6-24-23-1a
This commit is contained in:
parent
183d9bb75d
commit
3b23c02c74
@ -50,16 +50,10 @@ theme = "apsho"
|
|||||||
weight = 1
|
weight = 1
|
||||||
[[menu.main]]
|
[[menu.main]]
|
||||||
identifier = "blog"
|
identifier = "blog"
|
||||||
name = "Federated Blog"
|
name = "Sovereign Reset"
|
||||||
url = "/blog"
|
url = "/blog"
|
||||||
parent = "community"
|
parent = "community"
|
||||||
weight = 2
|
weight = 2
|
||||||
[[menu.main]]
|
|
||||||
identifier = "sovereignreset"
|
|
||||||
name = "Sovereign Reset"
|
|
||||||
url = "/sovereignreset"
|
|
||||||
parent = "community"
|
|
||||||
weight = 3
|
|
||||||
[[menu.main]]
|
[[menu.main]]
|
||||||
identifier = "projectswelove"
|
identifier = "projectswelove"
|
||||||
name = "Projects We Love"
|
name = "Projects We Love"
|
||||||
|
15
content/blog/2022-year-of-desktop-linux.md
Normal file
15
content/blog/2022-year-of-desktop-linux.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: 2022 Year of Desktop Linux
|
||||||
|
date: 2022-12-20
|
||||||
|
featureImage: images/blog/linux.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Thanks to some Stack Overflow surveys, desktop Linux has arrived for developers
|
||||||
|
|
||||||
|
According to a developer survey, Linux holds a 9% lead over macOS.
|
||||||
|
|
||||||
|
[Year of the Linux Desktop](https://justingarrison.com/blog/year-of-linux-desktop/)
|
||||||
|
|
||||||
|
It's getting better and better meaning there is less and less an excuse to support the *centralizer* operating systems.
|
27
content/blog/21-rules-of-bitcoin-maxi.md
Normal file
27
content/blog/21-rules-of-bitcoin-maxi.md
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
title: 21 Rules of Bitcoin Maxi
|
||||||
|
date: 2022-11-23
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## What can self-sovereign individuals learn from Bitcoin maxis?
|
||||||
|
|
||||||
|
We love Bitcoin maxis because they give the self-sovereign individual
|
||||||
|
|
||||||
|
[21 Rules of a Bitcoin Maxi](https://darthcoin.substack.com/p/21-rules-of-a-bitcoin-maxi)
|
||||||
|
|
||||||
|
Let's see how these some of these rules can be applied to the self-sovereign individual even if, horror, they have no interest in Bitcoin.
|
||||||
|
|
||||||
|
1. Not your keys. This is the principal of decentralization. We don't use centralized services where are data is not our own.
|
||||||
|
2. Stack sats. For the self-sovereign, this means moving data from fiat services to decentralized and continuing to use and accumulate data on decentralized services.
|
||||||
|
4. No one needs to know how much bitcoin you have. Likewise, why advertise how you're accomplishing your digital freedom using decentralized tools?
|
||||||
|
5. Run your own node. In the end, if you don't run it, our have "joint" custody so that you can take it over, it's not your data.
|
||||||
|
6. Don't do shitcoining. When you interact with friends deep in the Google, Apple, Facebook, etc ecosystems, you're kissing up to shitcoiners. Maybe you need new friends?
|
||||||
|
7. Back up your wallet seed words. There are great ways to preserve your sovreignty through backups.
|
||||||
|
13. Bitcoin changes you. When you commit to the self-sovereign lifestyle, you change from "can I do this, please, sir?" to "I did this." It is life-changing.
|
||||||
|
14. Bitcoin teaches you to be a champion of truth. Here "truth" means living authentically under the principle that only you can be responsible for yourself and those you love. The "state" or the "corporation" do not have your "truth" in mind.
|
||||||
|
18. Always fight FUD. Most will say this lifestyle is not possible.
|
||||||
|
|
||||||
|
Together we can change our world.
|
15
content/blog/NSA-collects-data.md
Normal file
15
content/blog/NSA-collects-data.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Proof the NSA Spies on Americans
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/amerciansurveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Even when it is against the law. Who cars? Do you?
|
||||||
|
|
||||||
|
Does anyone care when the NSA breaks US law to spy on Americans in the United States? No, not really. Nothing is done about it. This is fiat surveillance at its finest. High handed. Passed off as "protecting" Americans.
|
||||||
|
|
||||||
|
https://threadreaderapp.com/thread/1587446686393122816.html
|
||||||
|
|
||||||
|
What can be done about it? First, make it much harder by decentralizing everything.
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: "Federated Computer Blog"
|
title: "Sovereign Reset: the Federated Blog"
|
||||||
date: 2023-05-30
|
date: 2023-05-30
|
||||||
description: "Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. For broader topics of health, money, relationships, technology, surveillance, see our sister blog at Sovereign Reset: https://www.sovereignreset.com."
|
description: "Articles and talk about Federated products, products we love, and our wider industry and how to live digital sovereignty with Federated. We also include broader topics of health, money, relationships, technology, and surveillance."
|
||||||
---
|
---
|
||||||
|
15
content/blog/acquire-non-kyc-bitcoin.md
Normal file
15
content/blog/acquire-non-kyc-bitcoin.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: No KYC Bitcoin
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## 15 methods for acquiring non-kyc bitcoin
|
||||||
|
|
||||||
|
If you want to acquire bitcoin without an intermediary tracking your identity, here are fifteen options...
|
||||||
|
|
||||||
|
https://sovrnbitcoiner.com/15-methods-to-aquire-non-kyc-bitcoin/
|
||||||
|
|
||||||
|
What have we to hide? Everything! :blush:
|
15
content/blog/all-eyes-are-on-us.md
Normal file
15
content/blog/all-eyes-are-on-us.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: All Eyes Are On Us.
|
||||||
|
date: 2022-11-22
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## 5 Eyes, 9 Eyes, 14 Eyes: Protect Yourself From Global Surveillance
|
||||||
|
|
||||||
|
The fact of our lives today is constant global surveillance. By governments. By corporations.
|
||||||
|
|
||||||
|
https://vpnoverview.com/privacy/anonymous-browsing/5-9-14-eyes/
|
||||||
|
|
||||||
|
You may be shocked to the extent your government spies on you. In a "democracy". For your "safety".
|
15
content/blog/apple-ad-business.md
Normal file
15
content/blog/apple-ad-business.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple's Ad Business Booming
|
||||||
|
date: 2022-10-03
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## How do we square a digital, tracking ad business with privacy?
|
||||||
|
|
||||||
|
It's hard to see how a company running a $5 billion, and growing, digital (ie. tracking) ad business can be real about protecting privacy.
|
||||||
|
|
||||||
|
https://adguard.com/en/blog/apple-tracking-ads-business.html
|
||||||
|
|
||||||
|
Tim Cook famously said: "You are not our product. You are our customer. You are a jewel, and we care about the user experience." (2018) But does this line up with Apple's recent hard charge into the digital advertising business?
|
15
content/blog/apple-advertising-app-store.md
Normal file
15
content/blog/apple-advertising-app-store.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Ads in Apple App Store
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/timcook.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## What happens when the white knight gets down and dirty with the central trackers?
|
||||||
|
|
||||||
|
Apple has been slowly but surely expanding the reach of ads across their platforms for the past several years.
|
||||||
|
|
||||||
|
https://basicappleguy.com/basicappleblog/you-might-also-like
|
||||||
|
|
||||||
|
What to do? Try Linux. There are plenty of great distributions. Oh, the app you want/need isn't there? Spin up a Windows VM on your Linux distro for the times you need to bend over. You can even run macOS in a VM. If we don't like this advertising shit, why are we acting like a bunch of cucks and whining? Be self sovereign.
|
15
content/blog/apple-checking-images-evidence.md
Normal file
15
content/blog/apple-checking-images-evidence.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple Checking Images? Evidence
|
||||||
|
date: 2023-01-15
|
||||||
|
featureImage: images/blog/applecampus.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Is Apple checking images we view in the Finder?
|
||||||
|
|
||||||
|
The evidence for the case that Apple is checking images browsed in the Finder and sending metadata to a remote server.
|
||||||
|
|
||||||
|
https://sneak.berlin/20230115/macos-scans-your-local-files-now/
|
||||||
|
|
||||||
|
We have another post with a rebuttal.
|
15
content/blog/apple-checking-images-rebuttal.md
Normal file
15
content/blog/apple-checking-images-rebuttal.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Is Apple Checking Images? Rebuttal.
|
||||||
|
date: 2023-01-18
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Is Apple checking images we view in the Finder?
|
||||||
|
|
||||||
|
Little Snitch claims browsing an image sends a message from "mediaanalysisd" to an Apple server.
|
||||||
|
|
||||||
|
https://eclecticlight.co/2023/01/18/is-apple-checking-images-we-view-in-the-finder/
|
||||||
|
|
||||||
|
But it doesn't appear this is actually happening. But let's keep investigating.
