• 0 Posts
  • 51 Comments
Joined 6 months ago
cake
Cake day: December 27th, 2023

help-circle
  • that could come in veery handy once microsoft wants to pull some plugs. i guess we can be grateful for the backup that is 1. not 100% in m$ hands any more then and 2nd cannot be as easy destroyed as some backups at archive.org. i actually hoped for someone with enough money to create this type of security after m$ assimilated github and thought like “does nobody see the rising danger there?” but even if china’s great fork might be more reliable than m$ over time, maybe it’s better to have your own backups of all the things you actually may need in future.

    btw did microsoft manage to get rid of the hackers that settled into their network for … how long??

    i guess they’ll tell



  • and the ones finding apes on a planet just short ahead or into the beginning of those 10000 years might think “well lets teach them how to stack stones and let them call us gods for just showing some of our million years old and cheap replicated tech gadgets pewpew, how amusing! but now lets go on, this planet has water but way too much oxygen and also there is axial precession that would change weather over only few hundrets of thousands of years if not less, not the planet of choice for eternals like us, duh!”


  • smb@lemmy.mltoPrivacy@lemmy.mlDoes MATRIX recipients know my IP?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    10 days ago

    a public room is public. anyone could and should be able to enter it at any moment start recording and uploading everything to $terrorist@/or$three-letter-agency or such. The idea that someone else could also get the same already public data later is not threatening, as that data is already considered public as in “everyone in the world could have it a second after the data came into existance”. and also as removing from the public is not considered possible, uploading that already intentionally published data again does not pose a greater threat than its first publication, but uses just a bit of bandwidth, not more. if you are very sensitive about visibility of who you talk with, maybe don’t enter “public” rooms in the first place.

    if you join a private room, you already want to share with the other participants that you are f***ing talking to them, including when and who you exactly encrypted the data for, when, and to which servers they have to be forwarded. i expect the server of all participants to forward messages to the recipients. for this the server needs to know this type of information. Of course awareness, which data is used to make i.e. routing decisions is a good thing, but a “nightmare” would be teams zoom icq, whatsapp and similar. i am sure that messengers exist that could be less traceable for participants, but full anonymity to who you are communicating with so that even the servers know nothing about what happens in a room is imho not even a goal of matrix for the future.

    Not a “nightmare”, but what a nightmare it must be to find out that a system that looked so promising did not fulfill “every” dreamexpectation one had with options that are even the opposite of ones dreamexpectation like “public rooms”. that are meant to be public! how horrible!!!(lol)

    by the way -as it seems possibly noteworthy here - if you exchange emails with someones @gmail address, then google has all of your mail histories metadata, as well as the server of your provider has. just to mention, do not send emails to @gmail.com if you dislike google knowing about it. and if you share a document with edit history, then the edit history is likely also shared ;-) As “rooms” in matrix are meant to have a state that changes from the beginning sometimes possibly with every message and one can answer to a message which would reveal the existance of that message later when answered on, including at least a hint of what it was about, such information is imho meant to to be rather complete than hidden. maybe 1:1 chat solves this issue for you, as every chat with a new other person would start empty.

    i might be wrong, but matrix already is one of the most robust systems when it comes to “compromised servers”. so very far away from a nightmare. that is unless you are either a true criminal bastard or a true world saving hero, then every leaked byte might be the deadly one, that is true.

    So in case you are a true world saving hero: Maybe use a self build raspberry pi mesh proxy chain mounted on rooftops delivered by drones at night to proxy the signal of an in-memory-only-tasks-raspi to a free wifi, where the raspi that has its orders is using battery (like the rooftop proxy chain) but is hidden in a public transport to reach the proxy mesh by the transportations timetable. just to give a paranoic one some ideas and some work to do ;-) If you’ve build everything, then upload the code to github and designs to thingiverse so that “anyone” could have placed the proxy mesh to a free wifi on the rooftops, so you be more secure from beeing suspected ;-) lol btw a mesh system to accomplish this already exists, i think they named it b.a.t.m.a.n. (no joke) protocol, so the main struggle should be handling of solar power vs wifi signal strength, distances, humidity and windproof mount design beeing able to be deployed by manually controlled quadrocopters. good luck!


