Archives work against information control. “Who controls the present now controls the past”. They wouldn’t like archived versions of things get in the way of their very, very expensive narratives they are pushing, now would they?
He/Him, Anarchist/Communist Front End Developer, originally from BC, currently in coastal Albania. Perpetually looking out for my next exchange community empowerment project across the globe.
Archives work against information control. “Who controls the present now controls the past”. They wouldn’t like archived versions of things get in the way of their very, very expensive narratives they are pushing, now would they?
All this is speculative of course, but those domains you listed are vanity domains in lucrative markets. I call them vanity domains, because it can easily set you back 3-4 figures to get a domain like me.blog , let alone yourname.cars which is quite desirable if you sell cars. As with everything else, domain prices are simply subject to the laws of supply and demand.
Regarding .io , compared to average country code domains, such as .de for example, that tend to be quite modestly priced, .io has seen substantial increase in the past 5 or so years, transformed from a geeky exoticism to a symbol of AI-hype tech companies.
At least from my perspective.
As an innocuous example of sharing data with pure bash and Arise, these people here have preserved the Trigedasleng dictionary, the fictional language from the science-fiction/young adult show The 100, after another fan site was taken down. They use a github repo as data backend, and Arise as a static-site generator for github pages. All their data are stored in lots of version controlled JSON files instead of a database. According to the authors, this democratizes the process of forking and adding data to the repository.
I think Arise is sth I had seen and at the time motivated these thoughts. It is a bash based static site generator, that, according to its docs, it is build with the philosophy of minimal language requirements as well as other dependencies.
I would argue that a solution like this is better than heavily nested JSON files, or a cascade of Ordered Dicts in Python, or even a db.sqlite that would require the user parse or query the data somehow. In fact, a user could retrieve the static site from their own distro package manager and run it in bash with minimal dependencies.
I haven’t tested this solution yet, but it looks very promising as to what I originally had in mind.
Possibly the domain is visible with a traffic monitoring tool. Everything else is between you and the bank via HTTPS. Having said that, whatever is not over https is visible to whoever sits on the same network as yourself.
This trick should come in handy pal
12ft.io/https://www.theatlantic.com/technology/archive/2024/10/sam-altman-mythmaking/680152/
Not to mention that people have jobs and use their credit cards, no way even to hide the most important personal identifying information.
Exactly, this is a lost cause. If you participate in society your essential data are simply out there. For most people the task is to minimize their footprint. If we are talking about evading mass surveillance, then we should take for granted that the person will be to one or another degree marginalized, or lead a fringe lifestyle.
Sure, I see where you are coming from. I used to be in favor of PGP as well, but I think I just was conditioned to it because it was everywhere, eg Linux repositories. The argument I found more convincing in this article is that PGP is a swiss-army knife. You might want to use it in an emergency, but professionals have special tools for each different task. In fact, the article suggests very nice alternatives for each task: Encrypt with age , sign with minisign. Two different tasks, two different tools, no need for a web of trust. Just for the arguments sake why do you think that PGP is worth it given the burden of entry?
People say this over and over “depends on your threat model” and yet people seem to have a hard time understanding that. Your threat model is “who is your adversary and what he is willing/able to do”. Your security goal is what do you want to keep from your adversary.
As others said, if you are an activist or sth important, perhaps you might want to build a working knowledge of cryptography yourself. If you just want META not being able to see your NSFW chat with your romantic partner Signal might be more than enough. In fact, people way more relevant than me also suggest that Signal is good even for bounty hunter vulnerability reporting.
Having said that, what bugs me most is that people think the instant messaging format as suitable for everything: activism, jobs, crimes, broadcasting 1970’s prog rock for extraterestrials , whatever lmao. Do you really want to use your phone for all that? Like, just carrying the phone around in the first place nullifies your other precautions, for all advanced threat models beyond privacy of non-critical social messaging.
Persistent/resourceful adversaries can eventually get to you, using a set of penetration and intelligence techniques, which means, if you are involved, the convenience of messaging your partners in crime from the phone in your pocket while waiting for a bus is a convenience you probably can’t afford.
protected by PGP
Someone here recently linked to this gem https://www.latacora.com/blog/2019/07/16/the-pgp-problem/
The article warns PGP over Email is a safety concern. They suggest Signal instead. (And several other tools to replace PGP)
I can’t help wondering what is up with all those people fighting in comments about encryption. You make the point time and again that having encrypted media is somehow suspicious. I see where you are coming from.
We know about these, because it makes headlines when it happens.
Yet, there are people here, in any similar discussion, not just this one, that keep telling us that encryption is useless because authorities can more easily break your bones than brute force your private key, and you are going to be in trouble just for having encrypted media.
Is that so? Remember the fuss when federal regulators wanted Apple to install backdoors to encrypted i-Phones? Why so? No no, bear with me, if you people are correct, then every person with an encrypted i-Phone should be in a watchlist? What about all these Linux laptops all with LUKS on the main hard drive, flying around?
How come we don’t hear about those people being prosecuted and brutalized every other day in all of these alternative media we are following?
Regarding encryption, I have a right to my fucking privacy and if you want to know what is in my hard drive, then you are the weird one. Now let’s discuss criminal prosecution. If the authorities have something on you and they need whatever is in your encrypted drive to convict you, then they do not have anything on you unless they break the encryption. The more people practicing encryption the less fruitful their efforts will be. Your argument amounts to little more than the very authorities slogan “if you don’t have something to hide”. More people using encryption should make it sink that not only people with something to hide will use encryption, and indeed, all these everyday, non-criminal people are already using Encryption in i-Phones and Linux without having their bones broken.
Yet you keep repeating this rhetoric, which seems to have no other purpose than deter people from using encryption.
Now let’s discuss brutality. If you live in a police state that can kidnap you and rough you up to forgo your protected right to privacy, then you don’t have a problem with encryption, but a huge political problem. In that case encryption won’t liberate you, but at the same time you have much bigger problems, and an entirely different threat model.
So the only thing you people could, in good faith, add to the discussion is “If you live in a police state, don’t rely solely on encryption, and update your threat model”. The other things you keep going on and on about are essentially a rebranded “if you don’t have something to hide” and they only seem designed to discourage people from adopting encryption altogether, and the fact you don’t let go can only mean one fucking thing.
This is a story from August 2023, and was covered in many outlets (I quote here NYT for reference only)
Federal regulators continued their crackdown against employees of Wall Street firms using private messaging apps to communicate, with 11 brokerage firms and investment advisers agreeing Tuesday to pay $549 million in fines.
Wells Fargo, BNP Paribas, Société Générale and Bank of Montreal were hit with the biggest penalties by the Securities and Exchange Commission and the Commodity Futures Trading Commission. Together, the brokerage and investment advisory arms of those four financial institutions accounted for nearly 90 percent of the fines, according to statements released by the regulators.
I see. Do you think it is a honeypot?
I share your sentiment. But from a technical point of view, I can’t fathom interactive maps without javascript, which is typically blocked by hardened browsers. TBF I think their cause would be better served if they open sourced their data so that people could explore them with arbitrary clients.
That’s a more accurate branding.
We reached the point were robot drivers are dicks also
Isn’t it already like that with tractors and some phones?
Some US bank got in trouble for using it internally.
I don’t think anyone took those seriously as private messengers. On another note, I think Maduro cracked down on WhatsApp as well, and called Venezuelans to cancel Meta altogether. Or something.
IA is a pillar of internet activism, and an exceptional instance of the spirit of the web pioneers. No real hacktivist would take them on. These guys are spooks, black hat, or corporate actors.