soloActivist

joined 1 year ago
[–] soloActivist@links.hackliberty.org 0 points 6 days ago* (last edited 6 days ago)

There are many stakeholders with much to gain from the mass collection of data

Right but they need our permission because they want to hold on to power. This is what Snowden covers when he talks about cover for action w.r.t. surveillance programs. They need the anti-terror excuse. They rely on it. Where does that excuse come from? This article covers it well.

It’s not that long of a read. But I thought this was a gem worth quoting here:

One of the senators, Russ Feingold, said during the debate preceding the vote on this law [US Patriot Act]:

"There's no doubt that if we lived in a police state, it would be easier to catch terrorists. If we lived in a country where the police were allowed to search your home at any time and for any reason, if we lived in a country where the government had the right to open your mail, listen to your phone conversations or intercept your e-mail communications... the government would probably discover and arrest more terrorists, or would-be terrorists, than in the past. But it would not be a country we would want to live in."

He was not listened to by his colleagues, and was the only senator not to vote for the PATRIOT Act

I should also mention he was a democrat (not relevant to the point, but noteworthy nonetheless).

This is not to dismiss what you’ve said. But the “unthinking masses uncritically accepting the convenience” will be under the influence of the idea that anti-terror justifies it. A forced-banking policy will acquire the 55-65% you mention under that premise. The convenience of electronic payment is just the lubrication that will demotivate resistance. In fact I suspect we already have a majority believing the anti-terror narrative both as justification and the effectiveness of it.

 

The unwarranted surveillance policies that get enshrined into law and all the illegal snooping by the gov seems to trace to anti-terror legislation and anti-terror backroom initiatives. I have to wonder, is this all attributed to Israel? If the US and other Israel allies had quit supporting Israel during their oppression of Palestinians, would there be a notable terror threat that could then be the cause for action (for unwarranted snooping) under the anti-terror façade? Would bankers had been converted into police had it not been for Israel’s oppression of Palestine?

Is this why we will lose cash in the future?

Have any privacy orgs calculated how many terror incidents stem from a consequence of supporting Israel? This could even count the white supremacist nutters who attack mosques in retaliation.

What would be a more effective anti-terror policy?:

  • Snoop on everyone in every possible way. Wiretaps, forced banking, making bankers into cops, video surveillance everywhere with facial recognition.. etc.

or

  • Stop supporting Israel.
[–] soloActivist@links.hackliberty.org 2 points 3 weeks ago (4 children)

I was trying to recall where I read about that. Search is terrible. Took some digging but found it here:

https://mander.xyz/post/18090719

[–] soloActivist@links.hackliberty.org 1 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

There is no public ledger for cash. There is no attack surface on the devices of yourself or the other party by which your cash transaction can be compromised. There are no electronic records to exfiltrate unless one party proactively deliberately records a transaction. And if they do, there is no non-repudiation. There is no risk that any cryptanalytic advances can later expose the whole history of all cash transactions or even a chain of cash transactions. Cash transactions leave no trace unless you do them under surveillance.

This is the thread covering it:

https://links.hackliberty.org/post/2983664

Apparently the hospital eventually agreed to the patient not using the app but demanded the patient agree to an indemnity that the hospital would not be liable if they fail to reach him quickly.

[–] soloActivist@links.hackliberty.org 1 points 3 weeks ago* (last edited 3 weeks ago)

No issue there.. I cross-posted it today to the human rights community (which I did not know about at the time I wrote the post), since my question still stands.

[–] soloActivist@links.hackliberty.org 2 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

I don’t quite recall the context I had in mind when I wrote that post 1 year ago, but Belgium (for example) has enacted a law that all suppliers must accept electronic payment. It’s not just shops or b2b situations. It all-encompassing including self-employed freelancers. Even someone who rents part of their home out must give the tenant the option to pay electronically.

Also in Belgium: employees and contractors can only accept cash payment if they happen to work in an industry where that is common. So if you’re not (e.g.) a domestic worker, receiving cash wages is generally banned. At the same time, no matter what the situation is, a cash transaction can never exceed €3k. Buying a house cannot involve 1 euro of cash, which is strictly banned from all real estate transactions.

Many water and utility companies refuse cash. So if you consider the right to housing to include a right to water and power, then those consumers are being forced to use a bank. But that’s not apparently government force.

[–] soloActivist@links.hackliberty.org 3 points 3 weeks ago* (last edited 3 weeks ago) (4 children)

Where is this? I think if he is in China or Europe he would already be excluded from society to some extent. But I don’t believe it would be a problem in the US (of course neglecting obscure cases like that of the Georgia attorney general).

There are so few of us without smartphones that are updated Google/Apple attached and subscribed that we should be collecting the stories of exclusion somewhere.

(edit) I take back what I said about the US. I just remembered a patient who was denied medical care in the US because he did not go to the Google Playstore to install the app of the hospital.

[–] soloActivist@links.hackliberty.org 4 points 3 weeks ago* (last edited 3 weeks ago)

That link is unreachable from secure networks (tor). I can’t quite work out if you’re talking about a digital national passport, or a COVID “passport”. I suspect you mean the former.

I see no problem with border control forcing people to present a passport (or particular form thereof) if they have one. But a citizen is (or should be) absolutely entitled to enter their country, full stop. If they have no documentation at all, it would be an abuse of their rights to deny them entry on that basis. We might expect a citizen without docs to face a long inconvenient process to verify their citizenship, but it’d be a perverse injustice to deny them entry. IMO a passport should be a convenience, not a requirement.