  • Often children that are rescued are taken out immediataly and irrevocably for their security, this is done due to sometimes very realistic dangers to their life as well as to protect them from manipulation. Without such external help, a victim would have to do all alone what police in groups with lots of money sometimes struggle to accomplish. keeping kids safe (and that is true even when police does not have child abusers in their mids) is not always easy.

    They don’t have anywhere else to turn :(

    yes, i think that very often they have nowhere to turn to, and partly this is intentionally deployed by the abusers like cutting contacts with everyone that the child might be willing just to talk to so that some few words could reveal what really happens.

    Also by schools that report kids bad behaviour to parents (which in general is seen somewhere between unproblematic and good, but to the abused child, the school working hand in hand with the abuser, does not help with anything). But the hope to “leave forever once grown up” can help do the (mental) split (possibly there are other solutions like living in fantasy worlds or such or combinations) But leaving for real also has(!) to wait until the abusers are not officially “responsible” for the victim any more, otherwise gov could make sure that the situation gets even worse and this is a very realistic horrifying danger to the victim and regularily happens too. Having to wait means a child of i.e. 5 years may have to decide to wait until it is like 18 years old to actually be able to do the escape it so badly needs to develop its own life, this means it would have to decide to wait another 3times of its current lifetime/age just to securely be able to leave for real and start with developing its own life while the abusers have plenty of time to go on damaging the victims life, body, mind and soul. Also please be aware that countries exist where government is running (as in organising, financing and protecting from any justicial consequences) projects that involve getting hands on helpless kids, handing over those helpless kids to known previously convicted pedophile sex abusers (explicitly selected because(!) of the criminal record as a pedo sex abuser…), then protecting the abuser as well as the knowledge about the explicit handover “to a selected known child abuser” from the public knowledge while presenting “protecting the child” as the official reason for not making details public or even investigating how suizidal (i.e.) that kid actually is.

    That victims in general should seek help in such official child"care" facilities (which were the ones known to do the handover to the abusers) would not only be a slap in their face but could also might pose other serious threats to them. Already knowing a little bit how to handle and prevent worse abuses by that first abuser but beeing faced with a new unknown “parent” that is abusive too but maybe in other ways, is a huge risk and might get them in additional trouble just because they would have to start try protecting themselves but again with no knowledge about the new threat they are confronted with.

    “Officially” stopped (as in “a single one” of those child"care" offices has only stopped doing the handovers) projects tend to go on very long (just look how long we still have pirates on the seas despite the british crown and others took back those “letters of marques” once payd by a gov, a legalized crime will go on for centuries especially if the abusers happen to be protected by gov) From that stopped “handover helpless childs to convicted pedophile sex abusers” project (kentler “experiment”) up until now AFAIK not a single child has been rescued so far (thus the project continues with happy abusers and likely suicidal thinking victims)

    So in some lesser civilized countries (which usually thrive to call themselves the most civilized…) the official childcare much more looks like a real trap to face even more abuse.

    Some abusers build psycological traps for their victims like offering help but turn it into desaster then making the child (or even adults) responsible for any bad outcome (wich might as well be preparedly forged bad outcomes by the abusers. mind control bastards are in fact evil). Such experience could harm the victims overall acceptance of ‘help’ from anyone, effectively preventing offered true help from beeing accepted.

    Now say what to choose where an abused child “should” turn to “in general” and how the help has to be organised and offered to those children to actually help.

    Social workers often say that every abusive situation is very special while at the same times the schemes are often very similar.

    No matter what, the solution is never easy unless the abuser dies by a true accident or real health issues and luck lets the child find (luck no2) someone really trustworthy - no matter by which way. When thinking of humans and eternal life the point of abusers never dying is the one point where i would say if abusers could also live forever in case that humanity in general could, then it would be better humanity in general could not live forever.

