6-24-23-1a

This commit is contained in:
David Young 2023-06-24 09:12:01 -06:00
parent 183d9bb75d
commit 3b23c02c74
538 changed files with 79914 additions and 309 deletions

View File

@ -50,16 +50,10 @@ theme = "apsho"
weight = 1
[[menu.main]]
identifier = "blog"
name = "Federated Blog"
name = "Sovereign Reset"
url = "/blog"
parent = "community"
weight = 2
[[menu.main]]
identifier = "sovereignreset"
name = "Sovereign Reset"
url = "/sovereignreset"
parent = "community"
weight = 3
[[menu.main]]
identifier = "projectswelove"
name = "Projects We Love"

View File

@ -0,0 +1,15 @@
---
title: 2022 Year of Desktop Linux
date: 2022-12-20
featureImage: images/blog/linux.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Thanks to some Stack Overflow surveys, desktop Linux has arrived for developers
According to a developer survey, Linux holds a 9% lead over macOS.
[Year of the Linux Desktop](https://justingarrison.com/blog/year-of-linux-desktop/)
It's getting better and better meaning there is less and less an excuse to support the *centralizer* operating systems.

View File

@ -0,0 +1,27 @@
---
title: 21 Rules of Bitcoin Maxi
date: 2022-11-23
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## What can self-sovereign individuals learn from Bitcoin maxis?
We love Bitcoin maxis because they give the self-sovereign individual
[21 Rules of a Bitcoin Maxi](https://darthcoin.substack.com/p/21-rules-of-a-bitcoin-maxi)
Let's see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
1. Not your keys. This is the principal of decentralization. We don't use centralized services where are data is not our own.
2. Stack sats. For the self-sovereign, this means moving data from fiat services to decentralized and continuing to use and accumulate data on decentralized services.
4. No one needs to know how much bitcoin you have. Likewise, why advertise how you're accomplishing your digital freedom using decentralized tools?
5. Run your own node. In the end, if you don't run it, our have "joint" custody so that you can take it over, it's not your data.
6. Don't do shitcoining. When you interact with friends deep in the Google, Apple, Facebook, etc ecosystems, you're kissing up to shitcoiners. Maybe you need new friends?
7. Back up your wallet seed words. There are great ways to preserve your sovreignty through backups.
13. Bitcoin changes you. When you commit to the self-sovereign lifestyle, you change from "can I do this, please, sir?" to "I did this." It is life-changing.
14. Bitcoin teaches you to be a champion of truth. Here "truth" means living authentically under the principle that only you can be responsible for yourself and those you love. The "state" or the "corporation" do not have your "truth" in mind.
18. Always fight FUD. Most will say this lifestyle is not possible.
Together we can change our world.

View File

@ -0,0 +1,15 @@
---
title: Proof the NSA Spies on Americans
date: 2021-10-21
featureImage: images/blog/amerciansurveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Even when it is against the law. Who cars? Do you?
Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as "protecting" Americans.
https://threadreaderapp.com/thread/1587446686393122816.html
What can be done about it? First, make it much harder by decentralizing everything.

View File

@ -1,5 +1,5 @@
---
title: "Federated Computer Blog"
title: "Sovereign Reset: the Federated Blog"
date: 2023-05-30
description: "Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. For broader topics of health, money, relationships, technology, surveillance, see our sister blog at Sovereign Reset: https://www.sovereignreset.com."
description: "Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance."
---

View File

@ -0,0 +1,15 @@
---
title: No KYC Bitcoin
date: 2021-10-21
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## 15 methods for acquiring non-kyc bitcoin
If you want to acquire bitcoin without an intermediary tracking your identity, here are fifteen options...
https://sovrnbitcoiner.com/15-methods-to-aquire-non-kyc-bitcoin/
What have we to hide? Everything! :blush:

View File

@ -0,0 +1,15 @@
---
title: All Eyes Are On Us.
date: 2022-11-22
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## 5 Eyes, 9 Eyes, 14 Eyes: Protect Yourself From Global Surveillance
The fact of our lives today is constant global surveillance. By governments. By corporations.
https://vpnoverview.com/privacy/anonymous-browsing/5-9-14-eyes/
You may be shocked to the extent your government spies on you. In a "democracy". For your "safety".

View File

@ -0,0 +1,15 @@
---
title: Apple's Ad Business Booming
date: 2022-10-03
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## How do we square a digital, tracking ad business with privacy?
It's hard to see how a company running a $5 billion, and growing, digital (ie. tracking) ad business can be real about protecting privacy.
https://adguard.com/en/blog/apple-tracking-ads-business.html
Tim Cook famously said: "You are not our product. You are our customer. You are a jewel, and we care about the user experience." (2018) But does this line up with Apple's recent hard charge into the digital advertising business?

View File

@ -0,0 +1,15 @@
---
title: Ads in Apple App Store
date: 2021-10-21
featureImage: images/blog/timcook.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## What happens when the white knight gets down and dirty with the central trackers?
Apple has been slowly but surely expanding the reach of ads across their platforms for the past several years.
https://basicappleguy.com/basicappleblog/you-might-also-like
What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn't there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM. If we don't like this advertising shit, why are we acting like a bunch of cucks and whining? Be self sovereign.

View File

@ -0,0 +1,15 @@
---
title: Apple Checking Images? Evidence
date: 2023-01-15
featureImage: images/blog/applecampus.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Is Apple checking images we view in the Finder?
The evidence for the case that Apple is checking images browsed in the Finder and sending metadata to a remote server.
https://sneak.berlin/20230115/macos-scans-your-local-files-now/
We have another post with a rebuttal.

