2023 Reddit Refugee

On Decentralization:

“We no longer have choice. We no longer have voice. And what is left when you have no choice and no voice? Exit.” - Andreas Antonopoulos

  • 17 Posts
  • 375 Comments
Joined 2 years ago
cake
Cake day: June 15th, 2023

help-circle




  • CatZoomies@lemmy.worldtoLemmy Shitpost@lemmy.worldReality vs Fantasy
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    1
    ·
    edit-2
    19 hours ago

    In American English, the article “an” is used for a vowel sound to separate the words so they don’t blend together when speaking.

    Normally, “a” always precedes a consonant, while “an” precedes a vowel. But “an” also precedes vowel sounds - i.e., the sound of the letter of the beginning of a word.

    • An apple
    • A banana
    • An hour

    Hour starts with a consonant, but is pronounced with a vowel sound at the beginning. Thus, it is not “a hour” and rather “an hour”.

    In the case of the example from the meme, id argue that either article works:

    • A “I’m…” - Typically when speaking, a person has a brief pause before they begin the quote. Since that pause would be enough to distinctly indicate two separate words, this sounds fine when being verbally spoken.
    • An “I’m…” - Looks great in text and would be the correct way to list it grammatically. However when speaking this aloud, since the person would have a brief pause when saying “an” and then the quote, it probably wouldn’t sound as great to some others.

    My take - I like “an ‘I’m…’” best. Both in text and verbal form. Others may disagree as far as verbally said; however, grammatically in written form this is how it should be.

    Edit: Fixed the inevitable autocorrects from typing this on mobile.



  • Still sounds gross. While the developer might have opted in to selling your processing power to scrape websites, I doubt the users of each extension opted in.

    Response from the developer:

    " Users who want to support a free software product or creator can decide to opt-in to share their bandwidth. … Developers can decide to offer them additional features and content or simply use the money to keep the products free and available."

    On User Consent:

    “Our approach is always opt-out by default. I’ll write more below on how we are going about enforcing it now as part of a stricter approach to maintaining a transparent ecosystem. We provide default opt-in/out hosted pages to simplify asking consent and have left this page where users can see all the plugins to which they have opted-in and manage their settings with no developer as an intermediary: mellow.tel/user-control.”

    In other words, users are opted-out by default. They can also go to that web site, and when they click the link, the page checks which extensions are installed in the browser and whether or not you opted in.

    On Opt-In Enforcement:

    Ars Technica article states there are “no checks to determine if a real user knows what they are approving or to determine if the developer just opts all users in on their behalf”.

    “We do have a page where users can go and see if they are opted-in or have been opted in without their knowledge from the developer: mellow.tel/user-control. But you are right and we should do more. We have started enforcing the opt-in policy from today (by simply checking each integration and not sending requests to those that don’t show an opt-in) and will be doubling down on that in the coming days. Each new websocket request from an unknown integration will be quarantined and we won’t allow requests to go through until we have controlled the integration is compliant and is asking users to opt-in + is leaving an opt-out option clearly visible. We will also start enforcing routine checks on our Mellowtel integrations to create a transparent environment.”

    In other words, the Mellow.tel developer has it set to always opt-out by default. However, developers of extensions may just opt-in the users without consent - which, I agree with you is gross. It’s possible those developers don’t explain the full implications. Now, the Mellow.tel developer is putting in remediations to ensure that the opt-in policy is enforced, and users will have more exposure to knowing whether or not this is happening. Meaning, they’re going to try to enforce default opt-out (as they stated this was always their policy), and make it easier for users to know they get opted in.

    On Personally Identifiable Information and Monetisation:

    The developers basically claims everything is anonymized. And the way they make money is, if you opt-in, you share “a fraction of your bandwidth” when browsing the web, fetching from a server, etc. They don’t collect or sell your user data because they aren’t advertising, and their business model is not advertising.

    “all [Response data] is completely anonymous, it doesn’t point back to any user, and isn’t stored except the minimum time to at on it… Location - The only information used is country level (e.g., US, ES, DE), [and] it isn’t associated with any Personally-Identifiable-Information (PII) at all.”

    So my conclusion - I care about my privacy. I don’t like being opted into things without my consent. According to this developer’s response, they never did. They’re trying to come up with a model to help the web stay free. Who knows if this will be viable or not. Developers of extensions can leverage this stuff, and in the past, some of those developers may have opted users in without their consent (or without full transparency or understanding of how this was happening). Even if a user was “opted in”, it doesn’t appear to be a significant impact to privacy as they have their source code published, processing happens locally on the user’s device, and the data that gets process is not transmitted, sold, or even have any identifiers. In fact, the data they claim is quite sparse to the extent that it’s limited to bandwidth allotment, country, and simple “keep alive” checks (heartbeat). Now I don’t have any association with this company, know this developer, nor do I have any stakes at all in this. This just caught my attention and I Had to read and learn more about it, and assess whether or not it affects my privacy threat model (it doesn’t for me, simply because none of the extensions I use have this thing).

    For my background - I’m a software engineer for a SaaS provider. My company processes observability telemetry, and we assist customers to instrument agents in their environments (server, machines, clusters, DB, and end-user devices like browsers and mobile devices) to collect metrics to enable observability of their platform, and generate automatic application topology. Also a suite of tools to examine metrics and dynamic baselines, health rules for baseline deviations or other anomalies, analytics, user queries, complete business transaction view, incident remediation, etc. However, I have no background whatsoever in security. So I can’t comment on the security point because I don’t have a cyber security background. I’m only going off what the developer said, and it made sense to me. But I’d defer to a person with cyber security expertise to comment here.

    Edit: Added some additional context, fixed some spelling.








  • Yep, this exactly. They can never clock out at the end of the day. It isn’t 8 hours of work and you’re done. You’re having to constantly try to innovate. Make tons of content, spend so much time editing, constant filming, constant planning. And if you deviate in your schedule, or upload some content that isn’t interesting, the algorithm punishes you and you may even get people that unsubscribe.

    Must be hell when you can’t afford to take a vacation from that content creator life. Can never really “switch off”. Plus the fact that less than 1% actually make it big, and it’s mostly based on luck plus years and years of determination.




  • I hear this a lot but I don’t put any confidence behind it. This argument suggests that one day we’ll be able to brute force into lost wallets when we can break the encryption. Who knows how far in the future that will be.

    But if I recall correctly, Bitcoin’s protocol is consensus driven. If there is an imminent threat of quantum computing, the developers could just improve the code base to resist it. Or fork the protocol to one that is resistant (Bitcoin 2). Then it’s up to 51% of the Bitcoin node operators to adopt the protocol. As soon as 51% of them upgrades, you immediately stop the threat.

    I think the only reason Bitcoin is around is for two reasons: speculation, or the persons that actually believe it’s decentralised hard money free from control. I’d like to believe that there are a ton of people out there that run the BTC nodes to keep it decentralised. If there is an update that will resist quantum computing, I’m sure they’ll be eager to immediately upgrade their nodes and secure the network and those wallets. At least that’s how I believe it works, it’s been years since I first began researching it.

    As an aside, Bitcoin isn’t for me because I hate the environment impact. I hope one day it will become green, because it’s never going to go away. But I don’t blame the people that believe in it. In a world where the rich own everything and control the rules, these people are trying to opt out I guess - use a form of money that can’t be easily controlled or censored. Granted it’s all based on speculation, and whenever we run out of Bitcoin is probably when the system will become useless. Spending is discouraged when you run out of coins, so I don’t know how the Bitcoiners defend that argument. So definitely not for me.

    Edit, on mobile so fixed some typos and clarified the 51% attack.