    But also love IS part of human beeings, loving someone else makes us feel better and also heal a bit, pple say that sharing comes back twice and i think this is part of it. We humans do need to care for someone else or we get illminded, maybe feel the need of becoming richer and richer, more powerful and even more powerful every day, may it be in politics or in controlling other peoples lifes or minds effectively abusing them, becoming an abuser or such) that is loosing ground in our own minds and loosing real control over ones own life then sometimes raises the need to control others instead if that seems more easy or maybe more realistic or maybeveven pleasant, i don’t know. Maybe the love given by abused victims to their abusers is just that, keeping themselves sane, even if that sounds insane by itself, but given the circumstances sometimes could seem to be the smalles loss while loosing a whole life but just “not yet” every day :( which i see as a whole-life torture.

    Thats about the main parts of what i think why, not a single reason but a bunch of maybe’s one worse than the other.

    this is part 2 of 2


  • the “love” part is - as always - difficult to define. its a word widely abused by those who abuse in other ways anyway, while in non-abuse circumstances, “love” is kind of a word without clear definition. In some aspects this is very similar to love itself - as love has many ways and facets to it that can vary greatly - okay, but that possibly is only a thought fed by a lack of a more precise language and overall use of way too generic words.

    A young child that is abused might not have experienced love in its short lifetime, yet it might use the word it once heared in different context out of just trying to get word meanings - that is learning to speak - or trying to figure out what could stop the abuser from abusing it, while their abusers might personally use the word “love” instead of “abuse” because abusing others - for the abuser - might be the one thing which makes them feel something that most closely matches what others say about how love feels. For the kid, love then is a wierd word with very contradicting meaning, which in turn would be said to be so by nearly all adults, but mostly for other reasons. Please try to be more precise when talking about serious love questions about abusive contexts =) let me now do a step aside to the literally cold part of the world. One knows snow and ice, but i once read in a documentation that some culture in an icy region has 32 words for different types of ice and snow for their daily use and i assume that this happened due to the need of definition what type of snow to expect ‘over there’, or maybe “tomorrow” or in discussions where to settle or how to reach a site… that is having only one word that has to fit-them-all yet beeing so important and prone to be abused(abuse of the word here) it seems to me that the lack of words for defining a bit more precisely if it is loving like a (non-abusive) mother loving like a real friend loving sth like an enthusiast … could probably have a slightly bigger role in the overall problem than anticipated in general.

    but yes, the brain is programmable, you do it when learning to ride a bicycle. Social programming may work differently, but is also possible. See how many people are trained like apes to always shout how great their country is, how civilized etc they are, yet if you really look it, all the lies just stinc horribly and that so called civilisation is very far away from beeing civilised. yet all the programmed apes prodly shout the greatness does not even exist there, but maybe it exists in their dreams (only)…

    but now to answer the question with what i personally think:

    while the mind is still developing to actually come into existance, conciousness still is a rare visitor as it comes into play and drifts away again without having a way to make it stay, one has only few things randomly choosen that can be directly remembered and huge parts of time inbetween conscious moments which start with a fast-forward in time while the inbetween is like the memory of a bad dream, blurred, not in order etc, but yet is the actual reality consciousness then stepped into. Stepping in of not yet developed consciousness may also have an incontrollable timing of stepping in-and-out, making decisions very urgend to do before blurrtime starts again and consciousness stepsl out. While not having consciousness at hand alltime, one can - during conscious times - only act or even think so little until unconscious time of “instinc-only” starts again. Again in nonconcious time contra-abuse actions cannot be performed or even thought of. body screams in pain, making the abuser causing more pain to victim which causes body to scream more until finally passing out. however thinking how to get out is only available in moments when the currently developing consciousness actually steps in again which can be quite short and not so easy to predict when that happens or when it ends again.

    In later stages where consciousness - while not fully developed - at least is nearly alltime available -that is until passing out of course- actions can be adjusted to like not(!) crying in pain when waking up from passing out (while still beeing abused though) so to disrupt this specific downward spiral of screaming-is-punished-by-more-abuse.