View File

@ -0,0 +1,15 @@
---
title: Is Apple Checking Images? Rebuttal.
date: 2023-01-18
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Is Apple checking images we view in the Finder?
Little Snitch claims browsing an image sends a message from "mediaanalysisd" to an Apple server.
https://eclecticlight.co/2023/01/18/is-apple-checking-images-we-view-in-the-finder/
But it doesn't appear this is actually happening. But let's keep investigating.

View File

@ -0,0 +1,15 @@
---
title: Apple Advertising
date: 2021-10-21
featureImage: images/blog/timcook.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## The fruit is building a demand-side platform
Has there been a successful digtial advertising platform that doesn't track users?
https://www.insiderintelligence.com/content/apple-will-emerge-advertising-player-watch-2023
Hey baby, don't worry. This is Apple. :kissing:

View File

@ -0,0 +1,15 @@
---
title: Apple Refuses to Cooperate
date: 2022-09-02
featureImage: images/blog/applefans.jpg
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## The US Government Seeks Information About App Store Behaviors
Apple's behavior with re: its App Store is notorious...
http://www.fosspatents.com/2022/09/apple-refuses-to-cooperate-with-us.html
"Apple taxes, tyrannizes, and "sherlocks" app developers. App developers are victims of Apple's conduct, and ACT | The App Association--which is actually just an Apple Association--unethically claims to represent the interests of small developers."

View File

@ -0,0 +1,15 @@
---
title: Apple Tracks You in the App Store
date: 2022-11-03
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## As you browse and tap, Apple is watching
"Ahem, we are building a better customer experience..."
https://twitter.com/mysk_co/status/1588308341780262912
...for us, Apple.

View File

@ -0,0 +1,15 @@
---
title: "Apple Tracks You"
date: 2022-11-08
featureImage: images/blog/applecampus.jpg
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Even when its own privacy setting say 'no' tracking...
Independent tests suggests Apple is tracking you on iOS even when you've disabled sharing "Device Analytics" altogether.
[Apple Tracks You](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558)
It's Apple. They know best.

View File

@ -0,0 +1,19 @@
---
title: Apple turned off a private communication tool in China just before major protests broke out.
date: 2021-10-21
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## What does it mean when a vendor tells you how to use tools on your device?
https://reclaimthenet.org/apple-air-drop-china
Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.
The article further notes that the Chinese government has been cracking down on online pornography and other forms of illegal content, and the use of anonymous usernames has been banned in the country. However, the report suggests that the anonymity feature of AirDrop has allowed users to bypass this regulation and share illegal content.
Apple has not yet commented on the matter, but the report raises concerns about the company's responsibility to prevent the spread of illegal content and protect its users from unwanted and potentially harmful material. It also highlights the challenges faced by tech companies operating in China, where strict government censorship and regulation often conflict with international standards of free speech and privacy.

View File

@ -0,0 +1,15 @@
---
title: Apple TV Ad Product
date: 2021-10-21
featureImage: images/blog/timcook.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Quietly pushing an ad product with media agencies
Where will we go for privacy when Apple abandons us to the verdant fields of advertising revenue?
https://digiday.com/media/apple-is-quietly-pushing-a-tv-ad-product-with-media-agencies/
To a self-sovereign, distributed, federated future.

View File

@ -0,0 +1,15 @@
---
title: Apple Looking Like 1990s Microsoft
date: 2022-01-24
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Does it come down to the $20 billion in cash paid annually by Google?
Apple really doesn't want competition on iOS for web browsers...
https://twitter.com/openwebadvocacy/status/1617802614149894144
Even Google allows competition on Android! Think of all the tracking offered up by iOS users to Google...

View File

@ -0,0 +1,15 @@
---
title: CSAM Scanning in the EU
date: 2021-10-21
featureImage: images/blog/europeanunion.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Using the pretext of child protection to introduce mass surveillance
This is still just a proposal.
https://tutanota.com/blog/posts/eu-surveillance-csam/
But the proposal would basically lead to all messages being read all the time. Get off the centralized services. Make it difficult.

View File

@ -0,0 +1,15 @@
---
title: Awesome FOSS Alternatives
date: 2022-07-15
featureImage: images/blog/selfhosted.gif
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## FOSS solutions to try
Here's another compiled list of FOSS solutions to investigate rather than giving money to *centralizer* man.
https://github.com/RunaCapital/awesome-oss-alternatives
Which ones look promising to you?

View File

@ -0,0 +1,15 @@
---
title: Awesome Privacy
date: 2022-07-21
featureImage: images/blog/privacy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## A list of privacy and security-focused apps, software, and providers
From the list: "Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data."
https://github.com/Lissy93/awesome-privacy
It would be even better if this was *not* hosted on Github. C'est la vie!

View File

@ -0,0 +1,15 @@
---
title: Awesome Self-hosted
date: 2022-01-21
featureImage: images/blog/selfhosted.gif
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Github listing of self-hosted software
This is a pretty comprehensive list of software you can self-host across a very wide variety of categories.
https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md
While we think Federated is a pretty good curation of the "best" software for self-hosting out there, this list reminds us there is so, so much more.

View File

@ -0,0 +1,15 @@
---
title: Basecamp is Leaving the Cloud
date: 2022-10-19
featureImage: images/blog/selfhosted.gif
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## An explanation
Basecamp's David Heinemeier Hansson explains the departure from the cloud.
https://world.hey.com/dhh/why-we-re-leaving-the-cloud-654b47e0
We don't agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions "analyze and store" with re: the Hey email service. Centralizer.)

View File

@ -0,0 +1,15 @@
---
title: Breaches for Everyone!
date: 2021-10-21
featureImage: images/blog/breaches.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Looks like lots of centralized services relied on another central service...
...and now the whole mass of them are breached.
https://twitter.com/tayvano_/status/1611131230074073088?s=20&t=NR4Z4aJlKaNg_rHuQVYn7A
CircleCI is the central culprit. We, the users of these centralized system have no clue whats going on in the entirely opaque background. No clue.