|
15
content/blog/apple-is-building-demand-side-platform.md
Normal file
15
content/blog/apple-is-building-demand-side-platform.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple Advertising
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/timcook.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## The fruit is building a demand-side platform
|
||||||
|
|
||||||
|
Has there been a successful digtial advertising platform that doesn't track users?
|
||||||
|
|
||||||
|
https://www.insiderintelligence.com/content/apple-will-emerge-advertising-player-watch-2023
|
||||||
|
|
||||||
|
Hey baby, don't worry. This is Apple. :kissing:
|
15
content/blog/apple-refuses-to-cooperate.md
Normal file
15
content/blog/apple-refuses-to-cooperate.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple Refuses to Cooperate
|
||||||
|
date: 2022-09-02
|
||||||
|
featureImage: images/blog/applefans.jpg
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## The US Government Seeks Information About App Store Behaviors
|
||||||
|
|
||||||
|
Apple's behavior with re: its App Store is notorious...
|
||||||
|
|
||||||
|
http://www.fosspatents.com/2022/09/apple-refuses-to-cooperate-with-us.html
|
||||||
|
|
||||||
|
"Apple taxes, tyrannizes, and "sherlocks" app developers. App developers are victims of Apple's conduct, and ACT | The App Association--which is actually just an Apple Association--unethically claims to represent the interests of small developers."
|
15
content/blog/apple-tracking-you-in-app-store.md
Normal file
15
content/blog/apple-tracking-you-in-app-store.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple Tracks You in the App Store
|
||||||
|
date: 2022-11-03
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## As you browse and tap, Apple is watching
|
||||||
|
|
||||||
|
"Ahem, we are building a better customer experience..."
|
||||||
|
|
||||||
|
https://twitter.com/mysk_co/status/1588308341780262912
|
||||||
|
|
||||||
|
...for us, Apple.
|
15
content/blog/apple-tracks-you-in-ios.md
Normal file
15
content/blog/apple-tracks-you-in-ios.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: "Apple Tracks You"
|
||||||
|
date: 2022-11-08
|
||||||
|
featureImage: images/blog/applecampus.jpg
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Even when its own privacy setting say 'no' tracking...
|
||||||
|
|
||||||
|
Independent tests suggests Apple is tracking you on iOS even when you've disabled sharing "Device Analytics" altogether.
|
||||||
|
|
||||||
|
[Apple Tracks You](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558)
|
||||||
|
|
||||||
|
It's Apple. They know best.
|
19
content/blog/apple-turned-off-airdrop.md
Normal file
19
content/blog/apple-turned-off-airdrop.md
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
title: Apple turned off a private communication tool in China just before major protests broke out.
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## What does it mean when a vendor tells you how to use tools on your device?
|
||||||
|
|
||||||
|
https://reclaimthenet.org/apple-air-drop-china
|
||||||
|
|
||||||
|
Apple made a change to how AirDrop works in mainland China restricting the way Apple customer could communicate with each other.
|
||||||
|
|
||||||
|
According to the article published by Reclaim The Net on August 10, 2021, Apple has come under scrutiny for allegedly allowing Chinese users to receive unsolicited content through its AirDrop feature. The report states that Chinese users have been receiving unsolicited pornographic images and spam through AirDrop from strangers who are using anonymous usernames.
|
||||||
|
|
||||||
|
The article further notes that the Chinese government has been cracking down on online pornography and other forms of illegal content, and the use of anonymous usernames has been banned in the country. However, the report suggests that the anonymity feature of AirDrop has allowed users to bypass this regulation and share illegal content.
|
||||||
|
|
||||||
|
Apple has not yet commented on the matter, but the report raises concerns about the company's responsibility to prevent the spread of illegal content and protect its users from unwanted and potentially harmful material. It also highlights the challenges faced by tech companies operating in China, where strict government censorship and regulation often conflict with international standards of free speech and privacy.
|
15
content/blog/apple-tv-ad-product.md
Normal file
15
content/blog/apple-tv-ad-product.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple TV Ad Product
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/timcook.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Quietly pushing an ad product with media agencies
|
||||||
|
|
||||||
|
Where will we go for privacy when Apple abandons us to the verdant fields of advertising revenue?
|
||||||
|
|
||||||
|
https://digiday.com/media/apple-is-quietly-pushing-a-tv-ad-product-with-media-agencies/
|
||||||
|
|
||||||
|
To a self-sovereign, distributed, federated future.
|
15
content/blog/apple-webapps-browsers.md
Normal file
15
content/blog/apple-webapps-browsers.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Apple Looking Like 1990s Microsoft
|
||||||
|
date: 2022-01-24
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Does it come down to the $20 billion in cash paid annually by Google?
|
||||||
|
|
||||||
|
Apple really doesn't want competition on iOS for web browsers...
|
||||||
|
|
||||||
|
https://twitter.com/openwebadvocacy/status/1617802614149894144
|
||||||
|
|
||||||
|
Even Google allows competition on Android! Think of all the tracking offered up by iOS users to Google...
|
15
content/blog/automatic-csam-scanning-eu.md
Normal file
15
content/blog/automatic-csam-scanning-eu.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: CSAM Scanning in the EU
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/europeanunion.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Using the pretext of child protection to introduce mass surveillance
|
||||||
|
|
||||||
|
This is still just a proposal.
|
||||||
|
|
||||||
|
https://tutanota.com/blog/posts/eu-surveillance-csam/
|
||||||
|
|
||||||
|
But the proposal would basically lead to all messages being read all the time. Get off the centralized services. Make it difficult.
|
15
content/blog/awesome-oss-alternatives.md
Normal file
15
content/blog/awesome-oss-alternatives.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Awesome FOSS Alternatives
|
||||||
|
date: 2022-07-15
|
||||||
|
featureImage: images/blog/selfhosted.gif
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## FOSS solutions to try
|
||||||
|
|
||||||
|
Here's another compiled list of FOSS solutions to investigate rather than giving money to *centralizer* man.
|
||||||
|
|
||||||
|
https://github.com/RunaCapital/awesome-oss-alternatives
|
||||||
|
|
||||||
|
Which ones look promising to you?
|
15
content/blog/awesome-privacy.md
Normal file
15
content/blog/awesome-privacy.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Awesome Privacy
|
||||||
|
date: 2022-07-21
|
||||||
|
featureImage: images/blog/privacy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## A list of privacy and security-focused apps, software, and providers
|
||||||
|
|
||||||
|
From the list: "Large data-hungry corporations dominate the digital world but with little, or no respect for your privacy. Migrating to open-source applications with a strong emphasis on security will help stop corporations, governments, and hackers from logging, storing or selling your personal data."
|
||||||
|
|
||||||
|
https://github.com/Lissy93/awesome-privacy
|
||||||
|
|
||||||
|
It would be even better if this was *not* hosted on Github. C'est la vie!
|
15
content/blog/awesome-self-hosted.md
Normal file
15
content/blog/awesome-self-hosted.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Awesome Self-hosted
|
||||||
|
date: 2022-01-21
|
||||||
|
featureImage: images/blog/selfhosted.gif
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Github listing of self-hosted software
|
||||||
|
|
||||||
|
This is a pretty comprehensive list of software you can self-host across a very wide variety of categories.
|
||||||
|
|
||||||
|
https://github.com/awesome-selfhosted/awesome-selfhosted/blob/master/README.md
|
||||||
|
|
||||||
|
While we think Federated is a pretty good curation of the "best" software for self-hosting out there, this list reminds us there is so, so much more.
|
15
content/blog/basecamp-is-leaving-the-cloud.md
Normal file
15
content/blog/basecamp-is-leaving-the-cloud.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Basecamp is Leaving the Cloud
|
||||||
|
date: 2022-10-19
|
||||||
|
featureImage: images/blog/selfhosted.gif
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## An explanation
|
||||||
|
|
||||||
|
Basecamp's David Heinemeier Hansson explains the departure from the cloud.
|
||||||
|
|
||||||
|
https://world.hey.com/dhh/why-we-re-leaving-the-cloud-654b47e0
|
||||||
|
|
||||||
|
We don't agree with all the conclusions. Nevertheless, bon voyage! (Oh, side note, notice he mentions "analyze and store" with re: the Hey email service. Centralizer.)
|
15
content/blog/big-batch-of-breaches.md
Normal file
15
content/blog/big-batch-of-breaches.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Breaches for Everyone!