    In later stages when beeing able to observe the little hints of psychological instabilities of the abusers and their “abuse triggers” a “profile” becomes visible -that is when the victim has sort of a years long running statistics about that broken abusers “personality” not because the victim wants to make statistics but because of intentionally forgetting things is just not yet available to the under-stress-developing personality / brain functions of the victim as same as also intentionally remembering things (in general or circumstances related) too is a not yet available brain function. Also some parts of a more developed brain hide horrible experiences from consciousnes while other parts try to reach the memories to not only complete development but also to maybe find solutions to get out of the danger by analyzing memories of what happened when and why, when did it stop and maybe what caused the stop so one can start to handle it somehow. So it all forms a rather horrible yet “luckily incomplete” statistics done under stressfull fight against oneself then later called maybe hust “experience” or trauma etc. while the victim should learn to cope and handle and develop its own body or brain functions or even personality, to prepare for life, it is >500% overload-occupied with learning to cope with the junkyard of the abusers “personality” to prevent the small quantum fluctuations in the inbalances of the abusers psycholigical radioactive mess to avoid at least passing out due to abuse. trying to prevent the abuse is then the only available way of trying to survive, which is also instinct driven and surviving is n1 priority of the child, that is if course unless the child develops suicidal thoughts as a result of abuse. If and only if the victim somehow survives this mentally and becomes capable of doing the splits (mind, not sports) it is then eventually able to try to analyse how it could be possible and plan ahead solving the problem by maybe leaving forever or maybe finding other solutions, beeing on a constant lookout for what might bring security instead of learning to live or enjoying life let alone build up his life. Children don’t know what possibilities society in general offers or the risks child"care" offices pose to them (neither the other way around). They only rely on that little they know which is only their own experience and the “experience” of all ancestors combined and inherited in “instincts”, which are both unreliable in such cicrumstances: instincts are sort of predictable by adults and often abused by abusers thus bad to rely on in an abusive context when still a child. The own experience is still very little, likely poisoned by abusers and logic (brain instinct?) also needs all relevant variables to make good decisions while the lack of experience causes a lack of knowing what variables would be relevant or do exist at all also again likely beeing poisoned by abusers. Decisions are made out of the visible(!) possibilities which are likely also intentionally reduced overall by abusers for this very reason maybe by cutting the cholds connections to others, telling the child that those neigbours were very evil persons etc.

    Some types of abusers intentionally destroy their victims believe in themselves. this makes it very hard or impossible for the victim to get out on his own, sometimes the victims mind may even start to think (what narcisists heavily work on to achieve) that the current abusive situation was the best possible outcome of their life, which then stops the “want” of leaving the abusive context as result of the psycoligical trap the abuser intentionally layed.

    Also leaving abusive circumstances always is risky, and one should be thoughtful about risky decisions in general, right? Obviously abusers already are ok with substancially harming the victims body, mind, life and soul. Also they usually fear to face consequences (not sociopath or psychopath they don’t fear consequences), some would rather completely destroy the life of their victim than facing the consequences of their actions. Narcisists would probably make the friends of the victim believe the narcisist was the victim and the victim was the offender, deliberately destroying all friendships A sociopath would probalby cause unimaginable damages of any type to the victim not preventing even damage to himself, while a psychopath would maybe kill the victim for any reason including removal of evidences. Considering all of this does not make “leaving” abusive situations an easygoing task but a decision that can possibly and realistically end very horrible. Additionally victims might fear to get similar punishments from others when telling the truth so in fear might not even tell the truth when help would really be at the tip of their nose. Then saying weird things could be such an instinct kicking in and maybe not(!) a thoughtful decision. Saying such things (out of trained fear) that protect the abuser or even add insult to the victim itself (as trained by the abuser that the victim always has to insult and calling itself beeing responsible for all bad things or face even worse punishing) might also affect the victim to start to believe really untrue thing about itself. Most people struggle to get out if a single devils-circle, but what if a second circle was added?

    this is part 1…


  • its amazing how good services can be if some just skip the corporation-obligatory adding of enshittification. i remember an article about a downloadable (but not very legal) DVD with an installer for a (worthless but very popular) OS that included heaps of expensive industry software and the installer was point-klick what you want and then all is done in background and fully usable once done. reading that article it seemed to be a better installer than ever produced by any company for any product.

    however as that payed streaming service seemingly leaves huge amount of bank records and ran for such a long time, i guess it would have been easy to stop their customers from paying them. it rather might seem that the real intentions of content corporations might not truely be what they officially claim. maybe we learn in 25 years that the content corporations really were behind such services, maybe like “better get money from ALL markets!” or such.


