literature.cafe

513 readers
12 users here now
(and anyone else, really)

This is a general special interest lemmy instance focusing on lovers of all things pertaining to reading and writing and all of the people that enjoy it as well as fandoms and niches that exist within reading circles. We federate with other instances, with our local communities being focused primarily on the above.

If you want to federate a new community, go to lemmyverse.net and copy a link to a community and paste it into the search bar. Be patient!

Also, consider installing instance assistant to better navigate lemmy and find communities better! Find links to download them here: firefox, chrome, edge


Instance Rules
  1. Keep it cozy. (No -isms, bigotry, gatekeeping, or general disrespect. Just be nice!)
  2. Please, no visual porn. (Smut and discussion of smut is OK as long as it is tagged as NSFW.)
  3. No spam.
  4. Be mindful of other instance rules.
  5. Keep self-promo to a minimum.
  6. Tag AI generated content as such.
  7. Please avoid piracy.

Server Info

Registration is open with human approval, just to make sure there's no bots afoot. Approval should take less than a day (and are sometimes near instant)

Please check your spam folder for an email from noreply@literature.cafe if you are having difficulty finding email confirmation.

Community creation is enabled. When creating new communities please be mindful of the instance focus.

If you have any issues or concerns, please message an admin

Fediseer Guarantees


For those visiting from other instances, we have a community directory to make finding communities easier: !411@literature.cafe


We also have alternative lemmy UIs to use for those who want them.

A familiar UI - old.literature.cafe

Photon - ph.literature.cafe

Tesseract (photon fork with more multimedia focused features) - t.literature.cafe


Donations are greatly appreciated and go entirely to server costs but are not required.

List of Patrons Daily Uptime Ratio Weekly Uptime Ratio Average Response Time

founded 1 year ago
ADMINS
1
2
 
 

Meta tried to gain a competitive advantage over its competitors, including Snapchat and later Amazon and YouTube, by analyzing the network traffic of how its users were interacting with Meta’s competitors. Given these apps’ use of encryption, Facebook needed to develop special technology to get around it.

Facebook’s engineers solution was to use Onavo, a VPN-like service that Facebook acquired in 2013. In 2019, Facebook shut down Onavo after a TechCrunch investigation revealed that Facebook had been secretly paying teenagers to use Onavo so the company could access all of their web activity.

After Zuckerberg’s email, the Onavo team took on the project and a month later proposed a solution: so-called kits that can be installed on iOS and Android that intercept traffic for specific subdomains, “allowing us to read what would otherwise be encrypted traffic so we can measure in-app usage,” read an email from July 2016. “This is a ‘man-in-the-middle’ approach.”

A man-in-the-middle attack — nowadays also called adversary-in-the-middle — is an attack where hackers intercept internet traffic flowing from one device to another over a network. When the network traffic is unencrypted, this type of attack allows the hackers to read the data inside, such as usernames, passwords, and other in-app activity.

3
4
5
6
view more: next ›