@Papusan
how do I stop them from spying any links???
also I think I was hacked an altered IE experience....how do I see if I'm hacked these days and how do I prevent it?
I just what the WWW back its been edited, like I have the intranet
-
There's a couple of things to put into perspective here.
@Pple looking through phones is more of a retroactive process than monitoring
Monitoring by carriers is where the volume of SMS would be handled in real time through the SMS gateway's.... Obviously if there's no attachment then 98% of messages bypass the inspect rule.
Voice & Data can be tapped easily by your provider as they're required to be compliant with CALEA / Lawful Intercept.
Setting up a LI box on a network is relatively simple to do and triggering captures means just entering the criteria for monitoring and hitting submit.etern4l likes this. -
-
1000 foot view of the technical spec for this image hashing: https://www.scribd.com/document/519121401/Apple-s-CSAM-detection-mechanism
On one hand, it's a horrible big-brother, dystopian measure. On the other - from a cryptography/privacy standpoint - it is an interesting system that they built for this task.
The concerning bit from the technical details is the grouping mechanism by which Apple maps multiple pictures to one hash using some proprietary bits. I think the potential for false positives is higher than they let on and the reason that the system uses a multiple strikes/hits before uncovering a key that would allow for further inspection on the server end (Apple). -
Reciever and Tech Junky like this.
-
With the apple spyware implementation (apparently spyware for the good ...for the moment, but still spyware), the android vs ios discussion got very active, even within apple addicts, sheeps and fanatics.
As for who one can trust... remember Apple happily bent over picking up the soap for the china dictatorship and left the keys for the servers, while Google said 'absolutely not' and left, the loss of possibly billions $ in business did not weigh up against the choice for integrity. Tells more than enough IMO.Tech Junky and etern4l like this. -
yeah robots control the world.....welcome to 3221
supply one source for me to read.....facts are good mmmmmm facts -
The NSA can still access your phone records
In 2018, the NSA acquired data from over 600 million phone calls and text messages.
https://www.expressvpn.com › ...
10 Ways the NSA Is Spying on You Right Now | ExpressVPN Blog
Then we have all other governments spy groups. They even spy on each other
Edit. We have a big spy case in Denmark. U.S agency checked the whole overseas internet. And we know nothing how big it was. None will tell the truth. Never ever!Last edited: Aug 10, 2021etern4l likes this. -
Take the example of this image hashing system Apple uses: https://www.scribd.com/document/519121401/Apple-s-CSAM-detection-mechanism
In this example, every image on the phone gets a companion hash that uses some proprietary algorithm + elliptic curve (ECC) to make small hashes that represent each image (or groups of very similar images - where the problem of false positives happens). Those hashes can be compared with next to no effort due to small size and are likewise easily uploaded to the server if the user moves images to icloud. When the automated hash comparison registers a threshold of positive matching hits, it allows for the complete decryption key to be read on Apple's end. At that point, a real person (probably some underpaid contract worker in SE Asia) manually reviews to confirm the result. -
Starlight5 Yes, I'm a cat. What else is there to say, really?
-
Reciever and Starlight5 like this.
-
Last edited: Aug 11, 2021
-
Starlight5 Yes, I'm a cat. What else is there to say, really?
Still, Pixel 5's value proposition is just not there, at least for me. Too much to give up going this route, sadly...Last edited: Aug 11, 2021kojack likes this. -
@ Starlight5
I tested a P5 when switching providers and it sucked IMO. They're supposed to be the latest / greatest and just felt underwhelmed holding one. Might be great for some but, the price point on them for what they do is over what they're worth. Maybe they'll fix that with the P6 but, I kind of doubt it.
Going with other brands like Mi / OP / others at the same price point is a better experience.Starlight5 likes this. -
Another apple device out of the stable, moved the ipad 5th gen out last night. 2 left. our two phones.