View File

@ -0,0 +1,15 @@
---
title: TikTok Ban is Patriot Act 2.0
date: 2023-03-28
featureImage: images/blog/americansurveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Get informed.
This is a global surveillance gambit.
https://www.youtube.com/watch?v=FWQGA_n5Z4M
It has very little to do with "China".

View File

@ -0,0 +1,15 @@
---
title: Bill to Ban TikTok Terrifying
date: 2023-03-28
featureImage: images/blog/tiktok.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## It's really about global surveillance
There's nothing to like about this bill.
https://twitter.com/greg_price11/status/1640722365809147905
BTW: Twitter, Facebook, Instagram, Google suck away your metadata and give it to a government, too.

15
content/blog/bisq.md Normal file
View File

@ -0,0 +1,15 @@
---
title: Bisq
date: 2021-10-21
featureImage: images/blog/nokyc.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## As in biscuit? Or just no-KYC bitcoin?
One of the best ways to buy bitcoin with no KYC.
https://bisq.network/
You'll also feel like a trader walking through a market in the town square. You get to set the deal.

View File

@ -0,0 +1,15 @@
---
title: Bitcoin Lightning Publisher for WordPress
date: 2022-11-21
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Review of a plugin for WordPress allowing receipt of Bitcoin payments
A description of a plugin for Wordpress enabling Bitcoin payments using the Lightning network.
https://wordpress.org/plugins/bitcoin-lightning-publisher/
Able to use a number of different Lightning backends.

View File

@ -0,0 +1,13 @@
---
title: Bitcoin Seed Backup Device Design
date: 2022-08-13
featureImage: images/blog/privatekeys.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Lessons learned stress testing dozens of seed phrase backup devices
The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
https://blog.lopp.net/a-treatise-on-bitcoin-seed-backup-device-design/

View File

@ -0,0 +1,15 @@
---
title: Google Maps Monopoly
date: 2022-12-16
featureImage: images/blog/googlemaps.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Linux, Amazon, Meta, and Microsoft want to break the Google Maps monopoly
There's some bad *centralizers* in this alliance. And Google Maps is a really nice product! But we need it broken up.
https://arstechnica.com/gadgets/2022/12/linux-amazon-meta-and-microsoft-want-to-break-the-google-maps-monopoly/
P.S. There is no "Linux" in the way they use the term. :blush:

View File

@ -0,0 +1,15 @@
---
title: BTCMap.org
date: 2021-10-21
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Where to spend your bitcoin
This is the chicken-and-egg challenge for bitcoin. Money for spending (versus money for store of value).
https://btcmap.org/map
The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we *all* need to be willing and able to take bitcoin?

View File

@ -0,0 +1,13 @@
---
title: Build a Gun
date: 2022-05-24
featureImage: images/blog/selfsovereign.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Build a 22 rifle to keep the varmits at bay...
Sure, you can buy a rifle, but why not learn about how things work by assembling the parts and building a custom rifle for pest control?
https://www.youtube.com/watch?v=7D5twkg8HE0&t=304

View File

@ -0,0 +1,15 @@
---
title: Build Your Own Seedsigner
date: 2021-10-21
featureImage: images/blog/privatekeys.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## You need a seed signer to keep your Bitcoin safe
With this technique, no one will know your seed phrase except the people you tell.
https://seedsigner.com/
No trust.

View File

@ -0,0 +1,15 @@
---
title: Building a Self-sovereign Lifestyle
date: 2022-11-07
featureImage: images/blog/selfsovereign.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## The permaculture mentality homsteaders have is congruent with Bitcoin low-time-preference mentality
What is true, even if you're not going to homestead, is you need to adopt a homesteading mentality...
https://bitcoinmagazine.com/culture/building-homesteader-lifestyle-with-bitcoin
The mentality of a homesteader is one that examines all areas of life to figure out how one can move from centralization to decentralization.

View File

@ -0,0 +1,15 @@
---
title: Building an ARM64 Home Server
date: 2023-02-19
featureImage: images/blog/arm64.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## This is the hard way
Honestly, we don't recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
https://jforberg.se/blog/posts/2023-02-19-rockpro64/rockpro64.html
By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.

View File

@ -0,0 +1,15 @@
---
title: Central Bank Digital Currency Amouse Bouche
date: 2023-03-01
featureImage: images/blog/cbdc.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Fat Man Tells Truth
Hey! Let's digitize all cash to something controlled by the guv'mint so that they can see who is doing what.
https://twitter.com/ZLOK/status/1639898907529314304?s=20
A person has to be insane, no, an idiot, to want to get on board with this idea.

View File

@ -0,0 +1,13 @@
---
title: Checklist for Digital Privacy and Security
date: 2022-11-28
featureImage: images/blog/privacy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## hWork through them as you get the time...eadline
Some of the recommendations are *centralizers*...but we like the effort and attention to the subject!
https://twitter.com/_k3tan/status/1597327334004371462?t=_G4DaTq7_p30VkmonGcgSg&s=19

View File

@ -0,0 +1,15 @@
---
title: Choosing the Right BTC/LN Wallet
date: 2022-09-16
featureImage: images/blog/lightning.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Some advice for choosing the right Bitcoin and LIghtning Wallet
Just like a password manager, choosing the right wallet for bitcoin can be stressful.
https://stacker.news/items/70725
As they say: "Think like a bank, not just be a bank."

