The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous pageNext page →

    Heads up. Apple are looking at your photos.

    Discussion in 'Smartphones and Tablets' started by kojack, Aug 6, 2021.

  1. JRE84

    JRE84 Notebook Virtuoso

    Reputations:
    856
    Messages:
    2,505
    Likes Received:
    1,513
    Trophy Points:
    181
    @Papusan


    how do I stop them from spying any links???

    also I think I was hacked an altered IE experience....how do I see if I'm hacked these days and how do I prevent it?

    I just what the WWW back its been edited, like I have the intranet
     
  2. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    There's a couple of things to put into perspective here.

    @Pple looking through phones is more of a retroactive process than monitoring

    Monitoring by carriers is where the volume of SMS would be handled in real time through the SMS gateway's.... Obviously if there's no attachment then 98% of messages bypass the inspect rule.

    Voice & Data can be tapped easily by your provider as they're required to be compliant with CALEA / Lawful Intercept.

    Setting up a LI box on a network is relatively simple to do and triggering captures means just entering the criteria for monitoring and hitting submit.
     
    etern4l likes this.
  3. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Do you game on your phone?
     
  4. SamuelL421

    SamuelL421 Notebook Geek

    Reputations:
    8
    Messages:
    86
    Likes Received:
    59
    Trophy Points:
    26
    1000 foot view of the technical spec for this image hashing: https://www.scribd.com/document/519121401/Apple-s-CSAM-detection-mechanism

    On one hand, it's a horrible big-brother, dystopian measure. On the other - from a cryptography/privacy standpoint - it is an interesting system that they built for this task.

    The concerning bit from the technical details is the grouping mechanism by which Apple maps multiple pictures to one hash using some proprietary bits. I think the potential for false positives is higher than they let on and the reason that the system uses a multiple strikes/hits before uncovering a key that would allow for further inspection on the server end (Apple).
     
  5. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,535
    Likes Received:
    3,507
    Trophy Points:
    331
    Ah, so you think it would be some people reading the messages? Welcome to 2021 dude.. :)
     
    Reciever and Tech Junky like this.
  6. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,749
    Trophy Points:
    156
    With the apple spyware implementation (apparently spyware for the good ...for the moment, but still spyware), the android vs ios discussion got very active, even within apple addicts, sheeps and fanatics.

    As for who one can trust... remember Apple happily bent over picking up the soap for the china dictatorship and left the keys for the servers, while Google said 'absolutely not' and left, the loss of possibly billions $ in business did not weigh up against the choice for integrity. Tells more than enough IMO.
     
    Tech Junky and etern4l like this.
  7. JRE84

    JRE84 Notebook Virtuoso

    Reputations:
    856
    Messages:
    2,505
    Likes Received:
    1,513
    Trophy Points:
    181


    yeah robots control the world.....welcome to 3221



    supply one source for me to read.....facts are good mmmmmm facts
     
  8. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,747
    Messages:
    29,856
    Likes Received:
    59,722
    Trophy Points:
    931
    Do we all know what tools NSA have in their hands or have access to? Snowden and similars probably touched a small amount. And is this the correct numbers or is it much worse? Will we get the correct numbers (validated)? Nope.

    The NSA can still access your phone records
    In 2018, the NSA acquired data from over 600 million phone calls and text messages.
    upload_2021-8-10_21-3-24.png
    https://www.expressvpn.com › ...
    10 Ways the NSA Is Spying on You Right Now | ExpressVPN Blog

    Then we have all other governments spy groups. They even spy on each other:D

    Edit. We have a big spy case in Denmark. U.S agency checked the whole overseas internet. And we know nothing how big it was. None will tell the truth. Never ever!
     
    Last edited: Aug 10, 2021
    etern4l likes this.
  9. SamuelL421

    SamuelL421 Notebook Geek

    Reputations:
    8
    Messages:
    86
    Likes Received:
    59
    Trophy Points:
    26
    I'm not sure I follow the root of the argument here... but yes, you can go through as many messages, images, voice recordings, etc as the depth of your organization's pockets will allow. They can scan through messages with filters of varying specificity to rule out everything but the communication they want to see. Here's a basic example: think coarse filter to weed out 99% of the stuff they don't care about (automated, not resource intensive). An in-between filter to rule out even more while reviewing the actual contents/context (automated, probably resource intensive). Finally, gather the remaining flagged communications for actual human review.

