• 0 Posts
  • 49 Comments
Joined 9 months ago
cake
Cake day: October 13th, 2023

help-circle






  • We cant read Apples mind, so thats wishful thinking. But sending telemetry (even if hidden) means it can be used.
    Thats why e.g. Apple is using Differential Privacy for apps to use… to not have to give the Apps full access to e.g. usage data.
    Of course Apple themselves isnt necessarily bound to that system themselves, who knew…

    And why not allow other Apps to replace your default Apps if you want to? Why not have access to that Freedom?
    After all you should be able to do anything you want with your system… or maybe you dont believe in this kind of freedom. Could just buy an Android phone. Fuck the person who wants to actually own their hardware, right? How could they be so dumb and want actual freedom, haha.
    No, we play pretend while Freedom is further taken away under “Privacy” claims. Maybe that replacement battery will send your usage pattern via shortwave radio to an agent nearby…






  • Of course they are linked, but removing the username from the comments means they are mostly anonymized as far as GDPR is concerned.
    It is perfectly fine to unlink data and keep processing it, as long as its considered anonymized under GDPR.

    Your post content here is also not considered personal data, it shows up on a lookup request because its currently linked. If i crawl the page and dont save the username, the resulting data can most likely be considered anonymized under GDPR as far as the current interpretation is concerned.
    It only becomes a problem as soon as i become aware the content indeed did contain personal data or probably also if i could have expected it to with high probability.
    And i’d have to make sure to remove obvious ways to re-link the content to your user (e.g. mentions of your username in comments).

    Anything else requires precedence about ways to re-identify someone based on posts on a platform weighed against the users freedom and the difficulty of doing such re-identification.

    Recital 26 discusses when something could be considered anonymous. (or rather when gdpr would apply at all, and what it means to have anonymous data)


  • Now i dont want to defend reddit here, but afaik most comments are not subject to GDPR as long as you dont know they contain personal data and they have been detached from other personal data fields (like username).
    So by removing personal data fields, they most likely become “anonymized”.
    Of course thats not the end of it, you have to consider the available technology to de-anonymize this data for it to be legally called anonymized.

    But i dont think there has been any case where this was challenged before… and i bet most supervisory authorities would discard such complaints as being “too hard to follow through”. (i got that reply from the Netherlands authority for checking newsletter opt-in from a website)
    And i certainly dont think reddit or any operator will be forced to delete comments because they could be deanonymized depending on the content the user wrote, when most comments probably cannot be deanonymized.
    Having to check everything for potentially identifiable data in that regard would be ridiculous for website operators.
    Maybe some light checks sure, but not as deep as it would be required to truly anonymize everything that a user could have written to identify them.
    Alot of that information becomes fragments as soon as you unlink it from the user. e.g. 12 people in a post wrote “I am gay”, great. But if you cant link that back to other comments of the same users somewhere else, its not identifiable, just text.



  • As far as i understood tailscale funnel its just a TCP-tunnel.
    So you handle TLS on your own system, which makes sure tailscale cannot really interfere.

    If you already trust them this far, might aswell do the same with a VPS and gain much more flexibility and independence (you can easily switch VPS provider, you cannot really switch tailscale funnel provider, you vendor-locked yourself in that regard)

    I’d connect the VPS and your home system via VPN (you can probably also use tailscale for this) and then you can use a tcp-tunnel (e.g. haproxy), or straight up forward the whole traffic via firewall-rules (a bit more tricky, but more flexible… though not that easy with tailscale… probably best to use TCP-tunnel with PROXY-Protocol).
    This way you can use all ports, all protocols, incoming and outgoing traffic with the IP-Address of the VPS.

    Tailscale might even already have something that can configure this for you… but i dont really know tailscale, so idk…

    And as you terminate TLS on your home-system, traffic flowing through the VPS is always encrypted.

    If you want to go overboard, you can block attackers on the server before it even hits your home-system (i think crowdsec can do it, the detector runs on your home-system and detects attacks and can issue bans which blocks the attacker on the VPS)

    And yes, its a bit paranoid… but its your choice.
    My internet connection here isnt good enough to do major stuff like what i am doing (handling media, backups and other data) so i rent some dedicated machines (okay, i guess a bit more secure than a VPS, but in the end its not 100% in your control either)


  • Nyfure@kbin.socialtoSelfhosted@lemmy.worldI love Home Assistant, but...
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    5 months ago

    Many systems dont support subpaths as it can cause some really weird problems.
    As you use tailscale funnels, you really want incoming traffic from the internet. I am not sure thats a good idea for e.g. homeassistant that is limited in access anyways.
    Might aswell use tailscale and access the system over VPN.

    And for anything serious i wouldnt use something like funnel anyways. Rent a VPS and use that as your reverse-proxy, you can then also do some caching or host some services there. Much simpler to deal with and full support for such things as you then have an actual public IPv4/IPv6 address to use.
    Heck, dont even have to pay for it with the Oracle Always-Free system.


  • In an more ideal world, getting less money because people tip less, would push you to reconsider the job choice and ultimately switch to something more lucrative.
    With less workers, the company would be forced to pay more to even get employes.

    Problem with this idealised scenario is, it doesnt work in the US, because workers are getting screwed so much and have so little choices at those low paying jobs, they’d be the ones loosing massively in the short-term.
    And with little support structures my the states and federal government, they would fail… and the 2 party system would fail them even harder, noone cares about them in the government… too much invested in fighting imaginary culture wars.

    But then again, using less services of the business leads to the same outcome in the end, so even that wouldnt work well.
    The business will always win in the short-term.
    So as it is ineviteable, maybe its better to think long term anyways.

    And everyone wants tips these days, no longer just a gratitude or paying low wage workers, but now also a ‘bid’… (sure not every worker might like relying on tips, but specially well paid servers prefer it as they make bank)
    I dont see you getting iut of tipping either way very well without government intervention… which i dont see happening, but you have orher big issues too…



  • Yes, you need an organization which signs your certificate, so it is trusted by default. This is our trust-anchor so we know the certificate presented was validated and it was given only to the website owner.
    There are numerous around the world for that.
    And if that is no longer offered, you can just not have your certificate signed, which means browsers will complain about it.
    But you can trust your own certificate yourself. Or create your own certificate authority which can then sign other certificates for the community as their new trust anchor.
    I think we would very quickly build the web-of-trust, but for certificates.

    You can even not have certificates, but keep an weak form of TLS (no idea if browsers support TLS_DH_anon_*), but its still encrypted and can only be broken by an active Man-in-the-Middle-attack. (which is theoretically detectable later on)
    Diffie-Hellman is an awesome key-exchange.


  • When i was with a customer who was using one of ther VPS offers, performance was unexpectedly low and upon contacting support it was clear the small fish dont get great support answers, but rather pushed to the FAQ.

    And i personally find their offerings and marketing scummy. Big promotional prices, but always some small print with a higher price after x Months.
    Or just stuff thats not included by default.
    I never had that with other (also very cheap) providers.

    As long as it works great for you, i wouldnt see a reason to leave.
    There arent that many providers offering such small ressources at all or at such a price. To be fair, not much one can do with those specs… 10GB storage is very limited already.
    But for those specs… always free oracle tier would work too (though requires a credit card).