View File

@ -0,0 +1,13 @@
---
title: Will Your Service/Product Provider Cancel You?
date: 2021-10-21
featureImage: images/blog/censorship.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## One listing of companies and a risk assessment...
The company may not like you and show you the door...
https://1792exchange.com/spotlightreports/

View File

@ -0,0 +1,17 @@
---
title: I Want a Computer that I Own
date: 2021-02-26
featureImage: images/blog/selfsovereign.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Can I Own My Computer?
These days, is it possible to own your computer and the data that flows through it?
http://misc-stuff.terraaeon.com/articles/computer-i-own.html
Self-ownership means "anonymity" and to "communicate securly with anyone on the planet without being observed by a third party". Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network. Each have their own challenges to "ownership" and incumbent third-parties such as Google, Apple, Microsoft, the NSA, five eyes, and all the rest who have built lucrative and oppressive business models on maintaining that observation.
We stand today naked before our computing overlords. Only when we begin to clothe and cloak bit by bit do we begin to take away control from the peeping Toms, the creeps, the "authorities".

View File

@ -0,0 +1,15 @@
---
title: Corporate Coalition Wants Government Digital ID
date: 2021-10-21
featureImage: images/blog/digitalid.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## The 'Better Identify Coalition' wants better ways to track you
It's a real rogue's gallery of corporations pushing for a single way to track us no matter what we do on or off the network.
https://reclaimthenet.org/corporations-push-for-digital-id
Shame on you Yubico for being part of this proposal. Why mortgage whatever good will you have to kneel at the feet of your corporate overlords?

View File

@ -0,0 +1,15 @@
---
title: Give Away Bitcoin on a Hotel Door Key
date: 2022-12-28
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Let's just say your traditional bank would frown on such behavior
Bitcoin is also a technology teeming with new ideas, new innovations.
https://twitter.com/3d_nout/status/1608245114052247552
I'm sure your bank wouldn't allow you to do this with your fiat account. I bet the "bad guys" could use this! :laughing:

View File

@ -0,0 +1,15 @@
---
title: Cryptocurrency, the Jews, and the Fundamental Question of Trust
date: 2021-10-21
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## How Bitcoin addressed a problem that has haunted human affairs for 2.5 million years
How does the decentralized Bitcoin system work?
https://www.tabletmag.com/sections/news/articles/cryptocurrency-jews-question-benjamin-samuels
How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.

View File

@ -0,0 +1,21 @@
---
title: Cryptography Is Not Enough
date: 2022-09-22
featureImage: images/blog/privacy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Going Beyond Cryptogrpahy
This wide-ranging discussion proposes a lifestyle.
https://dergigi.com/2022/09/10/cryptography-is-not-enough/
According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data. Additionally, cryptography cannot protect against other types of security threats, such as social engineering attacks, insider threats, and physical attacks on hardware and infrastructure.
The report argues that a comprehensive approach to security is necessary, which includes not only cryptography but also other security measures such as access control, authentication, monitoring, and incident response. The article also highlights the importance of regular security audits and updates, as well as ongoing education and training for users to promote awareness of security best practices.
The article notes that as digital systems become increasingly complex and interconnected, the need for a comprehensive security approach becomes even more important. It also highlights the potential risks of relying solely on cryptography for security, and the need for organizations and individuals to adopt a more holistic approach to protecting their data and systems.

View File

@ -0,0 +1,15 @@
---
title: The Original Cypherpunk's Manifesto
date: 1993-03-09
featureImage: images/blog/cypherpunk.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## It starts with privacy
The basis for everything we do at Federated Computer.
https://what.cd/
Privacy is the conerstone and that is built on anonymous systems.

View File

@ -0,0 +1,13 @@
---
title: Dandelion Root Recipes
date: 2023-05-07
featureImage: images/blog/healthy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Are there ways to use the very common dandelion for good?
This time of year in the northern hemisphere, yards can be filled with the yellow-flowered weed. Let's use them for good.
https://practicalselfreliance.com/dandelion-root-recipes/

View File

@ -0,0 +1,15 @@
---
title: Dangers of Digital Identity
date: 2022-03-24
featureImage: images/blog/digitalid.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## What happens when your 'identity' is simply 1s and 0s?
A digital identity isn't something from you. It is a dossier created by the *centralizers* to better understand, for themselves, the capabilities in the world allowed to you.
https://www.boniface-institute.com/the-dangers-of-digital-identity/
Identity is tied to access in the digital world.

View File

@ -0,0 +1,15 @@
---
title: Data Broker Rats You Out!
date: 2022-09-01
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Your data is given to police so that they can see everywhere you've been with the click of a mouse.
Hey, you're in the privacy of your home, what could go wrong?
https://www.eff.org/de/press/releases/data-broker-helps-police-see-everywhere-youve-been-click-mouse-eff-investigation
Answer: everything. Start taking back your privacy!

View File

@ -0,0 +1,17 @@
---
title: Telegram Discloses Names After Ruling
date: 2022-11-29
featureImage: images/blog/telegram.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## You think your Telegram Data is Secure?
If the thing you're using is centralized, it is so much easier for the "authorities" to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
https://www.livelaw.in/news-updates/after-court-order-telegram-discloses-phone-numbers-ip-addresses-of-users-accused-of-sharing-infringing-material-215311
The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.
It is important to note that this action was taken in compliance with a specific court order and does not necessarily indicate a general policy or practice of Telegram to disclose user information. Telegram has previously stated that it values the privacy of its users and that it will only disclose user data in response to a valid court order or other legal requirement.