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/breaches.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Looks like lots of centralized services relied on another central service...
|
||||||
|
|
||||||
|
...and now the whole mass of them are breached.
|
||||||
|
|
||||||
|
https://twitter.com/tayvano_/status/1611131230074073088?s=20&t=NR4Z4aJlKaNg_rHuQVYn7A
|
||||||
|
|
||||||
|
CircleCI is the central culprit. We, the users of these centralized system have no clue whats going on in the entirely opaque background. No clue.
|
15
content/blog/bill-to-ban-tiktok-patriot-act-2.md
Normal file
15
content/blog/bill-to-ban-tiktok-patriot-act-2.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: TikTok Ban is Patriot Act 2.0
|
||||||
|
date: 2023-03-28
|
||||||
|
featureImage: images/blog/americansurveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Get informed.
|
||||||
|
|
||||||
|
This is a global surveillance gambit.
|
||||||
|
|
||||||
|
https://www.youtube.com/watch?v=FWQGA_n5Z4M
|
||||||
|
|
||||||
|
It has very little to do with "China".
|
15
content/blog/bill-to-ban-tiktok.md
Normal file
15
content/blog/bill-to-ban-tiktok.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Bill to Ban TikTok Terrifying
|
||||||
|
date: 2023-03-28
|
||||||
|
featureImage: images/blog/tiktok.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## It's really about global surveillance
|
||||||
|
|
||||||
|
There's nothing to like about this bill.
|
||||||
|
|
||||||
|
https://twitter.com/greg_price11/status/1640722365809147905
|
||||||
|
|
||||||
|
BTW: Twitter, Facebook, Instagram, Google suck away your metadata and give it to a government, too.
|
15
content/blog/bisq.md
Normal file
15
content/blog/bisq.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Bisq
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/nokyc.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## As in biscuit? Or just no-KYC bitcoin?
|
||||||
|
|
||||||
|
One of the best ways to buy bitcoin with no KYC.
|
||||||
|
|
||||||
|
https://bisq.network/
|
||||||
|
|
||||||
|
You'll also feel like a trader walking through a market in the town square. You get to set the deal.
|
15
content/blog/bitcoin-plugin-wordpress.md
Normal file
15
content/blog/bitcoin-plugin-wordpress.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Bitcoin Lightning Publisher for WordPress
|
||||||
|
date: 2022-11-21
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Review of a plugin for WordPress allowing receipt of Bitcoin payments
|
||||||
|
|
||||||
|
A description of a plugin for Wordpress enabling Bitcoin payments using the Lightning network.
|
||||||
|
|
||||||
|
https://wordpress.org/plugins/bitcoin-lightning-publisher/
|
||||||
|
|
||||||
|
Able to use a number of different Lightning backends.
|
13
content/blog/bitcoin-seed-phrase-backup-devices.md
Normal file
13
content/blog/bitcoin-seed-phrase-backup-devices.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Bitcoin Seed Backup Device Design
|
||||||
|
date: 2022-08-13
|
||||||
|
featureImage: images/blog/privatekeys.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Lessons learned stress testing dozens of seed phrase backup devices
|
||||||
|
|
||||||
|
The seed phrase is like the password opening up the value of a Bitcoin address. If you lose it, you lose the Bitcoin. So, it is imperative, when using self-custodied Bitcoin address, that you have 100% reliable access to your seed phrase.
|
||||||
|
|
||||||
|
https://blog.lopp.net/a-treatise-on-bitcoin-seed-backup-device-design/
|
15
content/blog/breaking-google-maps-monopoly.md
Normal file
15
content/blog/breaking-google-maps-monopoly.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Google Maps Monopoly
|
||||||
|
date: 2022-12-16
|
||||||
|
featureImage: images/blog/googlemaps.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Linux, Amazon, Meta, and Microsoft want to break the Google Maps monopoly
|
||||||
|
|
||||||
|
There's some bad *centralizers* in this alliance. And Google Maps is a really nice product! But we need it broken up.
|
||||||
|
|
||||||
|
https://arstechnica.com/gadgets/2022/12/linux-amazon-meta-and-microsoft-want-to-break-the-google-maps-monopoly/
|
||||||
|
|
||||||
|
P.S. There is no "Linux" in the way they use the term. :blush:
|
15
content/blog/btcmap-org.md
Normal file
15
content/blog/btcmap-org.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: BTCMap.org
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Where to spend your bitcoin
|
||||||
|
|
||||||
|
This is the chicken-and-egg challenge for bitcoin. Money for spending (versus money for store of value).
|
||||||
|
|
||||||
|
https://btcmap.org/map
|
||||||
|
|
||||||
|
The solution is to continue to build communities of common-interest that can build small economies where bitcoin is taken back and forth. Maybe the solution is we *all* need to be willing and able to take bitcoin?
|
13
content/blog/build-a-gun.md
Normal file
13
content/blog/build-a-gun.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Build a Gun
|
||||||
|
date: 2022-05-24
|
||||||
|
featureImage: images/blog/selfsovereign.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Build a 22 rifle to keep the varmits at bay...
|
||||||
|
|
||||||
|
Sure, you can buy a rifle, but why not learn about how things work by assembling the parts and building a custom rifle for pest control?
|
||||||
|
|
||||||
|
https://www.youtube.com/watch?v=7D5twkg8HE0&t=304
|
15
content/blog/build-your-own-seedsigner.md
Normal file
15
content/blog/build-your-own-seedsigner.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Build Your Own Seedsigner
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/privatekeys.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## You need a seed signer to keep your Bitcoin safe
|
||||||
|
|
||||||
|
With this technique, no one will know your seed phrase except the people you tell.
|
||||||
|
|
||||||
|
https://seedsigner.com/
|
||||||
|
|
||||||
|
No trust.
|
15
content/blog/building-a-self-sovereign-lifestyle.md
Normal file
15
content/blog/building-a-self-sovereign-lifestyle.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Building a Self-sovereign Lifestyle
|
||||||
|
date: 2022-11-07
|
||||||
|
featureImage: images/blog/selfsovereign.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## The permaculture mentality homsteaders have is congruent with Bitcoin low-time-preference mentality
|
||||||
|
|
||||||
|
What is true, even if you're not going to homestead, is you need to adopt a homesteading mentality...
|
||||||
|
|
||||||
|
https://bitcoinmagazine.com/culture/building-homesteader-lifestyle-with-bitcoin
|
||||||
|
|
||||||
|
The mentality of a homesteader is one that examines all areas of life to figure out how one can move from centralization to decentralization.
|
15
content/blog/building-arm64-server-hard-way.md
Normal file
15
content/blog/building-arm64-server-hard-way.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Building an ARM64 Home Server
|
||||||
|
date: 2023-02-19
|
||||||
|
featureImage: images/blog/arm64.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## This is the hard way
|
||||||
|
|
||||||
|
Honestly, we don't recommend this for anyone. But it does give a sense of the power and flexibility available to those wanting to self-host at home. My own self-hosted home server is similar.
|
||||||
|
|
||||||
|
https://jforberg.se/blog/posts/2023-02-19-rockpro64/rockpro64.html
|
||||||
|
|
||||||
|
By the way, there are so many great servers for sale on eBay with 16G ram, Xeon processors, etc. that work very well as a home server without the fragility and for roughly the same initial price.
|
15
content/blog/central-bank-digital-currency-video.md
Normal file
15
content/blog/central-bank-digital-currency-video.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Central Bank Digital Currency Amouse Bouche
|
||||||
|
date: 2023-03-01
|
||||||
|
featureImage: images/blog/cbdc.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Fat Man Tells Truth
|
||||||
|
|
||||||
|
Hey! Let's digitize all cash to something controlled by the guv'mint so that they can see who is doing what.
|
||||||
|
|
||||||
|
https://twitter.com/ZLOK/status/1639898907529314304?s=20
|
||||||
|
|
||||||
|
A person has to be insane, no, an idiot, to want to get on board with this idea.
|
13
content/blog/checklist-digital-privacy-security.md
Normal file
13
content/blog/checklist-digital-privacy-security.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Checklist for Digital Privacy and Security
|
||||||
|
date: 2022-11-28
|
||||||
|
featureImage: images/blog/privacy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## hWork through them as you get the time...eadline
|
||||||
|
|
||||||
|
Some of the recommendations are *centralizers*...but we like the effort and attention to the subject!
|
||||||
|
|
||||||
|
https://twitter.com/_k3tan/status/1597327334004371462?t=_G4DaTq7_p30VkmonGcgSg&s=19
|
15
content/blog/choose-btc-wallet.md
Normal file
15
content/blog/choose-btc-wallet.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Choosing the Right BTC/LN Wallet
|
||||||
|
date: 2022-09-16
|
||||||
|
featureImage: images/blog/lightning.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Some advice for choosing the right Bitcoin and LIghtning Wallet
|
||||||
|
|
||||||
|
Just like a password manager, choosing the right wallet for bitcoin can be stressful.
|
||||||
|
|
||||||
|
https://stacker.news/items/70725
|
||||||
|
|
||||||
|
As they say: "Think like a bank, not just be a bank."
|
13
content/blog/company-risk-assessment.md
Normal file
13
content/blog/company-risk-assessment.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Will Your Service/Product Provider Cancel You?
