hedgehog
Apple’s Mail Privacy Protection does this. See https://www.reddit.com/r/privacy/comments/pt9ycv/apples_mail_privacy_protection/ for a post from three years ago talking about it.
I don’t know if any other major providers take this approach but Apple / iCloud is definitely one of them.
Cool, all of your images are getting fetched by the server as it receives and processes the emails. You have 100% open rate on all emails to that domain within 3 minutes of send.
What do you know about the user and their behavior? Nothing. The prefetch is not tied to their actions, therefore you cannot learn anything about their actions.
Because your friend would just be doing it out of curiosity, not as part of an investigation.
It doesn’t matter why my friend wants to use my phone. If a friend wants to use my computer, I log out and sign into a guest account that doesn’t have access to my private documents. That’s not an option on my phone. It doesn’t matter if my friend has a legitimate reason to want to look at something on my phone. Maybe they want to see a picture I took last Friday - if they tell me that, I’ll just pull it up and share it with them.
If my phone has something on it that can help the police and the police tell me what they’re looking for, I can check my phone myself and share specifically that information with them.
If my phone doesn’t have that information, I can tell them that, too.
This is the exact same as with my friends. The difference is that the police are much more likely to be antagonistic and much less likely to tell me what they want.
If the police can’t articulate what they’re looking for or if they don’t trust me to tell me what it is, then I DEFINITELY don’t trust them to look at my phone themselves. And heck, that’s true of my friends, too.
If I hand a police officer my phone unlocked, what’s stopping them from hooking it up to GrayKey or Cellebrite or some other similar tool, and dumping all the data from my phone without my knowledge - whether for legitimate or nefarious purposes? What stops them from doing this “out of curiosity?” This isn’t generally a risk with my friends, but it’s always a risk when dealing with the police.
In the US, when there’s suspicion of police wrongdoing, the police investigate themselves (and either conclude that nobody did anything wrong or that only one person did something wrong but everyone else is fine). It’s so bad that it’s a meme (“We’ve investigated ourselves and found no evidence of any wrongdoing.”) But even if you don’t have the police investigating themselves in your country, it’s still the government doing that investigation. And nothing makes the government inherently trustworthy.
As a private citizen of your country who was legitimately concerned that the police are retaining more data than necessary, could I visit the police station and ask them to give me supervised admin access to their computers (as well as the personal computers of anyone who might have had access to my device or to the data extracted from it), as well as full access to the station itself in case there are any unaccounted for computers, so that I can confirm that the police aren’t overstepping? If not, why not? It’s not like the police have anything to hide, right? And the sooner that the police cooperate and that information is shared with me, the sooner I can rest easy knowing I and my fellow citizens have not been victimized by the police.
Hopefully you see how ridiculous it is for me to expect someone to just give me access to all of that information. That’s actually less ridiculous than a police officer asking me to hand them my unlocked phone.
As a private citizen, I have to trust that police and government officials are doing their jobs properly. If they don’t, I can have my privacy invaded or be framed for a crime, with no method for recourse. And without any real accountability. I have to trust a police officer if I hand him my phone, and I’m the only one risking anything. In the opposite scenario, if I overstep while they’re supervising me reviewing their systems, they can hold me accountable immediately.
I’m a cop and I can tell you that, at least in my country, you’d have no reason to not unlock your phone if you haven’t done anything.
I can understand that in some countries cops can be seen as criminals (and are behaving like criminals), but I don’t think a generality should be made.
It sounds like you’re saying that you would assume that someone had done something illegal if they refused to unlock their phone for you. It’s a bit ironic that you then immediately say that people shouldn’t generalize about cops behaving as criminals.
I don’t let my friends go through my phone. Cop or not, why would I let a stranger?
Now they demand internet accounts to use the features of the keyboard and mouse that I purchased.
What are you talking about? Which keyboard, which mouse, which features, and which “internet accounts” are they requiring?
Also, Logitech still distributes the older software and it still works for the mice that it used to work with. My MX Vertical works with Logitech Options or the new Logi Options+ software, for example.
Did you try using that software with your new peripherals?
You can find the list by device at https://support.logi.com/hc/en-us/articles/360024361233--Software assuming this isn’t from their gaming line or something. In that case, go here instead: https://support.logi.com/hc/en-us/categories/360001764393-Gaming
Not only that, have to use wide-open-to-snooping Chrome to adjust the settings. You cannot adjust/use your mouse and keyboard if you just use Firefox.
I highly doubt that the mouse and keyboard cannot be used without Chrome.
Due to security concerns, Firefox did not implement the WebSerial API that’s most likely used to configure your mouse locally. Chrome did. It’s therefore completely reasonable that you would not be able to configure your mouse from Firefox.
That API is also supported by Edge and probably by most Chromium-based browsers, like Brave, the “Ungoogled Chromium,” etc… If you have one installed and it doesn’t work, you can probably change your user agent to trick it into thinking you’re running Chrome as a workaround. Most likely they only tested with Chrome and therefore only say they support Chrome, but don’t actually use any Chrome-exclusive functionality.
This only makes sense if they are planning (or are already) tracking my every move online to sell to advertisers or spooks.
That’s a bit of a leap.
If you use Firefox for browsing and only use this Chrome to run this tool to configure your keyboard and mouse, then even with cross-site cookies and so on unblocked, none of that will be visible from the other browser. So this makes you more isolated, not less. Having it in a browser app instead of a desktop app gives you more protection, not less.
If a company can provide a browser app to do everything a desktop app could, then they can speed up development without having to use something like Electron to distribute their app. And there’s even less friction than Electron because their don’t have to check for updates / require users to install the latest version manually, because they can just always serve the most recent one from the site. As a user, you can probably install the tool locally if you want (it’s likely a PWA) but you don’t have to, meaning you get less software installed on (or worse, constantly running in the background) on your machine.
The Keychron K2 and K6 both look solid. Starting at $70 for a Bluetooth/wired mechanical keyboard, RGB backlighting, extra keycaps for Macs / OS toggles… there’s even a hot swappable variant for $10 more (or heck, on sale for $70), option for an aluminum frame… shame they don’t run on QMK.
Oh - turns out they have several keyboards that do run QMK/VIA, like the K6 Pro.
If I used staggered keyboards for anything other than gaming, or if I didn’t already have a wireless gaming keyboard, I’d be considering one.
I don’t know that a newer drive cloner will necessarily be faster. Personally, if I’d successfully used the one I already have and wasn’t concerned about it having been damaged (mainly due to heat or moisture) then I would use it instead. If it might be damaged or had given me issues, I’d get a new one.
After replacing all of the drives there is something you’ll need to do to tell it to use their full capacity. From reading an answer to this post, it looks like what you’ll need to do is to select “Change RAID Mode,” then keep RAID 1 selected, keep the same disks, and then on the next screen move the slider to use the drives’ full capacities.
We already beat back the fascists, back in 2020 and 2012 and so on. When do you expect we’ll be able to check that one off?
We elected Biden and even had a Democrat majority in both the Senate and House until 2022. Do you mind refreshing me on what they did to implement ranked choice voting?
RCV is being banned by states quicker than it’s being adopted (and many of its opponents are Democrats) even though it wins by huge margins when people are allowed to vote for it. I’m skeptical of any argument against voting for parties with our best interests in minds until it’s implemented. I’ve been hearing the rhetoric that “this election is critical and if you vote third party, you’re throwing your vote away” since Gore vs Bush, and I don’t think it was new then, either. Lately it’s morphed into “a vote for a third party is a vote for Trump,” which isn’t even remotely how it works.
If Democrats aren’t competently opposing the fascists, why should we keep supporting them?