Starlight5 likes this. -
Dell has already been pitching solutions to big data for at least a few years now. I'm sure it's longer than that, but I've only had to endure their annoying yearly "certifications" since 2018. My personal and professional interest in selling that technology doesn't exist, but more to the point that there are means to deriving meaningful information from "big data". -
i realize what search engines do but people still need to read the info....thats all i was saying...and as it stands theres to much to read
source
'
https://abcnews.go.com/ABC_Univision/governments-phone-text-email-spying-explained/story?id=19347440
no offense dude but the gov can't even spy on every sensitive text and def not apple
its funny too me being told things that are ridiculus and that its possible.....maybe in a few years it will be possible but I thought we were talking about the here and now
heres a snippet
One thing is certain: It takes a huge effort to look at that much information from millions of American phone and computer users, much less collect it. US residents make an estimated six billion phone calls a day. The official budget and number of employees at the NSA and other intelligence agencies is classified, but it's estimated to be 100,000, more than the number of soldiers in the entire British Army.
basically saying what im sayingLast edited: Aug 12, 2021 -
The point I made earlier was that these days surveillance and content analysis is not limited by manpower. The random 2013 article is necessarily outdated, and bears very little relation to the actual point.
My statement referred broadly to state and commercial surveillance, the potential for which is compounded in the US in particular by fairly lax privacy protection laws. Full information regarding the current extent of either is unlikely to be in public domain, so it is fair to assume that if some form of privacy violation is attainable from technical and legal perspective, it is likely occurring (at least to a certain extent).Starlight5 likes this. -
etern4l likes this.
-
ok eternal your probably right!!
but I was thinking wow now thats alot of information....man have times changed...I wasn't rebuking your post.. -
The devices within the network have the ability to view every transaction a "phone" makes. When your "phone" connects to the network there's a handshake process that gathers the details to make it ready for service. All of this is visible in real time when monitoring a specific device. When an MMS is sent it hits a server that processes it and sends it on its way to the destination.
Those little RCS bubbles you see on text messages when someone is writing a reply...
Once again... If it has an IP it can be monitored. Rather it is monitored.
There's always a chance someone is probing a device for reasons other than day to day business needs. I've setup the devices to gather warrant related communications. If there's a legal option there's always one that's not as well being available. It's not to say the locations housing the communications equipment aren't secure but, technology to tap is out there. The access you would need to get it into the network is a bit harder to come by w/o some inside knowledge of the locations as most of the buildings look like their surroundings and blend in well. Your typical office building down the street could be a site where a whole floor could be dedicated to some telco servers that process calls / messages. Office parks could have a data center in them and you wouldn't know it if you didn't look for it.
To setup surveillance on a network only takes a box the size of the PC on your desk + a couple of cables to tap into the path. When you're in a data center these boxes all tend to look the same and you wouldn't pinpoint which one is monitoring things w/o a schematic as a map to show you where it is. It's not like they have a sign over them or different colored flashing lights on them to stand out. Really you could take any generic server and install the OS on it and be up and running.
Starlight5, JRE84 and etern4l like this. -
Even apple employees are raising the alarms on this one now, and apple are trying to silence them. Yeah. Think about that.
etern4l likes this. -
-
I like this quote. Seeing as "the evil empire" has released about 50 different press releases "trying to explain" the blatant privacy breech, the more it's smelling like a larger rotten egg than it already was...
taken from a user on macrumors.
" The more you have to "explain" over and over some new controversial "feature", the more it begins to stink. " -
Apple have added a limits before they take action. I wonder what the limits is for Microsoft
Welcome to the Cloud storage age @tilleroftheearth @Mr. Fox @Ashtrix @Mr. Fox (it doesn't matter what cancer company you chose). Never use paid storage from M$ or Apple. You should avoid all!!!
Apple: Anti-Child Porn System Won't Trigger Until at Least 30 Images Are Detected pcmag.com | today
So on Friday, Apple released more details about how it’ll ensure the technology doesn’t spiral out of control. The company did so by publishing a 14-page document, outlining the various safeguards in place for its child sexual abuse material (CSAM) detection system.Spartan@HIDevolution, Ashtrix, Mr. Fox and 2 others like this. -
Mr. Fox, tilleroftheearth and etern4l like this.