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/censorship.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## One listing of companies and a risk assessment...
|
||||||
|
|
||||||
|
The company may not like you and show you the door...
|
||||||
|
|
||||||
|
https://1792exchange.com/spotlightreports/
|
17
content/blog/computer-that-i-own.md
Normal file
17
content/blog/computer-that-i-own.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
title: I Want a Computer that I Own
|
||||||
|
date: 2021-02-26
|
||||||
|
featureImage: images/blog/selfsovereign.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Can I Own My Computer?
|
||||||
|
|
||||||
|
These days, is it possible to own your computer and the data that flows through it?
|
||||||
|
|
||||||
|
http://misc-stuff.terraaeon.com/articles/computer-i-own.html
|
||||||
|
|
||||||
|
Self-ownership means "anonymity" and to "communicate securly with anyone on the planet without being observed by a third party". Of course, there are a number of parts to this puzzle. The hardware, the client software and operating system, the server hardware, software and operating system, and then the network and the means of utilizing that network. Each have their own challenges to "ownership" and incumbent third-parties such as Google, Apple, Microsoft, the NSA, five eyes, and all the rest who have built lucrative and oppressive business models on maintaining that observation.
|
||||||
|
|
||||||
|
We stand today naked before our computing overlords. Only when we begin to clothe and cloak bit by bit do we begin to take away control from the peeping Toms, the creeps, the "authorities".
|
15
content/blog/corporate-coalition-wants-digital-id.md
Normal file
15
content/blog/corporate-coalition-wants-digital-id.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Corporate Coalition Wants Government Digital ID
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/digitalid.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## The 'Better Identify Coalition' wants better ways to track you
|
||||||
|
|
||||||
|
It's a real rogue's gallery of corporations pushing for a single way to track us no matter what we do on or off the network.
|
||||||
|
|
||||||
|
https://reclaimthenet.org/corporations-push-for-digital-id
|
||||||
|
|
||||||
|
Shame on you Yubico for being part of this proposal. Why mortgage whatever good will you have to kneel at the feet of your corporate overlords?
|
15
content/blog/create-your-own-bitcoin-giveaway-card.md
Normal file
15
content/blog/create-your-own-bitcoin-giveaway-card.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Give Away Bitcoin on a Hotel Door Key
|
||||||
|
date: 2022-12-28
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Let's just say your traditional bank would frown on such behavior
|
||||||
|
|
||||||
|
Bitcoin is also a technology teeming with new ideas, new innovations.
|
||||||
|
|
||||||
|
https://twitter.com/3d_nout/status/1608245114052247552
|
||||||
|
|
||||||
|
I'm sure your bank wouldn't allow you to do this with your fiat account. I bet the "bad guys" could use this! :laughing:
|
15
content/blog/cryptocurrency-question-of-trust.md
Normal file
15
content/blog/cryptocurrency-question-of-trust.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Cryptocurrency, the Jews, and the Fundamental Question of Trust
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## How Bitcoin addressed a problem that has haunted human affairs for 2.5 million years
|
||||||
|
|
||||||
|
How does the decentralized Bitcoin system work?
|
||||||
|
|
||||||
|
https://www.tabletmag.com/sections/news/articles/cryptocurrency-jews-question-benjamin-samuels
|
||||||
|
|
||||||
|
How Bitcoin solved the trust issue that has plagued societies for millenia. Some precursors to the Diffie-Hellman key exchange are discussed and explained.
|
21
content/blog/cryptography-is-not-enough.md
Normal file
21
content/blog/cryptography-is-not-enough.md
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
title: Cryptography Is Not Enough
|
||||||
|
date: 2022-09-22
|
||||||
|
featureImage: images/blog/privacy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Going Beyond Cryptogrpahy
|
||||||
|
|
||||||
|
This wide-ranging discussion proposes a lifestyle.
|
||||||
|
|
||||||
|
https://dergigi.com/2022/09/10/cryptography-is-not-enough/
|
||||||
|
|
||||||
|
According to the article published by Dergigi, cryptography alone is not sufficient to provide complete security for digital systems and data. While cryptography is an essential tool for protecting data against unauthorized access and tampering, it cannot address all of the security challenges that digital systems face.
|
||||||
|
|
||||||
|
The article notes that cryptography is vulnerable to various attacks, including brute force attacks, side-channel attacks, and quantum attacks, which could potentially compromise the security of encrypted data. Additionally, cryptography cannot protect against other types of security threats, such as social engineering attacks, insider threats, and physical attacks on hardware and infrastructure.
|
||||||
|
|
||||||
|
The report argues that a comprehensive approach to security is necessary, which includes not only cryptography but also other security measures such as access control, authentication, monitoring, and incident response. The article also highlights the importance of regular security audits and updates, as well as ongoing education and training for users to promote awareness of security best practices.
|
||||||
|
|
||||||
|
The article notes that as digital systems become increasingly complex and interconnected, the need for a comprehensive security approach becomes even more important. It also highlights the potential risks of relying solely on cryptography for security, and the need for organizations and individuals to adopt a more holistic approach to protecting their data and systems.
|
15
content/blog/cypherpunks-manifesto.md
Normal file
15
content/blog/cypherpunks-manifesto.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: The Original Cypherpunk's Manifesto
|
||||||
|
date: 1993-03-09
|
||||||
|
featureImage: images/blog/cypherpunk.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## It starts with privacy
|
||||||
|
|
||||||
|
The basis for everything we do at Federated Computer.
|
||||||
|
|
||||||
|
https://what.cd/
|
||||||
|
|
||||||
|
Privacy is the conerstone and that is built on anonymous systems.
|
13
content/blog/dandelion-root-recipes.md
Normal file
13
content/blog/dandelion-root-recipes.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Dandelion Root Recipes
|
||||||
|
date: 2023-05-07
|
||||||
|
featureImage: images/blog/healthy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Are there ways to use the very common dandelion for good?
|
||||||
|
|
||||||
|
This time of year in the northern hemisphere, yards can be filled with the yellow-flowered weed. Let's use them for good.
|
||||||
|
|
||||||
|
https://practicalselfreliance.com/dandelion-root-recipes/
|
15
content/blog/dangers-of-digital-identity.md
Normal file
15
content/blog/dangers-of-digital-identity.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Dangers of Digital Identity
|
||||||
|
date: 2022-03-24
|
||||||
|
featureImage: images/blog/digitalid.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## What happens when your 'identity' is simply 1s and 0s?
|
||||||
|
|
||||||
|
A digital identity isn't something from you. It is a dossier created by the *centralizers* to better understand, for themselves, the capabilities in the world allowed to you.
|
||||||
|
|
||||||
|
https://www.boniface-institute.com/the-dangers-of-digital-identity/
|
||||||
|
|
||||||
|
Identity is tied to access in the digital world.
|
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Data Broker Rats You Out!
|
||||||
|
date: 2022-09-01
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Your data is given to police so that they can see everywhere you've been with the click of a mouse.
|
||||||
|
|
||||||
|
Hey, you're in the privacy of your home, what could go wrong?
|
||||||
|
|
||||||
|
https://www.eff.org/de/press/releases/data-broker-helps-police-see-everywhere-youve-been-click-mouse-eff-investigation
|
||||||
|
|
||||||
|
Answer: everything. Start taking back your privacy!
|
17
content/blog/delhi-rules-telegram-discloses.md
Normal file
17
content/blog/delhi-rules-telegram-discloses.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
title: Telegram Discloses Names After Ruling
|
||||||
|
date: 2022-11-29
|
||||||
|
featureImage: images/blog/telegram.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## You think your Telegram Data is Secure?
|
||||||
|
|
||||||
|
If the thing you're using is centralized, it is so much easier for the "authorities" to compel disclosure of data. Case in point is Telegram who was recently forced to disclose names, phone numbers, and IP address accused of sharing material thought to infringe copyright.
|
||||||
|
|
||||||
|
https://www.livelaw.in/news-updates/after-court-order-telegram-discloses-phone-numbers-ip-addresses-of-users-accused-of-sharing-infringing-material-215311
|
||||||
|
|
||||||
|
The court order was issued by the Delhi High Court in India and required Telegram to disclose the information to the plaintiffs who had filed a copyright infringement case against the users.
|
||||||
|
|
||||||
|
It is important to note that this action was taken in compliance with a specific court order and does not necessarily indicate a general policy or practice of Telegram to disclose user information. Telegram has previously stated that it values the privacy of its users and that it will only disclose user data in response to a valid court order or other legal requirement.
|
13
content/blog/dont-drink-to-health.md
Normal file
13
content/blog/dont-drink-to-health.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: No Health Benefits for Moderate Drinking
|
||||||
|
date: 2023-04-05
|
||||||
|
featureImage: images/blog/healthy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Can moderate drinking ever be healthy?
|
||||||
|
|
||||||
|
It doesn't look like it is...