    • The good’ol cursing seemed to work without radio or someone actually listening
    • it seems boeing was already cursed with parasites in high positions. not sure if additional cursing could actually increase a long painful death curse by anything other than its duration.
    • The “pick them up” they’ld rather want, does not work through radio yet, rescue missions for biological personnel sadly still need to be made of/by solids.
    • unfortunately radio is a bit flawed during the plasma phase of reentry, while i think the plasma phase ‘is’ the reentry, before is only getting closer, after its basically flying or gliding/falling down, maybe parachuting. the plasma is a bit of a barrier for radio signals they said long ago. however i was quite surprised to see a new "documentation’ lately about the columbia shuttle during reentry where i was sure the original documentation said that they were in the no-radio phase due to plasma while the new ‘documentation’ said they could communicate through radio even seconds before the destruction of the shuttle, the new documentation even showed they had sensor metrics about first sensors to measure high temp while afaik those sensors were initially later installed only “because” of the aftermath for this very nasa failure … so could be that also the informations we got from tha liers about the plasma phase is also a bit “flawed”.
    • last, i’ld guess that they don’t have equipment for amateur radio frequencies on board, all involved are picky about overall rather “deadly” leaking of informations important for the public.

    so to answer your question: my guess is no one will.


  • the “news” i “know” about india is little, some historical “facts” written mostly by uncivilized brutish invaders compacted to youtube videos by part or fulltime streamers. Some other “facts” which sound often bad i sometims mostly have from official media known to promote any “nice” propaganda - that is, depicting other countries worse than the own one so that people do not hunt their own gov with garden forks just to stop the crimes. Well i really “know” nothing about India.

    But beeing proud of culture usually is a good thing, but that is only if it is culture and as such does not(!) base on abuse or similar.

    Maybe what you experience could be a crowd effect that protects the people from seeing what they (group, society) do wrong while at the same time it protects the worst wrongdoers from punishment or at least from getting stopped. Such as it could be a self-sustaining downwards spiral taking more and more and everything down with it slowly increaaing pace. At least what you wrote sounded a slight bit chilling like that.

    It could be hormones and how culture tells you to act or not act on them, or a lack of culture about such, maybe a combination of culture to “support your group” while that support does not always protect integrity of the overall concept of what that culture was meant for. A group of people cheering to each other how good they are might not want to stop cheering for “minor reasons” because it just feels good. While doing wrong things they could “help” each other (which is supposedly a good thing but can do lot of harm too) with arguments that this wrongdoing would be ok or even "good’ in this specific moment because of <insert_bullshit_here>. alltogether spiralling downwards doing so more often every day. So all of them can go on wrongdoing while feeling well supported or even falsely feel superior in general.

    however a figure (real/not real?) well known in india once said something like “it is better to calm down and just do your thing than to overreact”. (this is the shortes version i’ve ever tried to compact it to but maybe you get the idea anyway).

    I know for a fact that this is not true,

    i don’t know the underlying things that make it a fact, plz share.



