• 0 Posts
  • 158 Comments
Joined 1 year ago
cake
Cake day: June 21st, 2023

help-circle
  • Doctors are erring on the side of caution to avoid potential lawsuits and even jail time

    I get it’s risky and money is needed to survive, and prison is bad, and all, but it seems a bit hypocritical for doctors to violate their modern day version of the Hippocratic Oath.

    Especially the part where it says:

    I will prevent disease whenever I can, for prevention is preferable to cure.

    That’s a place where life-saving decisions should always transcend law, and there should be a law (since we can’t go on gentleman’s agreements anymore) that says as much to cut out this partisan horse shit that vacillates and trends downward every year.

    Can’t believe it’s 2024 and our big accomplishment is that America figured out how to politicize the human body, and the uterus in particular.








  • My best guess is that I know one of them uses Facebook. Apple phones. Facebook, Uber, and a few others have had pretty deep access to APIs not accessible to other software companies. Sometimes they’re caught like when Uber was caught using a screen scraping API. Sometimes they aren’t. The other guess that glues it together is that Facebook has indeed scraped audio to text for a long time. It was almost 10 years ago that I had the EE conversation.

    Google and Meta pay Apple money to gain access to their user metrics. It’s likely symbiotic relationships. Facebook once had hooks directly in iOS. Likewise, the little mic/video indicators the OS displays when they are “active” are completely software-controlled and can be overridden.

    At a time, I worked at a company that had(has) deep access to other aspects of iOS. Apple always required the source code is available to them so they could inspect it. I doubt that has changed. It also means they would be complicit. External tools wouldn’t really be able to figure this out. For someone to black-box this they’d need a jailbroken iPhone and some specialized tooling or MITM decryption capabilities.

    Not to sound hyperbolic, I’m connecting dots with no evidence, it’s pure speculation. The compute seems to be there and with no regulation in source code, anything goes, if you want money bad enough. Especially with the mad dash every tech company has been on for the last 20ish years to harvest everything they can, ever since smartphones became powerful and commonplace enough.



  • https://en.m.wikipedia.org/wiki/Bath_School_disaster

    People could also buy dynamite pretty easy, this was a 1927 school killing.

    Crazy finds a way, however the frequency uptick these days is bonkers. Regardless of the device used to kill, I (with no evidence) think a lot of general community fracture has occurred over the last decades, people now have internet echo chambers reinforcing stupid ideas at a much higher accessibility, and foreign actors manipulating the general public. The local communities are more distanced as people choose their online pockets.

    Can’t downplay the firearm aspect though. The AR-15 is ridiculously easy to shoot with no formal training and easy to hit a tight grouping at 20 yards the first time you pick it up. Other firearms require more skill and training to be remotely as effective. This drops the barrier to entry so low that any asslarper can pick one up and go murder a ton of people.


  • Was on some United flights recently with their new seatback media systems. The user experience is much better than Delta’s, but also, they actively harvest your information at your seat to build a “profile” on you, they even ask you to choose the type of flight profile you want like “relax” or “fun” etc. and it modifies the content filters for you.

    The kicker though, was on the last flight, when the lighting was just right that I noticed they have a pinhole camera installed on the lower left of the display, along with some IR blasters to power a proximity sensor around a software button.

    Blasters likely produce enough light that the camera can see you even when the screen is off/cabin is dark. So they’re likely building passenger profiles with visual data now as well, it’d be trivial to do facial recognition of “happy, sad, sleepy, etc” on top of capturing your movement in the seat. Did you just use your phone? Did you use the seatback screen? Are you reading a book? What food did you choose?



  • And the health apps know when you’re sleeping, they know your heartrate throughout the day, your o2 sats. They can take all this mortality risk data to factor in things, advertise drugs to you, advertise foods they know you’ll eat even though it’s bad, manipulate how your insurance pays out for your next treatment because it would have been preventable if you hadn’t eaten those donuts. The phone manufacturers know you run apps, how long, what you do (yes, even Apple, especially Apple, they hide behind “privacy” so you feel ok with what they do to you) what web pages you open, how long you view them.

    They could biometrically paint a picture of your day, your movement, there’s an entire profile of data available on many humans. I wouldn’t be surprised if they aren’t already tying heart rate data to viewership of media and advertising.


  • It’s surprisingly easy to use adtech without voice and make a connection to serve a targeted ad. Had a friend ask me about what I was drinking. They were on my guest wifi network. They searched for it. Next day, I’m getting ads because of geoIP pinned my IP address as having an interest.

    Also had someone that lives off the grid with no active network or devices watch a DVD of a movie and the entirety of their Internet connectivity was two cell phones in the room. They started seeing things related to the movie. They’re older and not constantly on their phones. The phones just sit somewhere in the room.

    Had a discussion with some tech friends a few years back and remarked that keeping awake to do this would take a lot of power. The EE mentioned running audio recording would take basically nothing. I expanded from there, the device uploads audio for off-phone translation to text, or queues batch jobs to process locally when power is high enough or on charger. Etc.

    It is 100% probable that code runs on phones and just ships off amalgamated text frequency charts or entire conversations and the user won’t even notice the battery dent.

    That being said, I can’t find even in the greediest capitalist money-claw that the person giving a go would not think, “well, I can’t trust my own device anymore…” and maybe go: “yeah, I shouldn’t do this.” Maybe I’m too optimistic though.


  • Certs have existed a long time, are never implemented correctly, and the expiration cycle that is supposed to bolster security just causes pain as a result.

    Certs should just be redesigned to have a kill switch. CRLs were supposed to handle that, but are rarely implemented or implemented correctly.

    Certs are also used in so many places where they may not be suited to the task, but because they exist, they’ve become the de-facto standard.

    A temporal expiration system seems flawed from the beginning anyway. What, you don’t trust your system anymore just because time has passed? Time is always passing. Are we all secretly racist against clocks now?