|
||||||
|
|
||||||
|
https://www.japantimes.co.jp/news/2023/04/05/world/science-health-world/alcohol-health-studies/
|
13
content/blog/dropbox-is-watching-your-activity.md
Normal file
13
content/blog/dropbox-is-watching-your-activity.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Dropbox is Watching Your Activity
|
||||||
|
date: 2020-10-12
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Why All the Telemetry?
|
||||||
|
|
||||||
|
Dropbox sure does collect lots of information...
|
||||||
|
|
||||||
|
[Why So Much Telemetry?](https://www.dropboxforum.com/t5/Integrations/Why-So-Much-Telemetry/td-p/455961/page/3)
|
31
content/blog/drowning-in-ai-garbage.md
Normal file
31
content/blog/drowning-in-ai-garbage.md
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
---
|
||||||
|
title: Drowning in AI Garbage
|
||||||
|
date: 2022-12-05
|
||||||
|
featureImage: images/blog/ai.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Drowning in AI Generated Garbage
|
||||||
|
|
||||||
|
It's a contrarian opinion to opine that AI is anything but garbage (i.e. something written by a 5th grader doing a report). Look, we use ChatGPT to generate the summaries for these link list posts, because we are lazy, and we want to spend more time PC gaming. We're old school that way. But most of the summaries require a significant amount of re-writing...so how lazy are we after all?
|
||||||
|
|
||||||
|
https://ploum.net/2022-12-05-drowning-in-ai-generated-garbage.html
|
||||||
|
|
||||||
|
Here's the AI speaking...
|
||||||
|
|
||||||
|
Discusses the proliferation of low-quality, AI-generated content on the internet and the challenges it poses for consumers and content creators alike.
|
||||||
|
|
||||||
|
The author notes that while AI-generated content can be useful in certain contexts, such as language translation or image recognition, it can also be used to create vast quantities of low-quality content such as spam emails, fake reviews, and clickbait articles.
|
||||||
|
|
||||||
|
(Clickbait articles? Hell, yes! This part was created by a human because, despite what the "consensus" might say, AI doesn't have a sense of attempted humor.)
|
||||||
|
|
||||||
|
This flood of low-quality content can make it difficult for consumers to find trustworthy information and can undermine the credibility of legitimate content creators.
|
||||||
|
|
||||||
|
(Human here, again. Difficult to find trustworthy information? Yes, because it is just re-gurgitating the internet!)
|
||||||
|
|
||||||
|
The article also highlights the potential for AI-generated content to be used in more nefarious ways, such as the creation of deepfakes or the manipulation of social media algorithms to spread disinformation.
|
||||||
|
|
||||||
|
The author argues that addressing the problem of AI-generated content will require a multi-faceted approach that involves both technical solutions and broader societal changes. For example, platforms could implement more robust content moderation and verification processes, while consumers could become more discerning in their online consumption habits and more willing to pay for high-quality content.
|
||||||
|
|
||||||
|
Overall, the article underscores the need for continued scrutiny of the impact of AI on society and for thoughtful approaches to managing its potential downsides.
|
15
content/blog/dutch-schools-must-stop-using-google.md
Normal file
15
content/blog/dutch-schools-must-stop-using-google.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: No Google for Dutch Schools
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/google.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Dutch Personal Data Authority raised concerns about Google's GDPR compliance
|
||||||
|
|
||||||
|
Google donesn't carry. They'll just pay the fines.
|
||||||
|
|
||||||
|
https://tutanota.com/blog/posts/dutch-schools-must-stop-using-google-email-and-cloud-services/
|
||||||
|
|
||||||
|
And they believe we "need" them.
|
15
content/blog/email-clients-are-bad.md
Normal file
15
content/blog/email-clients-are-bad.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Email Doesn't Suck. It's Email Clients
|
||||||
|
date: 2022-08-24
|
||||||
|
featureImage: images/blog/doesntusegmail.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Email clients need improving. Some thoughts.
|
||||||
|
|
||||||
|
A shift to web-base email has meant a degradation in the quality of "fat" email clients.
|
||||||
|
|
||||||
|
https://www.wired.com/story/email-clients-are-bad-so-use-vivaldi-mail/
|
||||||
|
|
||||||
|
The author uses Mutt and Vivaldi mail. We suggest contributing time/talent/treasure to Thunderbird mail. Mutt is great, too.
|
15
content/blog/email-done-my-way.md
Normal file
15
content/blog/email-done-my-way.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: E-Mail Done My Way
|
||||||
|
date: 2022-08-05
|
||||||
|
featureImage: images/blog/doesntusegmail.jpg
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## The journey to getting email self-hosting done right
|
||||||
|
|
||||||
|
One man's (he's the Redhat evangelist for EMEA) way of running self-hosted email.
|
||||||
|
|
||||||
|
https://jan.wildeboer.net/2022/08/Email-0-The-Journey-2022/
|
||||||
|
|
||||||
|
As you'll see, email is a protocol, and an attitude.
|
15
content/blog/embracing-the-kill-switch.md
Normal file
15
content/blog/embracing-the-kill-switch.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Embracing the Kill Switch
|
||||||
|
date: 2022-08-28
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Governments Embrace Internet Shutdowns as a Form of Control
|
||||||
|
|
||||||
|
Well, one way to deal with it, if you can't control it, is to kill it.
|
||||||
|
|
||||||
|
https://www.theguardian.com/technology/2022/aug/29/flicking-the-kill-switch-governments-embrace-internet-shutdowns-as-a-form-of-control
|
||||||
|
|
||||||
|
This will always be an option so long as coercive government (a redundancy) has control over the network itself. The solution is, over time, to build *free* networks unburdened by government control. Examples are (ham) radio, LORA networks, and other forms of free and uncersorable communication. Not to mention getting off the government-approved network nore and more to build human networks of self-sovreignty.
|
15
content/blog/employers-surveill-employees.md
Normal file
15
content/blog/employers-surveill-employees.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Employers Are Doing 'Shocking Things' to Monitor Your Productivity
|
||||||
|
date: 2022-08-26
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Treating employees like robots is the 'new normal'
|
||||||
|
|
||||||
|
If I can track your every movement while you "work for me", that sounds more like slavery, than an exchange of goods.
|
||||||
|
|
||||||
|
https://nypost.com/2022/08/26/its-everywhere-workplace-surveillance-methods-now-common/
|
||||||
|
|
||||||
|
Not to mention it is the precursor to replacing humans with robots for which tracking is a must. Be self-sovereign. Don't work for these sorts of assholes. And if you must, figure out how you are going to escape.
|
15
content/blog/everything-you-need-passphrases.md
Normal file
15
content/blog/everything-you-need-passphrases.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Everything About Passphrases
|
||||||
|
date: 2022-11-25
|
||||||
|
featureImage: images/blog/privatekeys.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Some best practice for passphrases, private keys, and saving them all in a digital wallet
|
||||||
|
|
||||||
|
Not your keys, not your _______________. But how do we protect our keys, our passphrases? What are some best practices to consider?
|
||||||
|
|
||||||
|
https://blog.coinkite.com/everything-you-need-to-know-about-passphrases/
|
||||||
|
|
||||||
|
If you're not incorporating many of these practices into your digital self-sovereign life, then how self-sovereign can you really be?
|
13
content/blog/fbi-watching-internet.md
Normal file
13
content/blog/fbi-watching-internet.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: FBI Watching Internet
|
||||||
|
date: 2023-04-25
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Is the FBI abusing access to FISA databases of private communications?
|
||||||
|
|
||||||
|
The FBI can read out private communications without a warrant or judicial oversight.
|
||||||
|
|
||||||
|
https://www.eff.org/deeplinks/2023/04/internal-documents-show-how-little-fbi-did-correct-misuse-section-702-databases
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: "Federated Founders and Our Joyent History"
|
title: "Federated Founders and Our Joyent History"
|
||||||
date: 2020-09-06T20:18:07+06:00
|
date: 2023-05-26T20:18:07+06:00
|
||||||
featureImage: images/blog/joyent.jpg
|
featureImage: images/blog/joyent.jpg
|
||||||
author: David Young
|
author: David Young
|
||||||
authorThumb: images/author/david.png
|
authorThumb: images/author/david.png
|
||||||
|
15
content/blog/fediverse-is-inefficient-thats-ok.md
Normal file
15
content/blog/fediverse-is-inefficient-thats-ok.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: The Fediverse is Inefficient, That's OK
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/decentralize.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Decentralization comes with some slow downs that avoid the dystopian pile up
|
||||||
|
|
||||||
|
Why having everything move/improve at the speed of whim may not be the best idea.
|
||||||
|
|
||||||
|
https://berk.es/2022/11/08/fediverse-inefficiencies/
|
||||||
|
|
||||||
|
The example provided is Mastodon.
|
13
content/blog/fednow-payment-system-launching.md
Normal file
13
content/blog/fednow-payment-system-launching.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: FedNow Payment System Launching
|
||||||
|
date: 2023-03-15
|
||||||
|
featureImage: images/blog/federated.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Federal Reserve Payments System Moves to the Launchpad
|
||||||
|
|
||||||
|
Why does the federal government, or any government, need a "payment system" unless the currency itself is property of same?