-
They collect photos as the bigger boy Microsoft. None take action with not enough proof. Same also if you investigate terror. None take action before they have enough to jail you.Spartan@HIDevolution, Ashtrix, Mr. Fox and 2 others like this. -
Louis Rossman already mentioned a lot of things on his channel but to keep it simple. Apple is saying CSAM Hash, no idea why hashing it's only useful if the photos from the real predators are using Android since Android phones have MTP system where it can physically copy same file from the computer to a phone. So the hash will be same. Nothing will change unless one edits a file. As for Apple, I do not think they use same hash because iPhone needs iTunes software and it syncs photos, If using third party sync tools and applications maybe but cannot be sure.
AI is the ultimate part here, they are going to run the NN and ML on these devices, on device. Any paid Cloud storage already does it, why does Google provide so much free storage for Google Photos and Sync service on top they even boast how the App will identify your "friends" and "faces", in addition to location metadata from the Camera API. Here Apple is simply going to tag the whole photos that come from the camera and data transfer. Which means your photo is going to be tagged irrespective of content since it helps their ML AI Processors Data warehouse and Server farm to improve.
Google will do it in such a way that they can add the Telemetry end points to the Camera2 API which is actually the fundamental base for Google Pixel camera GCam ports where the Vendors have to implement else GCam AI systems wont work on the device which user wants to mod. So the only option that Google has is to embed the Telemetry into it, but that's a tall order since it involves a lot of TOS for all the vendors on the market and SoCs and Nations. Plus they must enforce it as well on the CTS level (which is mandatory for any certification process). And they have to hook it up to the Playstore API, this is also another tall order and battery issues PLUS their own bs storage will interfere - Scoped Storage. It's harder for them, also on device scanning means Qcomm, Snapdragon SoCs must have NN API which has to match the Google API and do the computation on the phone.
With Apple ? Nothing matters since their Processor controls entire UI and Root and OS is entirely locked out, no access to any other application except for the APIs exposed PLUS AOSP cannot be pozzed like this on Goolag Android side, due to it's Design basis. This is just like how CCP accesses Chinese Citizen devices iCloud and on device Backdoor which scans for browsing habits, want a starter ? - Apple iCloud keys for Chinese users, Huawei LZPLay backdoor system ( this guy did an extensive digging mysteriously important tweets are gone now)
TL;DR - Stop using Apple. They will spread this ML AI to far more other Software components from your Browsing habits to your Earpiece. Win11 TPM is also somewhat similar since it gives M$ access to BIOS level access, which makes their Defender scan the BIOS chips as well. Complete Filesystem scanning ability.Last edited: Aug 14, 2021 -
" Apple calls it an “advancement” in privacy" lol
https://arstechnica.com/tech-policy...-scanning-calls-it-an-advancement-in-privacy/ -
etern4l likes this.
-
https://www.techrepublic.com/article/why-is-android-more-popular-globally-while-ios-rules-the-us/
- Android holds a massive global market share lead over iOS
- iOS holds a slight market share lead over Android in the U.S.
- Android: 72.2%
- iOS: 26.99%
- iOS: 59.17%
- Android: 40.54%
Anyway. The Kool-Aid is good apparently for 60% of the US that love their iCrap. Will this make a big dent moving forward with 99.99% of Apple users? NO Does it shed light on what tech companies are capable of? YES
The mining of personal data on a device vs through a connection is a leap that shouldn't be made proactively by a company w/o cause. Just because you can do it doesn't mean you should do it.
The best part of Apple is the forcing of other companies to redesign their hardware to be more sleek and powerful. The worst part is the brainwashing of people to buy their products that are overpriced and captive.
Android opens the doors to OEM's to produce competitive HW vs Apple just making their 1-2 devices per year @ inflated prices / special connectors / itunes to load/backup anything.
Apple doesn't need to be competitive when they're making the HW / SW and no one else gets to play in their sandbox. I smirked when I saw the EU is potentially going to force them to use USB-C across the board. https://www.macrumors.com/guide/eu-charging-standard-proposals-and-apple/
-
-
etern4l likes this.
-
So what offers more privacy/ :IOS or Android?
-
6730b likes this.
-
-
etern4l likes this.
-
-
"But any country's legislature or courts could demand that any one of those elements be expanded, and some of those nations, such as China, represent enormous and hard to refuse markets, critics said."