    Take the example of this image hashing system Apple uses: https://www.scribd.com/document/519121401/Apple-s-CSAM-detection-mechanism
    In this example, every image on the phone gets a companion hash that uses some proprietary algorithm + elliptic curve (ECC) to make small hashes that represent each image (or groups of very similar images - where the problem of false positives happens). Those hashes can be compared with next to no effort due to small size and are likewise easily uploaded to the server if the user moves images to icloud. When the automated hash comparison registers a threshold of positive matching hits, it allows for the complete decryption key to be read on Apple's end. At that point, a real person (probably some underpaid contract worker in SE Asia) manually reviews to confirm the result.
     
  10. Starlight5

    Starlight5 Yes, I'm a cat. What else is there to say, really?

    Reputations:
    826
    Messages:
    3,230
    Likes Received:
    1,643
    Trophy Points:
    231
    No. I do use it for one of my jobs, though - thus really need fast SoC & lots of RAM for numerous Chrome tabs.
     
  11. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    I use my phone for work as well, and the Pixel will do just fine. Not everyone needs stupid fast phones.
     
    Reciever and Starlight5 like this.
  12. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,535
    Likes Received:
    3,507
    Trophy Points:
    331
    You seem to have a tendency towards veering off on tangents. This is not about robots controlling the world, it's about computers being used to scan contents such as text messages and images. I won't insult you by positing exact instructions on how to use a Web search engine to access the vast amount of information available on that topic.
     
    Last edited: Aug 11, 2021
  13. Starlight5

    Starlight5 Yes, I'm a cat. What else is there to say, really?

    Reputations:
    826
    Messages:
    3,230
    Likes Received:
    1,643
    Trophy Points:
    231
    I'm positively sure I'd be satisfied by Pixel 5's performance despite slower SoC. I also read some more about CalyxOS and it has a proper user-controllable firewall built-in, thus no need to root and unlock bootloader.

    Still, Pixel 5's value proposition is just not there, at least for me. Too much to give up going this route, sadly...
     
    Last edited: Aug 11, 2021
    kojack likes this.
  14. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    @ Starlight5

    I tested a P5 when switching providers and it sucked IMO. They're supposed to be the latest / greatest and just felt underwhelmed holding one. Might be great for some but, the price point on them for what they do is over what they're worth. Maybe they'll fix that with the P6 but, I kind of doubt it.

    Going with other brands like Mi / OP / others at the same price point is a better experience.
     
    Starlight5 likes this.
  15. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Another apple device out of the stable, moved the ipad 5th gen out last night. 2 left. our two phones.
     
    Starlight5 likes this.
  16. Reciever

    Reciever D! For Dragon!

    Reputations:
    1,530
    Messages:
    5,350
    Likes Received:
    4,375
    Trophy Points:
    431
    But skynet is real!

    Dell has already been pitching solutions to big data for at least a few years now. I'm sure it's longer than that, but I've only had to endure their annoying yearly "certifications" since 2018. My personal and professional interest in selling that technology doesn't exist, but more to the point that there are means to deriving meaningful information from "big data".
     
  17. JRE84

    JRE84 Notebook Virtuoso

    Reputations:
    856
    Messages:
    2,505
    Likes Received:
    1,513
    Trophy Points:
    181
    i realize what search engines do but people still need to read the info....thats all i was saying...and as it stands theres to much to read


    source
    '
    https://abcnews.go.com/ABC_Univision/governments-phone-text-email-spying-explained/story?id=19347440


    no offense dude but the gov can't even spy on every sensitive text and def not apple

    its funny too me being told things that are ridiculus and that its possible.....maybe in a few years it will be possible but I thought we were talking about the here and now


    heres a snippet

    One thing is certain: It takes a huge effort to look at that much information from millions of American phone and computer users, much less collect it. US residents make an estimated six billion phone calls a day. The official budget and number of employees at the NSA and other intelligence agencies is classified, but it's estimated to be 100,000, more than the number of soldiers in the entire British Army.

    basically saying what im saying
     
    Last edited: Aug 12, 2021
  18. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,535
    Likes Received:
    3,507
    Trophy Points:
    331
    Given the reference to search engines, I can only assume this was an attempt at rebuking my post, although it feels more like a random conversation between @JRE84 and @JRE84.