|
||||||
|
|
||||||
|
https://www.cnbc.com/2023/03/15/long-awaited-fed-digital-payment-system-to-launch-in-july.html
|
15
content/blog/fighting-spam.md
Normal file
15
content/blog/fighting-spam.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Fighting Spam
|
||||||
|
date: 2022-09-18
|
||||||
|
featureImage: images/blog/spam.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Some practical tips for fighting spam
|
||||||
|
|
||||||
|
Spam is everywhere. Here are some thoughts about how to fight it.
|
||||||
|
|
||||||
|
https://darthcoin.substack.com/p/avoid-being-spammed
|
||||||
|
|
||||||
|
You'll want to use an email client like Thunderbird or Mutt to follow the "no images" rule.
|
21
content/blog/financial-information-facebook.md
Normal file
21
content/blog/financial-information-facebook.md
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
title: Your Financial Information Sent to Facebook
|
||||||
|
date: 2021-03-11
|
||||||
|
featureImage: images/blog/facebook.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Tax Filing Services Sending Financial Information to Facebook
|
||||||
|
|
||||||
|
As if Facebook didn't know enough about us already...
|
||||||
|
|
||||||
|
https://www.zerohedge.com/technology/appalling-major-tax-filing-services-have-been-sending-financial-information-facebook
|
||||||
|
|
||||||
|
According to an article published by Zero Hedge, some major tax filing services in the US have been sending users' financial information, including their social security numbers and income details, to Facebook through tracking tools on their websites.
|
||||||
|
|
||||||
|
The article states that tax filing services such as TurboTax, H&R Block, and TaxAct have been using tracking tools from Facebook and other third-party companies on their websites, which allow them to collect data on users' browsing behavior and interests. This data is then used to target users with personalized advertising on Facebook and other platforms.
|
||||||
|
|
||||||
|
The report raises concerns about the potential security and privacy implications of this practice, as sensitive financial information could be vulnerable to hacking or misuse by third parties. It also highlights the need for users to be aware of the data collection practices of the websites and apps they use, and to take steps to protect their personal information, such as using strong passwords and enabling two-factor authentication.
|
||||||
|
|
||||||
|
The article notes that TurboTax, H&R Block, and TaxAct have all stated that they do not sell users' personal information, and that they take measures to protect users' data. However, the use of tracking tools on their websites has raised questions about their commitment to user privacy and security.
|
15
content/blog/france-says-non.md
Normal file
15
content/blog/france-says-non.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: France Says "Non" to Office 365 and Google Workplace
|
||||||
|
date: 2022-11-22
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Office 365 and Workplace Shouldn't be used in classrooms
|
||||||
|
|
||||||
|
While the free versions of Office 365 and Workplace may be attractive, they vacuum up so much data on students they constitute a form of theft.
|
||||||
|
|
||||||
|
https://www.theregister.com/2022/11/22/france_no_windows_google/
|
||||||
|
|
||||||
|
Free services come with the "bargain" that the provider gets all your information. What a deal! The French say "no".
|
15
content/blog/free-services-an-allegory.md
Normal file
15
content/blog/free-services-an-allegory.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: An Allegory
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/doesntusegmail.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## What happens when we are beholden to free services?
|
||||||
|
|
||||||
|
Hey, you just wanted to see what the free service could do for you. Despite knowing the dangers. But it is so...
|
||||||
|
|
||||||
|
https://twitter.com/PardesSeleh/status/1534251250744705024
|
||||||
|
|
||||||
|
Please don't go...!
|
15
content/blog/front-matter-cms.md
Normal file
15
content/blog/front-matter-cms.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Front Matter CMS
|
||||||
|
date: 2023-03-27
|
||||||
|
featureImage: images/blog/hugo.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## A CMS that works with Federated Core
|
||||||
|
|
||||||
|
Federated Core has a workflow allowing customers to create static-file websites, publish them to their private Gitea repository, and auto-publish to their private Caddy webserver. Front Matter supports this workflow beautifully...
|
||||||
|
|
||||||
|
https://frontmatter.codes/
|
||||||
|
|
||||||
|
It runs inside of Visual Studio Code among other tools allowing you to preview and create great content using Federated Core.
|
15
content/blog/get-off-gmail.md
Normal file
15
content/blog/get-off-gmail.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Get Off Gmail
|
||||||
|
date: 2022-09-28
|
||||||
|
featureImage: images/blog/doesntusegmail.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Get off the big tech email providers
|
||||||
|
|
||||||
|
Here's a quick mental exercise: if you can't imagine life without Google, Facebook, Apple or the other big centralized services, then you're digital freedom is toast.
|
||||||
|
|
||||||
|
https://www.lifesitenews.com/blogs/the-simple-reason-why-you-should-stop-using-gmail/
|
||||||
|
|
||||||
|
Don't make convenience the master of your freedom.
|
15
content/blog/gmail-encrypted.md
Normal file
15
content/blog/gmail-encrypted.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Gmail Encrypted
|
||||||
|
date: 2022-12-17
|
||||||
|
featureImage: images/blog/doesntusegmail.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## End-to-end encryption for Gmail on the web
|
||||||
|
|
||||||
|
Metadata still not encrypted.
|
||||||
|
|
||||||
|
https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/
|
||||||
|
|
||||||
|
Band-aid on a gaping chest wound. Zzzzz.
|
15
content/blog/gmail-is-breaking-email.md
Normal file
15
content/blog/gmail-is-breaking-email.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Gmail is Breaking Email
|
||||||
|
date: 2023-03-30
|
||||||
|
featureImage: images/blog/doesntusegmail.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## You can't send email to anyone on/from Gmail
|
||||||
|
|
||||||
|
The *Centralizer* makes the rules for email, not the protocol.
|
||||||
|
|
||||||
|
http://www.igregious.com/2023/03/gmail-is-breaking-email.html
|
||||||
|
|
||||||
|
What can be done? Stop communicating to our fiat friends using Gmail?
|
15
content/blog/googerteller.md
Normal file
15
content/blog/googerteller.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Googerteller
|
||||||
|
date: 2022-08-21
|
||||||
|
featureImage: images/blog/google.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Make music when Google spies on you
|
||||||
|
|
||||||
|
This little utility provides auditory feedback whenever your browsing/internet activities feed back into the Google.
|
||||||
|
|
||||||
|
https://github.com/berthubert/googerteller
|
||||||
|
|
||||||
|
This [demo](https://twitter.com/bert_hu_bert/status/1561466204602220544) is pretty hilarious/scary.
|
13
content/blog/google-2fa-sync-service.md
Normal file
13
content/blog/google-2fa-sync-service.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Are Google 2FA Secrets Unencrypted?
|
||||||
|
date: 2023-04-25
|
||||||
|
featureImage: images/blog/google.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Looking at how 2FA secrets are synched
|
||||||
|
|
||||||
|
The synching appears to happen without any encryption. Google sees the secrets. If there is a breach...
|
||||||
|
|
||||||
|
[Defcon Social @mysk](https://defcon.social/@mysk/110262313275622023)
|
15
content/blog/google-being-sneaky-maps-permissions.md
Normal file
15
content/blog/google-being-sneaky-maps-permissions.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Sneaky Move, Google
|
||||||
|
date: 2022-11-23
|
||||||
|
featureImage: images/blog/google.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Allowing a change to maps permissions, opens up your world to Google
|
||||||
|
|
||||||
|
Maps was and is a ground-breaking service offering from Google.
|
||||||
|
|
||||||
|
https://garrit.xyz/posts/2022-11-24-smart-move-google
|
||||||
|
|
||||||
|
Now they're bamboozling us to accept permission allowing them to geotrack us across all of their services. Hey kids, just don't use Google. :kissing_closed_eyes:
|
13
content/blog/google-drive-file-limits.md
Normal file
13
content/blog/google-drive-file-limits.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Google Drive File Limits
|
||||||
|
date: 2023-03-05
|
||||||
|
featureImage: images/blog/google.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## You can't really use Google Drive any way you want
|
||||||
|
|
||||||
|
Oh, nevermind. Google reversed themselves after the backlash. The idea was to put a hard limit on the number of files allowed on the service.
|
||||||
|
|
||||||
|
https://arstechnica.com/gadgets/2023/03/google-drive-does-a-surprise-rollout-of-file-limits-locking-out-some-users/
|
15
content/blog/google-has-most-of-my-email.md
Normal file
15
content/blog/google-has-most-of-my-email.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Google Has My Email
|
||||||
|
date: 2014-05-11
|
||||||
|
featureImage: images/blog/doesntusegmail.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Dealing with the problem that is Gmail
|
||||||
|
|
||||||
|
Even if you run your own email server (or use a service like Federated Core), you will likely be interacting with those using Gmail.