View File

@ -0,0 +1,13 @@
---
title: No Health Benefits for Moderate Drinking
date: 2023-04-05
featureImage: images/blog/healthy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Can moderate drinking ever be healthy?
It doesn't look like it is...
https://www.japantimes.co.jp/news/2023/04/05/world/science-health-world/alcohol-health-studies/

View File

@ -0,0 +1,13 @@
---
title: Dropbox is Watching Your Activity
date: 2020-10-12
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Why All the Telemetry?
Dropbox sure does collect lots of information...
[Why So Much Telemetry?](https://www.dropboxforum.com/t5/Integrations/Why-So-Much-Telemetry/td-p/455961/page/3)

View File

@ -0,0 +1,31 @@
---
title: Drowning in AI Garbage
date: 2022-12-05
featureImage: images/blog/ai.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Drowning in AI Generated Garbage
It's a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We're old school that way. But most of the summaries require a significant amount of re-writing...so how lazy are we after all?
https://ploum.net/2022-12-05-drowning-in-ai-generated-garbage.html
Here's the AI speaking...
Discusses the proliferation of low-quality, AI-generated content on the internet and the challenges it poses for consumers and content creators alike.
The author notes that while AI-generated content can be useful in certain contexts, such as language translation or image recognition, it can also be used to create vast quantities of low-quality content such as spam emails, fake reviews, and clickbait articles.
(Clickbait articles? Hell, yes! This part was created by a human because, despite what the "consensus" might say, AI doesn't have a sense of attempted humor.)
This flood of low-quality content can make it difficult for consumers to find trustworthy information and can undermine the credibility of legitimate content creators.
(Human here, again. Difficult to find trustworthy information? Yes, because it is just re-gurgitating the internet!)
The article also highlights the potential for AI-generated content to be used in more nefarious ways, such as the creation of deepfakes or the manipulation of social media algorithms to spread disinformation.
The author argues that addressing the problem of AI-generated content will require a multi-faceted approach that involves both technical solutions and broader societal changes. For example, platforms could implement more robust content moderation and verification processes, while consumers could become more discerning in their online consumption habits and more willing to pay for high-quality content.
Overall, the article underscores the need for continued scrutiny of the impact of AI on society and for thoughtful approaches to managing its potential downsides.

View File

@ -0,0 +1,15 @@
---
title: No Google for Dutch Schools
date: 2021-10-21
featureImage: images/blog/google.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Dutch Personal Data Authority raised concerns about Google's GDPR compliance
Google donesn't carry. They'll just pay the fines.
https://tutanota.com/blog/posts/dutch-schools-must-stop-using-google-email-and-cloud-services/
And they believe we "need" them.

View File

@ -0,0 +1,15 @@
---
title: Email Doesn't Suck. It's Email Clients
date: 2022-08-24
featureImage: images/blog/doesntusegmail.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Email clients need improving. Some thoughts.
A shift to web-base email has meant a degradation in the quality of "fat" email clients.
https://www.wired.com/story/email-clients-are-bad-so-use-vivaldi-mail/
The author uses Mutt and Vivaldi mail. We suggest contributing time/talent/treasure to Thunderbird mail. Mutt is great, too.

View File

@ -0,0 +1,15 @@
---
title: E-Mail Done My Way
date: 2022-08-05
featureImage: images/blog/doesntusegmail.jpg
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## The journey to getting email self-hosting done right
One man's (he's the Redhat evangelist for EMEA) way of running self-hosted email.
https://jan.wildeboer.net/2022/08/Email-0-The-Journey-2022/
As you'll see, email is a protocol, and an attitude.

View File

@ -0,0 +1,15 @@
---
title: Embracing the Kill Switch
date: 2022-08-28
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Governments Embrace Internet Shutdowns as a Form of Control
Well, one way to deal with it, if you can't control it, is to kill it.
https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control
This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build *free* networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication. Not to mention getting off the government-approved network nore and more to build human networks of self-sovreignty.

View File

@ -0,0 +1,15 @@
---
title: Employers Are Doing 'Shocking Things' to Monitor Your Productivity
date: 2022-08-26
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Treating employees like robots is the 'new normal'
If I can track your every movement while you "work for me", that sounds more like slavery, than an exchange of goods.
https://nypost.com/2022/08/26/its-everywhere-workplace-surveillance-methods-now-common/
Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don't work for these sorts of assholes. And if you must, figure out how you are going to escape.

View File

@ -0,0 +1,15 @@
---
title: Everything About Passphrases
date: 2022-11-25
featureImage: images/blog/privatekeys.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Some best practice for passphrases, private keys, and saving them all in a digital wallet
Not your keys, not your _______________. But how do we protect our keys, our passphrases? What are some best practices to consider?
https://blog.coinkite.com/everything-you-need-to-know-about-passphrases/
If you're not incorporating many of these practices into your digital self-sovereign life, then how self-sovereign can you really be?

View File

@ -0,0 +1,13 @@
---
title: FBI Watching Internet
date: 2023-04-25
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Is the FBI abusing access to FISA databases of private communications?
The FBI can read out private communications without a warrant or judicial oversight.
https://www.eff.org/deeplinks/2023/04/internal-documents-show-how-little-fbi-did-correct-misuse-section-702-databases

View File

@ -1,6 +1,6 @@
---
title: "Federated Founders and Our Joyent History"
date: 2020-09-06T20:18:07+06:00
date: 2023-05-26T20:18:07+06:00
featureImage: images/blog/joyent.jpg
author: David Young
authorThumb: images/author/david.png
@ -31,4 +31,4 @@ Here's our "manifesto".
3. Open source allows us to offer high-value for a sane price. The price always needs to promote maximum adoption.
4. Every Customer or Team will, in time, become their own financial institution as the centralization of money continues to break down. Bitcoin is the key to that solution and we will deeply and fully integrate bitcoin, and the side networks helping with bitcoin adoption, into every facet of our take of Customer solutions.
5. Connect our digital self-sovereign efforts with a broaded cultural urge towards self-sovereignty. No global reset, instead a sovereign reset.
6. Stop being a bitch. Let's get this done.
6. Stop being a bitch. Let's get this done.