    The point I made earlier was that these days surveillance and content analysis is not limited by manpower. The random 2013 article is necessarily outdated, and bears very little relation to the actual point.
    My statement referred broadly to state and commercial surveillance, the potential for which is compounded in the US in particular by fairly lax privacy protection laws. Full information regarding the current extent of either is unlikely to be in public domain, so it is fair to assume that if some form of privacy violation is attainable from technical and legal perspective, it is likely occurring (at least to a certain extent).
     
    Starlight5 likes this.
  19. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Violations are coming for sure. Apple has doubled down on the stupid and are going to allow 3rd party usage of their invasion software.
     
    etern4l likes this.
  20. JRE84

    JRE84 Notebook Virtuoso

    Reputations:
    856
    Messages:
    2,505
    Likes Received:
    1,513
    Trophy Points:
    181
    ok eternal your probably right!!

    but I was thinking wow now thats alot of information....man have times changed...I wasn't rebuking your post..
     
  21. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    There are plenty of devices that can be inserted to scan voice / data inline and post transmission. If a company / person within a company so desires to view data they always have the ability to do so. There are limitations on whom can do so though and they need a valid reason to do so w/o being investigated for doing so.

    The devices within the network have the ability to view every transaction a "phone" makes. When your "phone" connects to the network there's a handshake process that gathers the details to make it ready for service. All of this is visible in real time when monitoring a specific device. When an MMS is sent it hits a server that processes it and sends it on its way to the destination.

    Those little RCS bubbles you see on text messages when someone is writing a reply...

    Once again... If it has an IP it can be monitored. Rather it is monitored.

    There's always a chance someone is probing a device for reasons other than day to day business needs. I've setup the devices to gather warrant related communications. If there's a legal option there's always one that's not as well being available. It's not to say the locations housing the communications equipment aren't secure but, technology to tap is out there. The access you would need to get it into the network is a bit harder to come by w/o some inside knowledge of the locations as most of the buildings look like their surroundings and blend in well. Your typical office building down the street could be a site where a whole floor could be dedicated to some telco servers that process calls / messages. Office parks could have a data center in them and you wouldn't know it if you didn't look for it.

    To setup surveillance on a network only takes a box the size of the PC on your desk + a couple of cables to tap into the path. When you're in a data center these boxes all tend to look the same and you wouldn't pinpoint which one is monitoring things w/o a schematic as a map to show you where it is. It's not like they have a sign over them or different colored flashing lights on them to stand out. Really you could take any generic server and install the OS on it and be up and running.

    [​IMG]
     
    Starlight5, JRE84 and etern4l like this.
  22. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Even apple employees are raising the alarms on this one now, and apple are trying to silence them. Yeah. Think about that.
     
    etern4l likes this.
  23. Reciever

    Reciever D! For Dragon!

    Reputations:
    1,530
    Messages:
    5,350
    Likes Received:
    4,375
    Trophy Points:
    431
    Silencing people is par for the course these days in big tech
     
    etern4l and Papusan like this.
  24. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    especially the evil empire...
     
    etern4l likes this.
  25. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    I like this quote. Seeing as "the evil empire" has released about 50 different press releases "trying to explain" the blatant privacy breech, the more it's smelling like a larger rotten egg than it already was...

    taken from a user on macrumors.

    " The more you have to "explain" over and over some new controversial "feature", the more it begins to stink. "
     
    Papusan and etern4l like this.
  26. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,747
    Messages:
    29,856
    Likes Received:
    59,722
    Trophy Points:
    931
    Apple have added a limits before they take action. I wonder what the limits is for Microsoft :) Welcome to the Cloud storage age @tilleroftheearth @Mr. Fox @Ashtrix @Mr. Fox (it doesn't matter what cancer company you chose). Never use paid storage from M$ or Apple. You should avoid all!!!

    Apple: Anti-Child Porn System Won't Trigger Until at Least 30 Images Are Detected pcmag.com | today

    So on Friday, Apple released more details about how it’ll ensure the technology doesn’t spiral out of control. The company did so by publishing a 14-page document, outlining the various safeguards in place for its child sexual abuse material (CSAM) detection system.
     
  27. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    there is always something new from them. What a joke. This proves it's not about the Children. It's about something else. If it were about the children like apple is claiming, 1 photo would trigger their "system". They are liars.
     
    Mr. Fox, tilleroftheearth and etern4l like this.
  28. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,747
    Messages:
    29,856
    Likes Received:
    59,722
    Trophy Points:
    931
    Fix it for you….They are “ all” liars.