|
||||||
|
|
||||||
|
https://mako.cc/copyrighteous/google-has-most-of-my-email-because-it-has-all-of-yours
|
||||||
|
|
||||||
|
It won't happen quickly or over-night, but we must choke out Gmail and other centralized emails services (looking at your outlook.com) if we are to reclaim email as a "free" as in "freedom" service.
|
15
content/blog/grapheneos.md
Normal file
15
content/blog/grapheneos.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: GrapheneOS
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/grapheneos.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## One of the main alternative Andoid distributions
|
||||||
|
|
||||||
|
You can use a mobile device with lots less tracking than on offer from Google and Apple.
|
||||||
|
|
||||||
|
https://grapheneos.org/
|
||||||
|
|
||||||
|
Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
|
15
content/blog/have-i-been-pawned.md
Normal file
15
content/blog/have-i-been-pawned.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Been Pwned?
|
||||||
|
date: 2021-10-03
|
||||||
|
featureImage: images/blog/pwned.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## One of the delights of using centralized services...
|
||||||
|
|
||||||
|
It's really just a matter of time before your centralized service leaks your credentials or gets hacked. The honeypot is too valuable for the hackers to ignore.
|
||||||
|
|
||||||
|
https://haveibeenpwned.com/
|
||||||
|
|
||||||
|
Check your status here.
|
15
content/blog/how-a-lightning-address-works.md
Normal file
15
content/blog/how-a-lightning-address-works.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: How Lightning Address Works
|
||||||
|
date: 2022-09-02
|
||||||
|
featureImage: images/blog/lightning.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Lightning invoice basics
|
||||||
|
|
||||||
|
A nice, brief explainer on how lightning addresses work.
|
||||||
|
|
||||||
|
https://stacker.news/items/65872
|
||||||
|
|
||||||
|
Lightning is the off-chain bitcoin, etc payments clearing technology.
|
15
content/blog/how-to-be-a-profitable-lnd-node.md
Normal file
15
content/blog/how-to-be-a-profitable-lnd-node.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: How to be a Profitable Lightning Node
|
||||||
|
date: 2022-09-04
|
||||||
|
featureImage: images/blog/lightning.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Some tips for how to run a Lightning Node profitably...
|
||||||
|
|
||||||
|
We think Lightning, in time, will be more for information distribution, and less about Bitcoin payments settlement.
|
||||||
|
|
||||||
|
https://stacker.news/items/66368
|
||||||
|
|
||||||
|
In the meantime, as you begin your Lightning journey...
|
13
content/blog/how-to-delete-yourself-internet.md
Normal file
13
content/blog/how-to-delete-yourself-internet.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Delete Yourself From The Internet
|
||||||
|
date: 2023-02-10
|
||||||
|
featureImage: images/blog/privacy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Some advice for deleting your data trail from the internet
|
||||||
|
|
||||||
|
The get us when we create data, and when we want to delete it...
|
||||||
|
|
||||||
|
https://www.cnbc.com/2023/02/10/how-to-delete-yourself-from-the-internet.html
|
14
content/blog/how-to-stack-sats.md
Normal file
14
content/blog/how-to-stack-sats.md
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
---
|
||||||
|
title: How to Stack Sats
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Anyone Can Earn Bitcoin
|
||||||
|
|
||||||
|
Some great, creative ideas for how to earn and stack satoshis.
|
||||||
|
|
||||||
|
https://www.stacksats.how/
|
||||||
|
|
15
content/blog/how-to-stop-google-collecting.md
Normal file
15
content/blog/how-to-stop-google-collecting.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Stop Google Collecting Your Data
|
||||||
|
date: 2022-09-29
|
||||||
|
featureImage: images/blog/google.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Here are the steps you need to take now
|
||||||
|
|
||||||
|
And overview of how Google collects data and censors...
|
||||||
|
|
||||||
|
https://www.lifesitenews.com/opinion/heres-how-to-stop-google-from-collecting-huge-amounts-of-your-data/
|
||||||
|
|
||||||
|
While this is a *great* resource for what Google is doing, the recommendations for how to defeat the beast are, in our opinion, simplistic and, on top, don't lead to true digital self-sovereignty.
|
15
content/blog/huge-scale-of-US-gov-cell-location-data.md
Normal file
15
content/blog/huge-scale-of-US-gov-cell-location-data.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Huge Scale of US Gov Cell Location Data
|
||||||
|
date: 2022-07-22
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## New documents reveal the US government is tracking cell phone location
|
||||||
|
|
||||||
|
The ACLU unearthed documents showing the US Department of Homeland Security is using mobile location data to track people's movements.
|
||||||
|
|
||||||
|
https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/
|
||||||
|
|
||||||
|
The tracking is taking place on a much larger scale that previously known.
|
21
content/blog/icloud-for-windows-problems.md
Normal file
21
content/blog/icloud-for-windows-problems.md
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
title: iCloud for Windows Downloads Other People's Photos?
|
||||||
|
date: 2021-09-14
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## A Report of Strange Behavior by iCloud for Windows
|
||||||
|
|
||||||
|
The perils of using centralized storage solutions from a company not known for building great services.
|
||||||
|
|
||||||
|
https://forums.macrumors.com/threads/icloud-for-windows-corrupting-videos-downloading-other-peoples-photos.2370666/
|
||||||
|
|
||||||
|
According to a thread on the MacRumors forums, some users of iCloud for Windows have reported experiencing issues with the service, including corrupted videos and downloading other people's photos.
|
||||||
|
|
||||||
|
The thread includes reports from users who have experienced issues with iCloud for Windows, such as videos that are downloaded from iCloud being corrupted and unplayable, and photos that belong to other iCloud users being downloaded to their own devices. Some users have also reported that their files and folders have been deleted from iCloud without their knowledge or consent.
|
||||||
|
|
||||||
|
The issue appears to be affecting a small number of users, and there is no clear consensus on the cause of the problem. Some users have speculated that it may be related to a recent update to iCloud for Windows, while others suggest that it may be related to conflicts with other software or hardware on their devices.
|
||||||
|
|
||||||
|
Apple has not yet issued a statement regarding the issue, but some users have reported success in resolving the problem by uninstalling and reinstalling iCloud for Windows or by resetting their iCloud account. However, the reports highlight the potential risks of relying on cloud-based services for storing and sharing important files and data, and the need for users to regularly back up their data and be aware of potential security and privacy issues.
|
17
content/blog/impact-of-lastpass-on-bitcoin-wallets.md
Normal file
17
content/blog/impact-of-lastpass-on-bitcoin-wallets.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
title: Lastpass Breach Impact on Bitcoin Wallets
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/breaches.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## This person lost sats because of the Lastpass breach
|
||||||
|
|
||||||
|
Can anyone spot how the magical hacker got in?
|
||||||
|
|
||||||
|
https://twitter.com/Cryptopathic/status/1606416137771782151?s=20&t=glD3V7sn8VCOrCeheaWf8w
|
||||||
|
|
||||||
|
A hint: "Having spoken to multiple professionals, it now seems far more likely that my encrypted vault was breached. However, at 100,100 PBKDF2 iterations, it is not realistic to brute force this. I think this situation goes far beyond what has been admitted."
|
||||||
|
|
||||||
|
That's right, Lastpass may not have keep the data encrypted or sufficiently encrypted.
|
15
content/blog/indian-isps-give-givernment-full-access.md
Normal file
15
content/blog/indian-isps-give-givernment-full-access.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Indian ISPs Give Government Full Access
|
||||||
|
date: 2022-11-10
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## They know when you've been naughty, they know when you're awake...
|
||||||
|
|
||||||
|
Well, at least, I suppose, they're being honest about it.
|
||||||
|
|
||||||
|
https://entrackr.com/2022/11/exclusive-indian-isps-we-already-give-govt-full-access-to-web-traffic/
|
||||||
|
|
||||||
|
Or, more likely, just brazen. "What are you going to do about it?"
|
15
content/blog/invisv.md
Normal file
15
content/blog/invisv.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Invisv
|
||||||
|
date: 2022-10-21
|
||||||
|
featureImage: images/blog/privacy.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Let's reinvent the wheel
|
||||||
|
|
||||||
|
Congrats to Invisv for understanding the problem.
|
||||||
|
|
||||||
|
https://invisv.com/
|
||||||
|
|
||||||
|
We have questions, however. Is Invisv centralized? Are all these privacy break-throughs inter-operable with any other open standards, protocols?
|
15
content/blog/ios-16-leaks-connections.md
Normal file
15
content/blog/ios-16-leaks-connections.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: iOS 16 Leaks Connections
|
||||||
|
date: 2022-10-11
|
||||||
|
featureImage: images/blog/timcook.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## But Apple is Muh Secure!
|
||||||
|
|
||||||
|
Researches discovered iOS 16 communicates with Apple services outide an active VPN tunnel. Huh?