  • 🤔 maybe there is a lack of distributed fediversed search engine instances where:

    1. everyone can host a search engine for their very own pages
    2. everyone can crawl other pages and provide (maybe with permissions) the crawled data to other search engines (as compressed snapshots, api …) or provide a search engine by themselves for all.
    3. such search engines can be ranked or marked with “has anti features xyz” and put into followable ‘collections’ per topics.
    4. possibility to add 3rd party rankings and filters, so that one can use only a subset of a search engine list that was pieced together by someone you know or trust, reduced by rankings or filters published by another one you somehow trust to limit the items in the first list.

    then: “for software development i use linuz personal ‘devel’ collection, this way i don’t have to manually click through big G’s gigabytes of SpaMalAds they always only frustrate you with and i am not distracted with dyo stuff when searching for server administration things like ‘puppet stages howto’. for my home projects i use my friends ‘home of DYO’ collection, i get more results than i need but get new ideas as well without seeing work stuff when looking up how to build a puppet stage for my little one. 👨‍👧 for kids its awesome, our school provides a collection including specialized search instances that fit learning, while that collection is also peer reviewed by a company that spezialized to ensure it does to not contain search engine instances that also index any unfitting content pages.”

    oh btw: no i do not have any info about duckduckgo status unfortunately, i stepped over it by myself today 🤷‍♀️


  • that a moderately clever human can talk them into doing pretty much anything.

    besides that LLMs are good enough to let moderately clever humans believe that they actually got an answer that was more than guessing and probabilities based on millions of trolls messages, advertising lies, fantasy books, scammer webpages, fake news, astroturfing, propaganda of the past centuries including the current made up narratives and a quite long prompt invisible to that human.

    cheerio!


    1. i am sure you won’t pay for it if my laptop disappears this way (if yes, lets make a contract with a lifetime “fee” of 0$ i pay you whilst you pay for everything that got stolen from me in a plane)
    2. ppl with kleptomania do travel too
    3. how could you know? you are not talking about you and your colleagues or such?
    4. such statistics were made by those who benefit from planes looking more safe.
    5. “work and travel” vs “steal and travel”, which is more likely be done by a thiev?
    6. not all theives “need” to steal, some just do so because they can, others maybe because its family tradition.
    7. sometimes it could be more important that nobody could possibly put something into(!) your bag (and remove it later) to let you get it through customs for them, those arguably “would” buy such tickets to do so, as it’s probably part of their income, but i guess thats only a problem when flying in or out of countries with big illegal drug imports.
    8. <something i forgot>

  • smb@lemmy.mltoAsklemmy@lemmy.mlWhy stand in line to board an airplane?
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    3 months ago

    I see only one reason, why i would want to be early at the seat. its bcs if i am not, my backpack might be placed above but multiple seats away by the crew, where it is then uneasy for me to have an eye on it whilst easy for theives to take and open them, especially on long flights there would be plenty of opportunity like when everyone is sleeping.

    but for this case i use locks on the backpack anyway, so that anyone who wants to open it, either opens it where nothing of value is in it thus no lock, or at least has a much harder time than when trying the very same with other bags…

    also on longer flights i usually did not have that problem, but that could also have been just luck


  • hm you have a point that it might not have been removed completely, but the problem with that point that i personally have is that this reached me too late to just believe it was really never removed. For some reasons i would not believe blindly in “evidences” that are in control of the one that is in question and could manipulate it later for such claims and also was experienced to not be trustworthy for what they say…

    saying that, there are ways to check if something was there at a time or not. the one source i know that could help here only seems to store records from 29th jun 2023 18:44:33 onwards which is too late for this.

    https://web.archive.org/web/20240000000000*/https://abc.xyz/investor/google-code-of-conduct/

    you are right, it does not make a difference in if they can be trusted, but it makes a difference in why not and what to expect if you do so despite the red flags or -as a gov- just let things go on. A person who by accident was speeding should maybe be treated differenrly than a person who intentionally(!) does so while risking others lifes. and what would be more proof of intention than a written statement or removed canary? thus such a statement does make a difference in terms of they just cannot handle their stuff, don’t care at all or maybe even have evil intentions.

    examples:

    some kids making a fire in the forest cause they don’t know the risks

    vs.

    some young adults making a fire in the woods cause they just don’t care despite knowing the risks

    vs.

    a company making fire in the woods because its cheaper to do stuff there and they lack the resouces to do it safe and someone else will pay the firefighters anyway.

    vs.

    a company stating to want to do so cause they like it despite they could afford doing it secure but just no one could or would sue them anyway.

    while i don’t want to say google is like no.4 here, to me these examples all make huge differences, no matter if the woods actually cought fire or not.


