funkiestj
Highest Rated Comments
funkiestj29 karma
do you have any amusing scuttlebut on the airtags in luggage are banned/not-banned kerfuffle? Not really your bailiwick but it might be a water cooler topic (unless you are Texas)
funkiestj28 karma
I don't think many women on the sites we looked at actually knew they were on those sites
PSA: this is why your webcam should always be covered if you are not using it and it should require physical presence (person at the computer, not a software switch) to uncover it.
Since people can't be relied upon to buy some 3rd party thing to cover the camera, laptop manufacturers should be building physical shutters into the cameras and the OS should (by default) remind you to close the shutter if you are not actively making a call.
funkiestj11 karma
Models who even have their heads cut off on ecomm sites
what, ISIS is hiring models now? I knew Mugatu was pulling the strings there!
funkiestj10 karma
so much this. As I said in another post above, the natural next step is to change hardware and software design so that the default is to have cameras shuttered when not in use. E.g. * cameras have physical shutters built in that the user can easily see when they are open/closed * software can close the shutter but not open it. opening the shutter requires physical intervention. I.e. by design, the motor that closes the shutter simply can not open the shutter.
E.g. you want to do a skype video call so you reach up and open the shutter. When the call is finished the shutter automatically closes with a distinctive (and intentional) snick.
Presto, one class (remote access trojan spying via webcam) of problem gone.
the trick her is to push HW vendors to build cameras with these features. It is simply unrealistic to expect large populations to adopt ever changing safe practices.
funkiestj39 karma
Even if your PC was invulnerable to compromise you would still be open to surveillance because most surveillance/tracking takes place in the network, not on your compromised PC. Ditto for meta data collection if you use encryption.
Now, if your PC were invulnerable to compromise and use you used a large, uncompromised TOR network, you could avoid surveillance/tracking.
View HistoryShare Link