Glorified network janitor. Perpetual blueteam botherer. Friendly neighborhood cyberman. Constantly regressing toward the mean. Slowly regarding silent things.

  • 0 Posts
  • 48 Comments
Joined 2 years ago
cake
Cake day: December 27th, 2023

help-circle



  • 0xtero@beehaw.orgtoPrivacy@lemmy.mlIs Signal messaging really private?
    link
    fedilink
    arrow-up
    29
    arrow-down
    2
    ·
    edit-2
    15 days ago

    Depends on your threat model, as always. If you require absolute anonymity, it’s tricky, because it uses phone number during the onboarding process, so get an anonymous pre-paid number and discard it after registration. After onboarding you don’t need the number.

    For the rest, it’s about as “private” as you make it. It supports group messaing, calls and video, so obviously you need to be careful while using it. Everything is e2e encrypted and stays on your local device, the source is available and has been extensively audited.

    But yeah, your threat model is the key answer to your question


  • Being para-social at workplace is part of the job. We are primates establishing group dynamics after all. Others monkeys need to know if you fit into their Dunbar’s number or if you’re a shit-tosser.

    I tend to give short answers without elaboration. ”Where do you live?” Gets one word reply. ”Where did you grow up?” One word. The rest of the time, be silent and don’t engage. Silence works.

    Being introverted is fine, but you might havewto accept that others are not. For them parasocial relationships are as important as being alone is for you.

    You can, learn to drive different behaviour for a while. I am very introverted myself, but I don’t present myself as one at work, purely because my work requires me to be outward focused public speaker. This takes a LOT of energy so I also need to find recharge time and ”be myself”, but I do that outside work.

    Of course it would be ideal if everyone else was just as introverted as I am, but over the years I’ve come to the conclusion it’s easier to adopt a ”work behaviour” than expect everyone to adapt to my level.






  • 0xtero@beehaw.orgtoAsklemmy@lemmy.mlWhat is Lemmy's problem with AI?
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    2 months ago

    LLMs are a tool. They lack fidelity and frequently generate wrong results but as long as you (human subject matter expert) go through the results they are extremely useful in analysing and summarising large datasets.

    But that’s all they are. They don’t create anything new, you can’t use them for learning anything and they certainly don’t ”think”, they just produce nice looking sentences.

    Generally, the energy needs and environmental harm they do make their usecases very narrow. But there are some.

    As a general tool that pretends to be ”intelligent”, they are completely useless because they’re nothing of the kind.





  • 0xtero@beehaw.orgtoPrivacy@lemmy.mlShould i trust proton?
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    2 months ago

    If and when you send or receive e-mail encrypted by PGP, the body (contents) of the message is indeed encrypted and you’re safe from snooping and data collection, which is great. However, privacy-wise this might actually be a bad thing, because almost no one uses PGP and using it makes you stand out in a sea of normal e-mail users for someone who collects and analyzes lot of data. So if that’s your threat model, using PGP might actually be dangerous. Also, you have to remember and remind everyone to use PGP, which is cumbersome if you correspond with non-techie people. You don’t really know how they handle “their side” and PGP software is notoriously not very user friendly.

    Whenever you send someone unencrypted e-mail from your Proton account, there’s a chance that the recipients e-mail provider (most likely Google or Microsoft) reads it. Same when they send it to you. It doesn’t actually matter that the message sits encrypted “at rest” in your Proton accounts Sent Items -, the contents have already been read, indexed and sold to a broker.

    It’s very hard to do e-mail privacy because the protocol itself doesn’t have any built-in. It’s better to use other communication methods for sensitive transactions.