in this case being the stack that is atproto outside of bsky.
I'm curious if anyone else has made similar recent attempts with maybe different constraints.
Posts by l3db3tt3r.bsky.social
I was thinking about how the Neo shows just how neutered iPadOS and iOS are on simply a technical level, and Apple is gatekeeping that ability to align with capital, not innovation.
I'm curious about what sections of the route you're skeptical about? So I can do some due diligence in my own planning.
My guess is scope. 3,800 miles to cross 'half' the country, In the context, of other cross country routes: the GDMBR at 3,083, TransAm at 4,253, GART at 3800, Southern Tier at 3,200, Pacific Coast at 2,800... and for a route optimized for 'back country', and 'off the beaten path' experiences.
Currently thinking about documenting this journey over atproto. I am currently considering, and open for suggestions, on what/how to do things like a trail journal (Leaflet?), and short form video content.
Adventure Cycling released the Golden Gravel GPS maps today!
The route stretches 3,805 miles (6,124 km) from the Mississippi River to the Pacific Ocean.
Tentatively planning to do this west bound starting around the 4th of July (in about 16 weeks).
It would just be nice to celebrate a more human existence where people have an easier ability to openly change their mind (and show that change) in the face of new evidence, or a better argument.
It would be nice if the technology did something instead of this 'delete' function, but one that your quote post just had a 'redacted' or 'contended' flag, with the end user being able to do some sort of reverse quote post functions, that let's them provide an answer, in a more directly way.
I have hope they deleted it in the face of changing their position, and not in that of saving face.
That framework, informs my thoughts on screen capturing.
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously. 1/7
A screen capture from a television news broadcast, specifically from a segment on "Mornings on news12." The visual focus is on a Walgreens employee wearing a body-worn camera, illustrating a report on the company's new security measures. Central Subject and Attire The Employee: The frame shows the torso and upper arm of an individual standing behind a counter. The Shirt: They are wearing a black T-shirt with white text. While the lanyard obscures parts of it, the text visible says: "Get your... and vaccinations today." * The Lanyard: A black lanyard hangs around the neck, featuring the words "AUDIO VIDEO" repeated in white text next to a small orange logo. The Body Camera Placement: A small, rectangular body camera is clipped to the center of the lanyard, resting on the chest. Display: The camera features a small color screen that is actively displaying a live feed of what it sees—in this case, a blue-tinted view of the store environment. Status Light: A small red indicator light is visible in the top right corner of the device, likely signifying that it is recording or powered on. Background and Graphics Background: The setting is a retail pharmacy counter. In the upper left, there is a blurry advertisement or poster featuring a man in a blue suit. News Graphic: At the bottom of the frame, a news "lower third" banner spans the width of the screen. The left side contains the show logo: "MORNINGS on news12." The main headline in a navy blue bar reads: "WALGREENS ROLLS OUT BODY CAMERAS FOR EMPLOYEES" in white, bold, capital letters.
Walgreens losing 90% of their valuation in under 10 years wasn't enough, so they came with an innovative way to keep remaining customers out of their stores.
Surveillance Capitalism serves the Surveillance State.
Demand data protections from your Govt officials.
That includes the ill-conceived notions of "protecting our children" initiatives, like Chat Control in the EU, and Age Verification laws.
L3db3tt3r and his Dog Rowdy posing with their bikepacking setup in front of a truck oversized load sign
Riding season is upon us, dialing in the ride and fit.
I need to look into finding a better dog rack for the bike. I’m sure I’ll have to get something custom, but I bet I could drop 5+ lbs.
Proton has articulate the legal framework, and your position within it, on how/what data can be accessed, but you haven't articulated, warned, or instructed, in how you contribute to the access of user data by way of processing payment information for your services, and those implications.
That friction comes from things like when the privacy policy references other agents for payment processing, and the end user's need to go from privacy policy, to privacy policy, or ToS to ToS, etc, to figure out the system that their data, and their privacy/security, is then being placed within.
The capitulation to account for is the shift of responsibility in data retention. The remarks Proton has made, indicate a systemic blindness, and/or complicit bias.
We are creating an unnecessary friction by not being radically transparent, and articulating the place we occupy within the systems.
I want to expand on this thread, because I think it is fruitful.
@proton.me I think there is a need to understand the systemic problem, that our privacy policies and lack of transparency creates.
I was just reading their privacy policy. It would be nice to have it articulated exactly HOW these payment processes work. That may seem trivial, but there is a disconnect in saying you do, and not being transparent on how that linking of your (meta)data can be used to expose you.
Screenshot of Proton Privacy Policy; "We do not retain full credit card details, we only save your name and the last 4 digits of the credit card number."
It's a little more then just a UI and single disclaimer.
I was looking through their payment support documentation, and it is missing data retention details there as well. (see tangent thread)
Also, their privacy policy doesn't really articulate how, but that it is.
Contextually I can understand why those slides read the way they do, but agree could maybe use a note.
I do want to prop your position up; though.
proton.me/support/paym...
proton.me/support/mana...
proton.me/support/bill
-- None of these articulate how this data is managed.
What is the framing of the article? being paywalled isn't helping
I understand what Proton is trying to articulate, defending the specifics to their actual culpability. I'm wondering if anyone is framing this as an educational moment. It isn't proton=bad, it should be; apply the right threat model
There is a need of extrapolating why open source is so important in cryptography, into areas of educating on its implementation and usage. Instead we keep making black boxes.
There is also a level of radical transparency that should be involved here. Many of the concepts and processes in the privacy and security need to be spelled out specifically. The space has a weird “secrecy cloak” that permeates everything.
This.
If they told users that using a traditional payment method jeopardized anonymity in the sign up process, they may have not had data to hand over, and their peepees wouldn't have been so hurt by someone reporting on it.
They could've addressed that. But instead we get the "fake news" defense.
New from 404 Media: Proton Mail, the privacy-focused email service, gave authorities data that let the FBI unmask an anonymous 'Stop Cop City' protester. It was payment data linked to the anonymous email account. From that, FBI ID'd them, then tracked their movements www.404media.co/proton-mail-...
Toy Australian Sheppard wearing valentines heart antlers.
This is Rowdy. He doesn't look very amused with the boarding facilities shenanigans but, he does look awfully cute.
The most securist surveillance company hired a third party cyber security firm to help them out with their 100% secure system that has totally never ever been hacked.
So that the 'algorithmic' model of manipulation and exploitation, looses it's capacity to profile you, psychological manipulate you (sometimes called targeted persuasion or micro‑targeted manipulation) into compliance of their own means and ends.
That is to say, give control back to the individual, to provide a consent model, and allow them to manage their digital data, and the 5W1H of it's usage, as a matter of being a human right.