I am a #bibliologer and a #cryptologer. I study the Bible, codes, and ciphers among other things. I enjoy #poetry. I like #neologisms. I burn with insatiable curiosity about everyone and everything.

  • 13 Posts
  • 122 Comments
Joined 7 months ago
cake
Cake day: December 10th, 2023

help-circle










  • firefly@neon.nightbulb.nettoPrivacy@lemmy.mlWhat VPN are you using?
    link
    fedilink
    arrow-up
    9
    arrow-down
    3
    ·
    edit-2
    2 months ago

    @[email protected]

    “I have nothing to hide …”

    Nice story, bro.

    When you post a real photograph of yourself, wife, kids, and all your social security numbers and bank account numbers, along with a complete history of all video rentals and library books, and your private confessions of folly, vice, and sin-- post all that on your Lemmy profile, then I’ll believe you have nothing to hide.



  • No easy way at all. The specs would be in-house manufacturer docs. Recall that digital cameras used to embed date and time visibly in images in a corner. The logical progression was to embed other data such as device serial number, geotag data, etc.

    Regarding the schemes for steganographic identification in devices such as cameras and printers, this information is usually kept a trade secret. The Secret Service would probably already have the spec docs for data hiding. Many manufacturers already have working agreements to provide back door assistance and documentation for the hardware surveillance economy. Ink chemistry profiles are registered with the Secret Service. The subterfuge is to ‘investigate counterfeiting’ but it is also used to identify whistleblowers and objective targets by their printer serial number or ink chemistry, or the data embedded in any images they are naive enough to publish.

    If you are a undercover reporter secretly video recording, unbeknownst to you the video could have metadata encoded using a secret scheme. If you registered that product for a warranty, or bought it online and had it shipped, or paid with a credit card or check, or walked beneath the electronics store cameras without a hat and sunglasses to pay cash, it is easy for the state organs to then follow the breadcrumbs and identify the videographer.

    Almost all ‘free’ wifi hotspots offered by chain restaurants and hotels are logged with the data being stored indefinitely, showing your mac address. It takes only a little bit of investigation and process of elimination to find the user on a camera feed history, to see who was connected when a certain message or leak was sent. If you use a wifi hotspot in a McDonalds, Wendy’s, Starbucks, etc. smile for the surveillance camera which will also have your device’s unique MAC address in the wifi history. This MAC address data is automatically sent to a central station, for example at the Wandering Wifi company, and God only knows how long they store it.

    None of this nonsense makes anyone safer. These people hate us.









  • “Unfortunately virtually no one is going to see this.”

    That’s what you think. But others are reading, and taking note, and amusing themselves.

    Pray tell, what does your clairvoyant knowledge of the readership have to do with the facts at hand or subject of discussion?

    And this is yet another bully tactic of trying to convince the target that he is ‘alone and isolated’ in his view. Your tactics are transparent. You just ‘intuit’ what you want to be true and then declare it to be so. Your socialist forefathers did the same, and they managed to murder millions of victims in the process of their incompetence and arrogance. You’re on the wrong side of history.

    “This is starting to sound like persecutory delusion.”

    This is more evidence of your tendency to ad hominem bile.

    Since you are such an eminent psychologist, should I shudder before your most highly supernatural powers of psychoanalysis? Pray tell, where did you get your license to practice remote psychiatry? I sure would like to know the rocket scientry behind how that works!