  • my idea currently is to finish some projects that have priority and afterwards then look for lineage os on raspberry pi, combined with gsm modem and maybe a gps module, all powered by a slim powerbank. might make up a huge bulky phone but i almost want to start building it now. On the other hand if i wait until my other projects are finished, the whole thing might be ready made available for self assembly…


  • smb@lemmy.mltoPrivacy@lemmy.mlWhat are the risks of sharing DNA?
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    3 months ago

    All who could have an idea of what to do with it could seek a way to get that data out of every company or gov that have it for their specific reasons, no matter if data was collected lawful or not, or if access to the data is then lawful or not.

    1. search for source of evidences on crime scenes: if one of your relatives happened to have been (related to crime or just bad luck) at a place where later on some evidence was collected, you might cause trouble for them bcs your data is very similar to theirs and that is obvious to laboratories. depending on the the “later on” current state of technology it could affect relatives more than two or three steps away from you. if you live in a country where law enforcement gives a shit about truth and just seeks for one argument to punish just anyone they can point a finger at, that could become a huge problem for the whole family then just because there was data that could have been abused.
    2. illegal organ traders could - once they have access to your data - think you or your relatives could be a source of nice income if a client of theirs happen to pay enough. however you will probably never know as the illegal organ traders are unlikely to ring the doorbell to ask nicely for a contract. How much do you think would a richie in personal needs pay for “spare parts” if those who deliver them wants him to just never ask where it came from ? does it matter if such organ teaders could know a “compatible match” by data only? maybe not because they might know tomorrow or someone might put up an AI to do the matching (does it matter if that matching by AI is correct then? i guess such traders don’t really care and their customers probably, but wouldn’t that be possibly too late then?)

    For me the latter is actually enough to not willingly give my DNA data to anyone. for no reason. gov might already have it (covid probes had been collected and frozen at least) but actively pushing your data out inzo the world would be insane IMHO.

    Laboratories often use Microsoft Windows, Microsoft Active Directory and Microsoft Exchange, thus i personally see no reason to NOT believe that any data they have received once in time would - sooner or later - end up rotating uncontrolled in the hands of uncountable criminals waiting for any chance to make quick or huge money out of it.


  • looking at the official timeline it is not completely a microsoft product, but…

    1. microsoft hated all of linux/open source for ages, even publicly called it a cancer etc.
    2. microsoft suddenly stopped it’s hatespeech after the long-term “ineffectivenes” (as in not destroying) of its actions against the open source world became obvious by time
    3. systemd appeared on stage
    4. everything within systemd is microsoft style, journald is literally microsoft logging, how services are “managed” started etc is exactly the flawed microsoft service management, how systemd was pushed to distributions is similar to how microsoft pushes things to its victi… eh… “custumers”, systemd breaks its promises like microsoft does (i.e. it has never been a drop-in-replacement, like microsoft claimed its OS to be secure while making actual use of separation of users from admins i.e. by filesystem permissions first “really” in 2007 with the need of an extra click, where unix already used permissions for such protection in 1973), systemd causes chaos and removes the deterministic behaviour from linux distributions (i.e. before systemd windows was the only operating system that would show different errors at different times during installtion on the very same perfectly working hardware, now on systemd distros similar chaos can be observed too). there AFAIK still does not exist a definition of the 'binary" protocol of journald, every normal open source project would have done that official definition in the first place, systemd developers statement was like “we take care for it, just use our libraries” wich is microsoft style saying “use our products”, the superflous systems features do harm more than they help (journald’s “protection” from log flooding use like 50% cpu cycles for huge amount of wanted and normal logs while a sane logging system would be happily only using 3%cpu for the very same amount of logs/second whilst ‘not’ throwing away single log lines like journald, thus journald exhaustively and pointlessly abuses system resources for features that do more harm where they are said to help with in the first place), making the init process a network reachable service looks to me like as bad as microsoft once put its web rendering enginge (iis) into kernelspace to be a bit faster but still beeing slower than apache while adding insecurity that later was an abused attack vector. systemd adding pointless dependencies all along the way like microsoft does with its official products to put some force on its customers for whatever official reason they like best. systemd beeing pushed to distributions with a lot of force and damage even to distributions that had this type of freedom of choice to NOT force their users to use a specific init system in its very roots (and the push to place systemd inside of those distros even was pushed furzher to circumvent the unstable->testing->stable rules like microsoft does with its patches i.e.), this list is very far from complete and still no end is in sight.
    5. “the” systemd developer is finally officially hired by microsoft