    They collect photos as the bigger boy Microsoft. None take action with not enough proof. Same also if you investigate terror. None take action before they have enough to jail you.
     
  29. Ashtrix

    Ashtrix ψυχή υπεροχή

    Reputations:
    2,381
    Messages:
    2,082
    Likes Received:
    3,291
    Trophy Points:
    281
    Soon Goolag is going to copy them, The thing is here, I don't want to go deep esp about Hollywood and UN, etc. But the fact is Apple is too bold. They know people are going to abide and no one is going to change anything. Look at Verge and all Reddit blogs and all, excuses. Honestly the only option here if anyone really cares - Stop using Apple products. Stop subjugating yourself to Orwell 1984.

    Louis Rossman already mentioned a lot of things on his channel but to keep it simple. Apple is saying CSAM Hash, no idea why hashing it's only useful if the photos from the real predators are using Android since Android phones have MTP system where it can physically copy same file from the computer to a phone. So the hash will be same. Nothing will change unless one edits a file. As for Apple, I do not think they use same hash because iPhone needs iTunes software and it syncs photos, If using third party sync tools and applications maybe but cannot be sure.

    AI is the ultimate part here, they are going to run the NN and ML on these devices, on device. Any paid Cloud storage already does it, why does Google provide so much free storage for Google Photos and Sync service on top they even boast how the App will identify your "friends" and "faces", in addition to location metadata from the Camera API. Here Apple is simply going to tag the whole photos that come from the camera and data transfer. Which means your photo is going to be tagged irrespective of content since it helps their ML AI Processors Data warehouse and Server farm to improve.

    Google will do it in such a way that they can add the Telemetry end points to the Camera2 API which is actually the fundamental base for Google Pixel camera GCam ports where the Vendors have to implement else GCam AI systems wont work on the device which user wants to mod. So the only option that Google has is to embed the Telemetry into it, but that's a tall order since it involves a lot of TOS for all the vendors on the market and SoCs and Nations. Plus they must enforce it as well on the CTS level (which is mandatory for any certification process). And they have to hook it up to the Playstore API, this is also another tall order and battery issues PLUS their own bs storage will interfere - Scoped Storage. It's harder for them, also on device scanning means Qcomm, Snapdragon SoCs must have NN API which has to match the Google API and do the computation on the phone.

    With Apple ? Nothing matters since their Processor controls entire UI and Root and OS is entirely locked out, no access to any other application except for the APIs exposed PLUS AOSP cannot be pozzed like this on Goolag Android side, due to it's Design basis. This is just like how CCP accesses Chinese Citizen devices iCloud and on device Backdoor which scans for browsing habits, want a starter ? - Apple iCloud keys for Chinese users, Huawei LZPLay backdoor system ( this guy did an extensive digging mysteriously important tweets are gone now)

    TL;DR - Stop using Apple. They will spread this ML AI to far more other Software components from your Browsing habits to your Earpiece. Win11 TPM is also somewhat similar since it gives M$ access to BIOS level access, which makes their Defender scan the BIOS chips as well. Complete Filesystem scanning ability.
     
    Last edited: Aug 14, 2021
    Papusan and etern4l like this.
  30. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,749
    Trophy Points:
    156
    kojack, Papusan and etern4l like this.
  31. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    What a joke they all are now....Trying to backpedal and get the kool-aid flowing. Even their staunch users are turning on them and they are in major reactor meltdown mode right now. Every 15 mins apple releases a new statement regarding this. TOO LATE Timmy, Craig et al. Damage is done, no one trusts you anymore. Those that do are insanely stupid.
     
    etern4l likes this.
  32. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    It's not that they're all dumb, it's that Apple is really really good at loyalty and advertising. HW isn't that bad either when compared to everything on the market. The thing that bugs me is the captive ecosystem that doesn't allow much freedom to not install iTunes to manage the files directly.

    https://www.techrepublic.com/article/why-is-android-more-popular-globally-while-ios-rules-the-us/
    • Android holds a massive global market share lead over iOS
    • iOS holds a slight market share lead over Android in the U.S.
    According to Statcounter, the global market share looks like this:
    • Android: 72.2%
    • iOS: 26.99%
    However, within the U.S., that market share looks like this:
    • iOS: 59.17%
    • Android: 40.54%
    US rooting for Jobs vs Android.... go figure.