View File

@ -0,0 +1,15 @@
---
title: The Fediverse is Inefficient, That's OK
date: 2021-10-21
featureImage: images/blog/decentralize.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Decentralization comes with some slow downs that avoid the dystopian pile up
Why having everything move/improve at the speed of whim may not be the best idea.
https://berk.es/2022/11/08/fediverse-inefficiencies/
The example provided is Mastodon.

View File

@ -0,0 +1,13 @@
---
title: FedNow Payment System Launching
date: 2023-03-15
featureImage: images/blog/federated.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Federal Reserve Payments System Moves to the Launchpad
Why does the federal government, or any government, need a "payment system" unless the currency itself is property of same?
https://www.cnbc.com/2023/03/15/long-awaited-fed-digital-payment-system-to-launch-in-july.html

View File

@ -0,0 +1,15 @@
---
title: Fighting Spam
date: 2022-09-18
featureImage: images/blog/spam.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Some practical tips for fighting spam
Spam is everywhere. Here are some thoughts about how to fight it.
https://darthcoin.substack.com/p/avoid-being-spammed
You'll want to use an email client like Thunderbird or Mutt to follow the "no images" rule.

View File

@ -0,0 +1,21 @@
---
title: Your Financial Information Sent to Facebook
date: 2021-03-11
featureImage: images/blog/facebook.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Tax Filing Services Sending Financial Information to Facebook
As if Facebook didn't know enough about us already...
https://www.zerohedge.com/technology/appalling-major-tax-filing-services-have-been-sending-financial-information-facebook
According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
The article states that tax filing services such as TurboTax, H&R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests. This data is then used to target users with personalized advertising on Facebook and other platforms.
The report raises concerns about the potential security and privacy implications of this practice, as sensitive financial information could be vulnerable to hacking or misuse by third parties. It also highlights the need for users to be aware of the data collection practices of the websites and apps they use, and to take steps to protect their personal information, such as using strong passwords and enabling two-factor authentication.
The article notes that TurboTax, H&R Block, and TaxAct have all stated that they do not sell users' personal information, and that they take measures to protect users' data. However, the use of tracking tools on their websites has raised questions about their commitment to user privacy and security.

View File

@ -0,0 +1,15 @@
---
title: France Says "Non" to Office 365 and Google Workplace
date: 2022-11-22
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Office 365 and Workplace Shouldn't be used in classrooms
While the free versions of Office 365 and Workplace may be attractive, they vacuum up so much data on students they constitute a form of theft.
https://www.theregister.com/2022/11/22/france_no_windows_google/
Free services come with the "bargain" that the provider gets all your information. What a deal! The French say "no".

View File

@ -0,0 +1,15 @@
---
title: An Allegory
date: 2021-10-21
featureImage: images/blog/doesntusegmail.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## What happens when we are beholden to free services?
Hey, you just wanted to see what the free service could do for you. Despite knowing the dangers. But it is so...
https://twitter.com/PardesSeleh/status/1534251250744705024
Please don't go...!

View File

@ -0,0 +1,15 @@
---
title: Front Matter CMS
date: 2023-03-27
featureImage: images/blog/hugo.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## A CMS that works with Federated Core
Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully...
https://frontmatter.codes/
It runs inside of Visual Studio Code among other tools allowing you to preview and create great content using Federated Core.

View File

@ -0,0 +1,15 @@
---
title: Get Off Gmail
date: 2022-09-28
featureImage: images/blog/doesntusegmail.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Get off the big tech email providers
Here's a quick mental exercise: if you can't imagine life without Google, Facebook, Apple or the other big centralized services, then you're digital freedom is toast.
https://www.lifesitenews.com/blogs/the-simple-reason-why-you-should-stop-using-gmail/
Don't make convenience the master of your freedom.

View File

@ -0,0 +1,15 @@
---
title: Gmail Encrypted
date: 2022-12-17
featureImage: images/blog/doesntusegmail.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## End-to-end encryption for Gmail on the web
Metadata still not encrypted.
https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/
Band-aid on a gaping chest wound. Zzzzz.

View File

@ -0,0 +1,15 @@
---
title: Gmail is Breaking Email
date: 2023-03-30
featureImage: images/blog/doesntusegmail.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## You can't send email to anyone on/from Gmail
The *Centralizer* makes the rules for email, not the protocol.
http://www.igregious.com/2023/03/gmail-is-breaking-email.html
What can be done? Stop communicating to our fiat friends using Gmail?

View File

@ -0,0 +1,15 @@
---
title: Googerteller
date: 2022-08-21
featureImage: images/blog/google.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Make music when Google spies on you
This little utility provides auditory feedback whenever your browsing/internet activities feed back into the Google.
https://github.com/berthubert/googerteller
This [demo](https://twitter.com/bert_hu_bert/status/1561466204602220544) is pretty hilarious/scary.

View File

@ -0,0 +1,13 @@
---
title: Are Google 2FA Secrets Unencrypted?
date: 2023-04-25
featureImage: images/blog/google.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Looking at how 2FA secrets are synched
The synching appears to happen without any encryption. Google sees the secrets. If there is a breach...
[Defcon Social @mysk](https://defcon.social/@mysk/110262313275622023)

View File

@ -0,0 +1,15 @@
---
title: Sneaky Move, Google
date: 2022-11-23
featureImage: images/blog/google.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Allowing a change to maps permissions, opens up your world to Google
Maps was and is a ground-breaking service offering from Google.
https://garrit.xyz/posts/2022-11-24-smart-move-google
Now they're bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don't use Google. :kissing_closed_eyes:

View File

@ -0,0 +1,13 @@
---
title: Google Drive File Limits
date: 2023-03-05
featureImage: images/blog/google.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## You can't really use Google Drive any way you want
Oh, nevermind. Google reversed themselves after the backlash. The idea was to put a hard limit on the number of files allowed on the service.
https://arstechnica.com/gadgets/2023/03/google-drive-does-a-surprise-rollout-of-file-limits-locking-out-some-users/

View File

@ -0,0 +1,15 @@
---
title: Google Has My Email
date: 2014-05-11
featureImage: images/blog/doesntusegmail.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Dealing with the problem that is Gmail
Even if you run your own email server (or use a service like Federated Core), you will likely be interacting with those using Gmail.
https://mako.cc/copyrighteous/google-has-most-of-my-email-because-it-has-all-of-yours
It won't happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a "free" as in "freedom" service.