|
||||||
|
|
||||||
|
https://twitter.com/mysk_co/status/1579997801047822336
|
||||||
|
|
||||||
|
They used ProtonVPN and Wireshark for the testing. What's the solution? Different mobile OS.
|
15
content/blog/iphone-equals-privacy-question.md
Normal file
15
content/blog/iphone-equals-privacy-question.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: iPhone = Privacy?
|
||||||
|
date: 2022-09-08
|
||||||
|
featureImage: images/blog/apple.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Does using an iPhone mean you have the best privacy solution?
|
||||||
|
|
||||||
|
Most believe the iPhone is a bastion of privacy. Tim Cook said so...
|
||||||
|
|
||||||
|
https://kerkour.com/iphone-privacy
|
||||||
|
|
||||||
|
Apple has marketed their devices as saving the world from a big brother dystopia. But, like so much gas-lighting these days, it is the savior playing the role of big brother.
|
23
content/blog/iphone-usage-data-anonymous.md
Normal file
23
content/blog/iphone-usage-data-anonymous.md
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
---
|
||||||
|
title: Is iPhone Usage Data Anonymous?
|
||||||
|
date: 2021-11-23
|
||||||
|
featureImage: images/blog/timcook.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
# Your iPhone's Analytics Data Includes an ID Number
|
||||||
|
|
||||||
|
How anonymous is iPhone usage data after all?
|
||||||
|
|
||||||
|
https://gizmodo.com/apple-iphone-privacy-dsid-analytics-personal-data-test-1849807619
|
||||||
|
|
||||||
|
According to the article published by Gizmodo, Apple's iPhone was found to be collecting data on users' personal browsing habits through a feature called "DSID Analytics," which is enabled by default on all devices running iOS 15.
|
||||||
|
|
||||||
|
The report notes that DSID Analytics collects data on users' app usage, search history, and web browsing behavior, which is then sent to Apple's servers for analysis. This data is reportedly used to improve the performance of Apple's products and services, such as Siri and the App Store.
|
||||||
|
|
||||||
|
However, the article raises concerns about the potential privacy implications of this feature, as it collects personal information without users' explicit consent and without providing a clear way to opt-out. The report also notes that the data collected by DSID Analytics could be used to build detailed profiles of users' behavior and interests, which could be exploited by third parties for targeted advertising or other purposes.
|
||||||
|
|
||||||
|
Apple has responded to the report, stating that the data collected by DSID Analytics is anonymous and aggregated, and that users can choose to disable the feature by going to Settings > Privacy > Analytics & Improvements > Share With App Developers and turning off the toggle.
|
||||||
|
|
||||||
|
However, the report highlights the ongoing tension between tech companies' desire to collect data for product improvement and innovation, and users' rights to privacy and control over their personal information.
|
15
content/blog/katzenpost.md
Normal file
15
content/blog/katzenpost.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Katzenpost
|
||||||
|
date: 2022-10-21
|
||||||
|
featureImage: images/blog/federated.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## A service to resist on-line surveillance
|
||||||
|
|
||||||
|
From the post, why end-to-end encryption is not enough: "End-to-end encryption has become more commonplace with major online messaging and communication tools, but encoding what you say to your friends online does not mean that the service provider cannot see who you contacted, when, from where. This metadata might be even more important than the content of an online conversation."
|
||||||
|
|
||||||
|
https://nlnet.nl/project/katzenpost/
|
||||||
|
|
||||||
|
You have to think about the metadata in the same way we think about how services like Facebook develop "graphs" of us for the purposes of advertising and scores.
|
15
content/blog/kyc-not-me.md
Normal file
15
content/blog/kyc-not-me.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: KYC Not Me
|
||||||
|
date: 2023-03-21
|
||||||
|
featureImage: images/blog/nokyc.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## KYC Scores
|
||||||
|
|
||||||
|
KYC stands for "know your customer" which is another way of saying "surveillance" by the service and/or government interests. The KYCnot dot me website lists lots of websites, many for Bitcoin, and their relative scores for KYC.
|
||||||
|
|
||||||
|
https://kycnot.me/
|
||||||
|
|
||||||
|
There are also listings for VPNs, domains and hosting, phone numbers, and other various services and tools.
|
15
content/blog/lastpass-breach-gets-worse.md
Normal file
15
content/blog/lastpass-breach-gets-worse.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Lastpass Breach Gets Worse
|
||||||
|
date: 2023-02-04
|
||||||
|
featureImage: images/blog/breaches.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## The Lastpass breach just gets worse and worse
|
||||||
|
|
||||||
|
A wonderful post-mortem of the recent Lastpass data breach.
|
||||||
|
|
||||||
|
https://old.reddit.com/r/sysadmin/comments/10kp4ye/lastpass_breach_gets_worse/
|
||||||
|
|
||||||
|
Solution? Get off centralized password managers. Not your keys, not your passwords.
|
15
content/blog/lastpass-hacked.md
Normal file
15
content/blog/lastpass-hacked.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Most Popular Password Manager Hacked
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/breaches.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Lastpass Hacked, Again
|
||||||
|
|
||||||
|
Lastpass is the world's most popular password manager...with hackers, too.
|
||||||
|
|
||||||
|
https://www.bloomberg.com/news/articles/2022-08-25/the-world-s-most-popular-password-manager-says-it-was-hacked
|
||||||
|
|
||||||
|
Solution, host your own password manager. It is possible. Unless you like giving the hackers your passwords...
|
15
content/blog/lastpass-security-incident.md
Normal file
15
content/blog/lastpass-security-incident.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: LastPass Security Incident
|
||||||
|
date: 2022-12-22
|
||||||
|
featureImage: images/blog/breaches.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## LastPass Gets Hacked
|
||||||
|
|
||||||
|
LastPass, where so many store their sensitive passwords, has a security incident.
|
||||||
|
|
||||||
|
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/
|
||||||
|
|
||||||
|
An "unauthorized party" got access to the third-party storage where LastPass stores backups. When you're dealing with cloud services, there is tremendous "counterparty" risk, as they would say in the *fiat* financial markets. If you're using a cloud service, that service can swear all day that they are secure...but security is a combination of all the links, including the weak ones.
|
13
content/blog/learn-bitcoin-interactively.md
Normal file
13
content/blog/learn-bitcoin-interactively.md
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
title: Learn Bitcoin Interactively
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/bitcoin.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## A tutorial to learn the technical side of bitcoin
|
||||||
|
|
||||||
|
This neat interactive tutorial teaches you the technical overview of bitcoin.
|
||||||
|
|
||||||
|
https://trybitcoin.satsie.dev/
|
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Let's Build to Steal Everything
|
||||||
|
date: 2023-02-23
|
||||||
|
featureImage: images/blog/surveillance.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Building a Chrome extension to steal everything
|
||||||
|
|
||||||
|
The wonders of Chrome extensions on all the data they can pilfer...
|
||||||
|
|
||||||
|
https://mattfrisbie.substack.com/p/spy-chrome-extension
|
||||||
|
|
||||||
|
...would this be possible on the "safe" browsers like Brave and Vivaldi? Firefox?
|
15
content/blog/lightning-wallet-comparison.md
Normal file
15
content/blog/lightning-wallet-comparison.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Lightning Wallet Comparison
|
||||||
|
date: 2022-02-27
|
||||||
|
featureImage: images/blog/lightning.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## A look at all the options for Lightning wallets
|
||||||
|
|
||||||
|
Inevitably this blog post will get more and more out-of-date as time passes...
|
||||||
|
|
||||||
|
https://darthcoin.substack.com/p/lightning-wallets-comparison
|
||||||
|
|
||||||
|
But it provides a nice overview of the different approaches to wallets for holding Bitcoin on the LIghtning network.
|
15
content/blog/lineageos.md
Normal file
15
content/blog/lineageos.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: LineageOS
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/lineageos.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## One of the main alternative Andoid distributions
|
||||||
|
|
||||||
|
You can use a mobile device with lots less tracking than on offer from Google and Apple.
|
||||||
|
|
||||||
|
https://lineageos.org/
|
||||||
|
|
||||||
|
Just remember, when you leave tracking prison, you leave behind the apps that have your addicted. OK?
|
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
title: Future of Advertising and Information Services
|
||||||
|
date: 2021-10-21
|
||||||
|
featureImage: images/blog/advertising.png
|
||||||
|
author: Cincinnatus
|
||||||
|
authorThumb: /images/author/cincinnatus.jpg
|
||||||
|
---
|
||||||
|
|
||||||
|
## Marshall McLuhan lays it out in 1966
|
||||||
|
|
||||||
|
A wonderful look into the future, from the past.
|
||||||
|
|
||||||
|
https://paleofuture.com/blog/2023/1/11/marshall-mcluhan-on-the-future-of-ads-and-the-internet
|
||||||
|
|
||||||
|
One of the insights here is the idea that we *enjoy* being manipulated, being advertised to because the advertising itself is the beginning of the fulfillment of our desire for an object.
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user