    Anyway. The Kool-Aid is good apparently for 60% of the US that love their iCrap. Will this make a big dent moving forward with 99.99% of Apple users? NO Does it shed light on what tech companies are capable of? YES

    The mining of personal data on a device vs through a connection is a leap that shouldn't be made proactively by a company w/o cause. Just because you can do it doesn't mean you should do it.

    The best part of Apple is the forcing of other companies to redesign their hardware to be more sleek and powerful. The worst part is the brainwashing of people to buy their products that are overpriced and captive.

    Android opens the doors to OEM's to produce competitive HW vs Apple just making their 1-2 devices per year @ inflated prices / special connectors / itunes to load/backup anything.

    Apple doesn't need to be competitive when they're making the HW / SW and no one else gets to play in their sandbox. I smirked when I saw the EU is potentially going to force them to use USB-C across the board. https://www.macrumors.com/guide/eu-charging-standard-proposals-and-apple/

    [​IMG]
     
    6730b and etern4l like this.
  33. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,535
    Likes Received:
    3,507
    Trophy Points:
    331
    Looking at the recent dumbed down AW laptops, it's not clear that Apple's influence on computer hardware market is quite so positive.
     
    Tenoroon and Reciever like this.
  34. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    What's funny is that my mid range dell 14 5406 is fully upgradable. Ram, SSD, etc. So they are not having quite the effect as they think. As for the M1, that's not as AMAZING as Apple would have you believe either.
     
    etern4l likes this.
  35. ronaldheld

    ronaldheld Notebook Deity

    Reputations:
    182
    Messages:
    820
    Likes Received:
    50
    Trophy Points:
    41
    So what offers more privacy/ :IOS or Android?
     
  36. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Android, since you can control the OS. Plus, The data that google skims off you is browsing history, location data and things like that. Things I care less about. Apple is looking at your personal photos and messages LOOKING for a crime. It's a totally different use of your data. Photos and message are private, my location is no big deal for me.
     
    6730b likes this.
  37. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    Android offers more control over more than just privacy though too. Since it's an open source OS it's configurable for much much more than the locked down iOS by the user. If you wanted to you could modify every single file on Android through ADB commands or take an image of the core files and adjust them as needed to your liking and then apply them to the phone. ROM's are a prepackaged way to do this w/o the technical knowhow to do it yourself. Pretty much every phone has a "ROM" version available for use because nerds like to tinker with things and improve performance upon a release from Google / OEM. OEM images tend to have their own bloatware attached to them and in some cases a lot more than others. Google devices have the least amount to strip off when released compared to say Samsung / LG phones. There are other OEM's that provide light bloatware to "skin" a particular branding but not all of the ancillary "apps" / "controls" that others apply.
     
    Papusan, 6730b and kojack like this.
  38. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Yes, all of this as well. I was just referring to the amount and what type of data collection between the two. As mentioned, since android is more open, you can see what's going on...where as with spiOS You have no idea what apple is collecting from you. We know more now, like going through your messages and photos without you knowing.
     
    etern4l likes this.
  39. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    Everything they can since it's a closed system.
     
    kojack likes this.
  40. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    Exactly my point.
     
    etern4l likes this.
  41. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,749
    Trophy Points:
    156
    "But any country's legislature or courts could demand that any one of those elements be expanded, and some of those nations, such as China, represent enormous and hard to refuse markets, critics said."

    "Police and other agencies will cite recent laws requiring "technical assistance" in investigating crimes, including in the United Kingdom and Australia, to press Apple to expand this new capability, the EFF said."

    "The infrastructure needed to roll out Apple’s proposed changes makes it harder to say that additional surveillance is not technically feasible," wrote EFF General Counsel Kurt Opsahl.

    https://www.reuters.com/technology/...s-own-ranks-2021-08-12/?utm_source=reddit.com
     
    Papusan and etern4l like this.
  42. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    @ 6730b

    I think the bigger idea when implementing the "forest over the tree view" is that technology has allowed dumb people to do dumb stuff thinking err not thinking about the consequences of their actions.

    For instance since the internet came about people have gotten a bit dumber generally speaking. Most today have never read a paper map and only used online maps. Doing math w/o a phone in hand? It's certainly leveled the playing field for fuel pricing w/ API's pulling data from gas stations and showing the price spread. Waze telling you to drive down a farmer's field because it's faster?

    Obviously we've driven off the path of the original post with surveillance techniques / abilities at this point.