View File

@ -0,0 +1,15 @@
---
title: GrapheneOS
date: 2021-10-21
featureImage: images/blog/grapheneos.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## One of the main alternative Andoid distributions
You can use a mobile device with lots less tracking than on offer from Google and Apple.
https://grapheneos.org/
Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?

View File

@ -0,0 +1,15 @@
---
title: Been Pwned?
date: 2021-10-03
featureImage: images/blog/pwned.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## One of the delights of using centralized services...
It's really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
https://haveibeenpwned.com/
Check your status here.

View File

@ -0,0 +1,15 @@
---
title: How Lightning Address Works
date: 2022-09-02
featureImage: images/blog/lightning.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Lightning invoice basics
A nice, brief explainer on how lightning addresses work.
https://stacker.news/items/65872
Lightning is the off-chain bitcoin, etc payments clearing technology.

View File

@ -0,0 +1,15 @@
---
title: How to be a Profitable Lightning Node
date: 2022-09-04
featureImage: images/blog/lightning.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Some tips for how to run a Lightning Node profitably...
We think Lightning, in time, will be more for information distribution, and less about Bitcoin payments settlement.
https://stacker.news/items/66368
In the meantime, as you begin your Lightning journey...

View File

@ -0,0 +1,13 @@
---
title: Delete Yourself From The Internet
date: 2023-02-10
featureImage: images/blog/privacy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Some advice for deleting your data trail from the internet
The get us when we create data, and when we want to delete it...
https://www.cnbc.com/2023/02/10/how-to-delete-yourself-from-the-internet.html

View File

@ -0,0 +1,14 @@
---
title: How to Stack Sats
date: 2021-10-21
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Anyone Can Earn Bitcoin
Some great, creative ideas for how to earn and stack satoshis.
https://www.stacksats.how/

View File

@ -0,0 +1,15 @@
---
title: Stop Google Collecting Your Data
date: 2022-09-29
featureImage: images/blog/google.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Here are the steps you need to take now
And overview of how Google collects data and censors...
https://www.lifesitenews.com/opinion/heres-how-to-stop-google-from-collecting-huge-amounts-of-your-data/
While this is a *great* resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don't lead to true digital self-sovereignty.

View File

@ -0,0 +1,15 @@
---
title: Huge Scale of US Gov Cell Location Data
date: 2022-07-22
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## New documents reveal the US government is tracking cell phone location
The ACLU unearthed documents showing the US Department of Homeland Security is using mobile location data to track people's movements.
https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/
The tracking is taking place on a much larger scale that previously known.

View File

@ -0,0 +1,21 @@
---
title: iCloud for Windows Downloads Other People's Photos?
date: 2021-09-14
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## A Report of Strange Behavior by iCloud for Windows
The perils of using centralized storage solutions from a company not known for building great services.
https://forums.macrumors.com/threads/icloud-for-windows-corrupting-videos-downloading-other-peoples-photos.2370666/
According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people's photos.
The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices. Some users have also reported that their files and folders have been deleted from iCloud without their knowledge or consent.
The issue appears to be affecting a small number of users, and there is no clear consensus on the cause of the problem. Some users have speculated that it may be related to a recent update to iCloud for Windows, while others suggest that it may be related to conflicts with other software or hardware on their devices.
Apple has not yet issued a statement regarding the issue, but some users have reported success in resolving the problem by uninstalling and reinstalling iCloud for Windows or by resetting their iCloud account. However, the reports highlight the potential risks of relying on cloud-based services for storing and sharing important files and data, and the need for users to regularly back up their data and be aware of potential security and privacy issues.

View File

@ -0,0 +1,17 @@
---
title: Lastpass Breach Impact on Bitcoin Wallets
date: 2021-10-21
featureImage: images/blog/breaches.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## This person lost sats because of the Lastpass breach
Can anyone spot how the magical hacker got in?
https://twitter.com/Cryptopathic/status/1606416137771782151?s=20&t=glD3V7sn8VCOrCeheaWf8w
A hint: "Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted."
That's right, Lastpass may not have keep the data encrypted or sufficiently encrypted.

View File

@ -0,0 +1,15 @@
---
title: Indian ISPs Give Government Full Access
date: 2022-11-10
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## They know when you've been naughty, they know when you're awake...
Well, at least, I suppose, they're being honest about it.
https://entrackr.com/2022/11/exclusive-indian-isps-we-already-give-govt-full-access-to-web-traffic/
Or, more likely, just brazen. "What are you going to do about it?"

15
content/blog/invisv.md Normal file
View File

@ -0,0 +1,15 @@
---
title: Invisv
date: 2022-10-21
featureImage: images/blog/privacy.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Let's reinvent the wheel
Congrats to Invisv for understanding the problem.
https://invisv.com/
We have questions, however. Is Invisv centralized? Are all these privacy break-throughs inter-operable with any other open standards, protocols?

View File

@ -0,0 +1,15 @@
---
title: iOS 16 Leaks Connections
date: 2022-10-11
featureImage: images/blog/timcook.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## But Apple is Muh Secure!
Researches discovered iOS 16 communicates with Apple services outide an active VPN tunnel. Huh?
https://twitter.com/mysk_co/status/1579997801047822336
They used ProtonVPN and Wireshark for the testing. What's the solution? Different mobile OS.