    i said that systemd was a microsoft product long before its developer was then hired by microsoft in 2022. And even if he wasn’t hired by them, systemd is still a microsoft-style product in every important way with all what is wrong in how microsoft does things wrong, beginning with design flaws, added insecurities and unneeded attack vectors, added performance issues, false promises, usage bugs (like i’ve never seen an already just logged in user to be directly be logged off in a linux system, except for when systemd wants to stop-start something in background because of it’s ‘fk y’ and where one would 'just try to login again and dont think about it" like with any other of microsofts shitware), ending in insecure and instable systems where one has to “hope” that “the providers” will take care for it without continueing to add even more superflous features, attack vectors etc. as they always did until now.

    systemd is in every way i care about a microsoft product. And systemd’s attack vectors by “needless dependencies” just have been added to the list of “prooven” (not only predicted) to be as bad as any M$ product in this regard.

    I would not go as far to say that this specific attack was done by microsoft itself (how could i ?), but i consider it a possibility given the facts that they once publicly named linux/open source a “cancer” and now their “sudden” change to “support the open source world” looks to me like the poison “Gríma” used on “Théoden” as well as some other observations and interpretations. however i strongly believe that microsoft secretly actually “likes” every single damage any of systemd’s pointlessly added dependencies or other flaws could do to linux/open source very much. and why shouldn’t they like any damage that was done to any of their obvious opponents (as in money-gain and “dictatorship”-power)? it’s a us company, what would one expect?

    And if you want to argue that systemd is not “officially” a product of the microsoft company… well people also say “i googled it” when they mean “i used one of the search engines actually better than google.com” same with other things like “tempo” or “zewa” where i live. since the systemd developer works for microsoft and it seems he works on systemd as part of this work contract, and given all the microsoft style flaws within from the beginning, i consider systemd a product of microsoft. i think systemd overall also “has components” of apple products, but these are IMHO none of technical nature and thus far from beeing part of the discussion here and also apple does not produce “even more systemd” also apple has -as of my experience- very other flaws i did not encounter in systemd (yet?) thus it’s clearly not an apple product.



  • Before pointing to vulnerabilities of open source software in general, please always look into the details, who -and if so - “without any need” thus also maybe “why” introduced the actual attack vector in the first place. The strength of open source in action should not be seen as a deficit, especially not in such a context.

    To me it looks like an evilish company has put lots of efforts over many years to inject its very own overall steady attack-vector-increase by “otherwise” needless increase of indroduction of uncounted dependencies into many distros.

    such a ‘needless’ dependency is liblzma for ssh:

    https://lwn.net/ml/oss-security/20240329155126.kjjfduxw2yrlxgzm@awork3.anarazel.de/

    openssh does not directly use liblzma. However debian and several other distributions patch openssh to support systemd notification, and libsystemd does depend on lzma.

    … and that was were and how the attack then surprisingly* “happened”

    I consider the attack vector here to have been the superlfous systemd with its excessive dependency cancer. Thus result of using a Microsoft-alike product. Using M$-alike code, what would one expect to get?

    *) no surprises here, let me predict that we will see more of their attack vectors in action in the future: as an example have a look at the init process, systemd changed it into a ‘network’ reachable service. And look at all the “cute” capabilities it was designed to “need” ;-)

    however distributions free of microsoft(-ish) systemd are available for all who do not want to get the “microsoft experience” in otherwise security driven** distros

    **) like doing privilege separation instead of the exact opposite by “design”