    Apple = bad
    Google = less bad
     
    Mr. Fox and etern4l like this.
  43. Tech Junky

    Tech Junky Notebook Deity

    Reputations:
    341
    Messages:
    1,497
    Likes Received:
    610
    Trophy Points:
    131
    Just for comparison... I have everything passing through pihole for DNS and by far the phone is the least chatty device on the network. Android only queries for time / weather / a couple of other permitted requests. Everything blocked is related to tracking / ads / stuff I don't want leaked.

    [​IMG]

    Chromecast is a bit deceiving here though since I block outside access in to Plex which generates a ton of requests. However the phone is calling out 1/3 of that of the PC and 1/2 of the soundbar. The soundbar is innocuous though with connectivity checks to 3 UR'L's. Even with true traffic queries compared to the PC it's still 1/3 of the DNS queries.

    I'd be curious to see what kind of activity an iPhone has on hits to DNS and what URL's it's trying to call home on. Could be a simple blocking of those URL's to prevent Apple from reaching the device if its DDNS entries don't get update similar to blocking Nest from calling home for logging of usage.
     
    etern4l and Reciever like this.
  44. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,535
    Likes Received:
    3,507
    Trophy Points:
    331
    To be fair, Pegasua is not iPhone-specific.
     
  45. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    To be fair, apple knew about it long enough to patch the hole. And it's funny I have never heard of pegasus affecting any other platform than spiOS.
     
    etern4l likes this.
  46. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,535
    Likes Received:
    3,507
    Trophy Points:
    331
  47. kojack

    kojack Notebook Prophet

    Reputations:
    1,235
    Messages:
    4,187
    Likes Received:
    1,636
    Trophy Points:
    231
    I love the comment, " to be fair, you are probably safe "....HA HA. NO, YOU'RE NOT!
     
  48. Mr. Fox

    Mr. Fox BGA Filth-Hating Elitist®

    Reputations:
    37,255
    Messages:
    39,357
    Likes Received:
    70,784
    Trophy Points:
    931
    I think we have all seen more than ample evidence that all of the world's technology leaders whose products and services rely on a functioning internet connection to fulfill their reasons for existing are dishonest, conniving, surreptitious thieves whose purpose is to steal, defraud and profit by offering consumers products or services that they have been conditioned by those same bastards to believe they cannot live without. Yeah, my opinion is that crApple sucks, but so do the others... Google, Micro$oft, Amazon, Facepoot, Twatter and any others one wants to add to the short list of scumbags. Given a motive and an opportunity, all of them will do the wrong thing and package it in something that is superficially valuable or indispensable.

    At the end of the day, we would all be better off without them. Life would be different without them, but better overall. The relentless pursuit of convenience and all of the laziness and stupidity that it produces, has put the world, and everyone that lives in it, at risk and in harm's way. The internet isn't bad in any way, but it is used for bad purposes by bad people that are masquerading as a friend.
     
    Last edited: Aug 31, 2021
    Arrrrbol and Papusan like this.
  49. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,747
    Messages:
    29,856
    Likes Received:
    59,722
    Trophy Points:
    931
    Apple Backpedals On Controversial Child Safety Tech After Harsh Privacy Concern Backlash hothardware.com | Friday, September 03, 2021

    Apple announced this morning that it would delay a planned rollout of new protections aimed at minimizing the spread of Child Sexual Abuse Material (CSAM). The move comes after the company received high-profile backlash for the initiatives, and Apple executives even admitted that the initial messaging was bungled.

    "Last month, we announced plans for features intended to help protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material," said Apple in a statement. "Based on feedback from customers, advocacy groups, researchers, and others, we have decided to take additional time over the coming months to collect input and make improvements before releasing these critically important child safety features."

    And isn't this amusing... Apple backtracked the new disgusting move about privacy while Microsoft can continue block you out from your account for ever if they see/find innocent images with etc your half nude baby childeren playing in the garden home when they being uploaded on your M$ Onedrive sky cloud account.

    The Devil is everywhere. And you don't know what they do behind your back....
    Bahnhof: "Only Telia customers receive blackmail letters this year"
     
    Last edited by a moderator: Sep 8, 2021
    etern4l and Reciever like this.
  50. Reciever

    Reciever D! For Dragon!

    Reputations:
    1,530
    Messages:
    5,350
    Likes Received:
    4,375
    Trophy Points:
    431
    Thanks for the link
     
    Last edited by a moderator: Sep 8, 2021
    Papusan likes this.
← Previous pageNext page →