"Police and other agencies will cite recent laws requiring "technical assistance" in investigating crimes, including in the United Kingdom and Australia, to press Apple to expand this new capability, the EFF said."
"The infrastructure needed to roll out Apple’s proposed changes makes it harder to say that additional surveillance is not technically feasible," wrote EFF General Counsel Kurt Opsahl.
https://www.reuters.com/technology/...s-own-ranks-2021-08-12/?utm_source=reddit.com -
@ 6730b
I think the bigger idea when implementing the "forest over the tree view" is that technology has allowed dumb people to do dumb stuff thinking err not thinking about the consequences of their actions.
For instance since the internet came about people have gotten a bit dumber generally speaking. Most today have never read a paper map and only used online maps. Doing math w/o a phone in hand? It's certainly leveled the playing field for fuel pricing w/ API's pulling data from gas stations and showing the price spread. Waze telling you to drive down a farmer's field because it's faster?
Obviously we've driven off the path of the original post with surveillance techniques / abilities at this point.
Apple = bad
Google = less bad -
Just for comparison... I have everything passing through pihole for DNS and by far the phone is the least chatty device on the network. Android only queries for time / weather / a couple of other permitted requests. Everything blocked is related to tracking / ads / stuff I don't want leaked.
Chromecast is a bit deceiving here though since I block outside access in to Plex which generates a ton of requests. However the phone is calling out 1/3 of that of the PC and 1/2 of the soundbar. The soundbar is innocuous though with connectivity checks to 3 UR'L's. Even with true traffic queries compared to the PC it's still 1/3 of the DNS queries.
I'd be curious to see what kind of activity an iPhone has on hits to DNS and what URL's it's trying to call home on. Could be a simple blocking of those URL's to prevent Apple from reaching the device if its DDNS entries don't get update similar to blocking Nest from calling home for logging of usage. -
To be fair, Pegasua is not iPhone-specific.
-
etern4l likes this.
-
-
I love the comment, " to be fair, you are probably safe "....HA HA. NO, YOU'RE NOT!
-
I think we have all seen more than ample evidence that all of the world's technology leaders whose products and services rely on a functioning internet connection to fulfill their reasons for existing are dishonest, conniving, surreptitious thieves whose purpose is to steal, defraud and profit by offering consumers products or services that they have been conditioned by those same bastards to believe they cannot live without. Yeah, my opinion is that crApple sucks, but so do the others... Google, Micro$oft, Amazon, Facepoot, Twatter and any others one wants to add to the short list of scumbags. Given a motive and an opportunity, all of them will do the wrong thing and package it in something that is superficially valuable or indispensable.
At the end of the day, we would all be better off without them. Life would be different without them, but better overall. The relentless pursuit of convenience and all of the laziness and stupidity that it produces, has put the world, and everyone that lives in it, at risk and in harm's way. The internet isn't bad in any way, but it is used for bad purposes by bad people that are masquerading as a friend.Last edited: Aug 31, 2021 -
Apple Backpedals On Controversial Child Safety Tech After Harsh Privacy Concern Backlash hothardware.com | Friday, September 03, 2021
Apple announced this morning that it would delay a planned rollout of new protections aimed at minimizing the spread of Child Sexual Abuse Material (CSAM). The move comes after the company received high-profile backlash for the initiatives, and Apple executives even admitted that the initial messaging was bungled.
"Last month, we announced plans for features intended to help protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material," said Apple in a statement. "Based on feedback from customers, advocacy groups, researchers, and others, we have decided to take additional time over the coming months to collect input and make improvements before releasing these critically important child safety features."
And isn't this amusing... Apple backtracked the new disgusting move about privacy while Microsoft can continue block you out from your account for ever if they see/find innocent images with etc your half nude baby childeren playing in the garden home when they being uploaded on your M$ Onedrive sky cloud account.
The Devil is everywhere. And you don't know what they do behind your back....
Bahnhof: "Only Telia customers receive blackmail letters this year"Last edited by a moderator: Sep 8, 2021
Heads up. Apple are looking at your photos.
Discussion in 'Smartphones and Tablets' started by kojack, Aug 6, 2021.