View File

@ -0,0 +1,15 @@
---
title: iPhone = Privacy?
date: 2022-09-08
featureImage: images/blog/apple.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Does using an iPhone mean you have the best privacy solution?
Most believe the iPhone is a bastion of privacy. Tim Cook said so...
https://kerkour.com/iphone-privacy
Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.

View File

@ -0,0 +1,23 @@
---
title: Is iPhone Usage Data Anonymous?
date: 2021-11-23
featureImage: images/blog/timcook.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
# Your iPhone's Analytics Data Includes an ID Number
How anonymous is iPhone usage data after all?
https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619
According to the article published by Gizmodo, Apple's iPhone was found to be collecting data on users' personal browsing habits through a feature called "DSID Analytics," which is enabled by default on all devices running iOS 15.
The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple's servers for analysis. This data is reportedly used to improve the performance of Apple's products and services, such as Siri and the App Store.
However, the article raises concerns about the potential privacy implications of this feature, as it collects personal information without users' explicit consent and without providing a clear way to opt-out. The report also notes that the data collected by DSID Analytics could be used to build detailed profiles of users' behavior and interests, which could be exploited by third parties for targeted advertising or other purposes.
Apple has responded to the report, stating that the data collected by DSID Analytics is anonymous and aggregated, and that users can choose to disable the feature by going to Settings > Privacy > Analytics & Improvements > Share With App Developers and turning off the toggle.
However, the report highlights the ongoing tension between tech companies' desire to collect data for product improvement and innovation, and users' rights to privacy and control over their personal information.

View File

@ -0,0 +1,15 @@
---
title: Katzenpost
date: 2022-10-21
featureImage: images/blog/federated.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## A service to resist on-line surveillance
From the post, why end-to-end encryption is not enough: "End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation."
https://nlnet.nl/project/katzenpost/
You have to think about the metadata in the same way we think about how services like Facebook develop "graphs" of us for the purposes of advertising and scores.

View File

@ -0,0 +1,15 @@
---
title: KYC Not Me
date: 2023-03-21
featureImage: images/blog/nokyc.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## KYC Scores
KYC stands for "know your customer" which is another way of saying "surveillance" by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
https://kycnot.me/
There are also listings for VPNs, domains and hosting, phone numbers, and other various services and tools.

View File

@ -0,0 +1,15 @@
---
title: Lastpass Breach Gets Worse
date: 2023-02-04
featureImage: images/blog/breaches.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## The Lastpass breach just gets worse and worse
A wonderful post-mortem of the recent Lastpass data breach.
https://old.reddit.com/r/sysadmin/comments/10kp4ye/lastpass_breach_gets_worse/
Solution? Get off centralized password managers. Not your keys, not your passwords.

View File

@ -0,0 +1,15 @@
---
title: Most Popular Password Manager Hacked
date: 2021-10-21
featureImage: images/blog/breaches.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Lastpass Hacked, Again
Lastpass is the world's most popular password manager...with hackers, too.
https://www.bloomberg.com/news/articles/2022-08-25/the-world-s-most-popular-password-manager-says-it-was-hacked
Solution, host your own password manager. It is possible. Unless you like giving the hackers your passwords...

View File

@ -0,0 +1,15 @@
---
title: LastPass Security Incident
date: 2022-12-22
featureImage: images/blog/breaches.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## LastPass Gets Hacked
LastPass, where so many store their sensitive passwords, has a security incident.
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
An "unauthorized party" got access to the third-party storage where LastPass stores backups. When you're dealing with cloud services, there is tremendous "counterparty" risk, as they would say in the *fiat* financial markets. If you're using a cloud service, that service can swear all day that they are secure...but security is a combination of all the links, including the weak ones.

View File

@ -0,0 +1,13 @@
---
title: Learn Bitcoin Interactively
date: 2021-10-21
featureImage: images/blog/bitcoin.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## A tutorial to learn the technical side of bitcoin
This neat interactive tutorial teaches you the technical overview of bitcoin.
https://trybitcoin.satsie.dev/

View File

@ -0,0 +1,15 @@
---
title: Let's Build to Steal Everything
date: 2023-02-23
featureImage: images/blog/surveillance.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Building a Chrome extension to steal everything
The wonders of Chrome extensions on all the data they can pilfer...
https://mattfrisbie.substack.com/p/spy-chrome-extension
...would this be possible on the "safe" browsers like Brave and Vivaldi? Firefox?

View File

@ -0,0 +1,15 @@
---
title: Lightning Wallet Comparison
date: 2022-02-27
featureImage: images/blog/lightning.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## A look at all the options for Lightning wallets
Inevitably this blog post will get more and more out-of-date as time passes...
https://darthcoin.substack.com/p/lightning-wallets-comparison
But it provides a nice overview of the different approaches to wallets for holding Bitcoin on the LIghtning network.

15
content/blog/lineageos.md Normal file
View File

@ -0,0 +1,15 @@
---
title: LineageOS
date: 2021-10-21
featureImage: images/blog/lineageos.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## One of the main alternative Andoid distributions
You can use a mobile device with lots less tracking than on offer from Google and Apple.
https://lineageos.org/
Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?

View File

@ -0,0 +1,15 @@
---
title: Future of Advertising and Information Services
date: 2021-10-21
featureImage: images/blog/advertising.png
author: Cincinnatus
authorThumb: /images/author/cincinnatus.jpg
---
## Marshall McLuhan lays it out in 1966
A wonderful look into the future, from the past.
https://paleofuture.com/blog/2023/1/11/marshall-mcluhan-on-the-future-of-ads-and-the-internet
One of the insights here is the idea that we *enjoy* being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.

Some files were not shown because too many files have changed in this diff Show More