I recall either Australia or NZ was refusing entry of their own well documented citizens if either they had COVID or were unvaccinated (I forgot which). Regardless of their COVID situation there is no good reason for denying a citizen entry. It dilutes the purpose and meaning of citizenship. Anyway, this is why I cannot be sure what passport you’re talking about.

I think the common term for “internet-izing” is #digitalTransformation. That’s the language used in the EU as they enact policy that ultimately cattle-herds people into a forced digital transformation. The quasi antithesis of that which wiser people support would be:

  • right to be offline
  • right to be analog
  • right to unplug

I kind of favor right to be analog because it also somewhat implies a right to cash and to be unbanked.

[–] soloActivist@links.hackliberty.org 16 points 3 weeks ago* (last edited 3 weeks ago) (3 children)

Indeed in Netherlands I already encountered an e-receipt-only fiasco at a cafe. They forced me to order and pay by app as a cloud order (no cash.. no paper menu either). I had a degoogled phone so I could not do Playstore and their captive portal did not work on my phone anyway. So a staff member had to lend me their phone just to be able to order. Then the order was trapped in their account. The receipt becomes more important when paying by card so I can check it against the bank statement later. They had no printer. Only e-receipts. And their app could not handle entering another email address than what the staff member already entered for their own account -- assuming I were even willing to give them a (disposable) address as I oppose feeding Google on general principle and their email provider was Google. They could not handle pulling out a notebook and writing out a receipt.

Throughout the whole fiasco the staff must have been wondering “what’s wrong with this person? How can someone be walking around in public without a recent smartphone and all the Google services?” Probably wondered if I was part of an organised crime gang.

I’m also excluded from my public library’s Wi-Fi for not carrying a subscribed SMS-capable phone to get past the captive portal. So WTF, to get wi-fi service (financed with public money) you must already be equipped with tools that are generally redundant with wi-fi to begin with. They seem to be excluding the people who would need wi-fi the most from wi-fi service.

 

All links for this story are shit -- Cloudflare or paywalls. So I linked the archive and will dump the text below. Note the difference between my title and the original. I think mine is more accurate. The AG seems to view feature phones as a tool for criminals. But also says having no phone is suspect as well, so the original title is also correct.


Georgia AG claims not having a phone makes you a criminal

That’s dangerous for constitutional rights
SAMANTHA HAMILTON
FEBRUARY 12, 2024 6:52 PM

The ubiquity of smartphones is causing some to pine for simpler times, when we didn’t have the entire history of humankind’s knowledge at our fingertips on devices that tracked our every move. There’s a growing trend, particularly among young people, to use non-smartphones, or “basic phones.” The reasons range from aesthetic to financial to concern for mental health. But according to Georgia Attorney General Chris Carr, having a basic phone, or a phone with no data on it, or no phone at all in the year 2024, is evidence of criminal intent. The AG’s position poses grave dangers for all Georgians’ constitutional rights.

Last month, Deputy Attorney General John Fowler argued in state court that mere possession of a basic cellphone indicates criminal intent to commit conspiracy under Georgia’s racketeer influenced and corrupt organizations statute, better known as RICO.

His accusation was directed at 19-year-old Ayla King, one of 61 people indicted last summer on RICO charges linked to protests in the South River Forest where the $109 million Atlanta Public Safety Training Center, nicknamed “Cop City” by its opponents, is slated to be built. The RICO charges against King and the 60 other RICO defendants have been widely criticized as a political prosecution running contrary to the First Amendment. King is the first of these defendants to stand trial.

During the Jan. 8 hearing in Fulton County Superior Court, Fowler argued that a cellphone in King’s possession on the day of their arrest, which he characterized as a “burner phone,” should be admissible as evidence of wrongdoing, even though it contained no data. He went even further to suggest that not possessing a cellphone at all also indicates criminal intent. Judge Kimberly Adams agreed to admit evidence of King’s cellphone.

Civil liberty groups are decrying the AG’s argument and court’s action as violations of constitutional rights under the First Amendment and Fourth Amendment. In an open letter to Attorney General Carr, the groups wrote, “It is alarming that prosecutors sworn to uphold the Constitution would even make such arguments—let alone that a sitting judge would seriously entertain them, and allow a phone to be searched and potentially admitted into evidence without any indication that it was used for illegal purposes.”

The Supreme Court recognized in the 2014 case Riley v. California that cellphones carry enough personal information—photos, text messages, calendar entries, internet history, and more—to reconstruct a person’s life using smartphone data alone. “Prior to the digital age, people did not typically carry a cache of sensitive personal information with them as they went about their day,” the Court noted. “Now it is the person who is not carrying a cellphone, with all that it contains, who is the exception.”

On the dark side of smartphones’ interconnectivity is their susceptibility to surveillance. In 2022, it was reported that the U.S. Department of Justice had purchased for testing a version of the Phantom spyware from NSO Group, an Israeli firm which sold its surveillance technology to governments like Mexico and Saudi Arabia to spy on journalists and political dissidents. Phantom could be used to hack into the encrypted data of any smartphone located anywhere in the world, without the hacker ever touching the phone and without the phone’s user ever knowing. The U.S. federal government denied using Phantom in any criminal investigation, but concerns about surveillance in the U.S. have led some folks to obtain basic phones.

Flip phones have made a comeback, and the potential for invasion of privacy is one of the reasons why. I’m not talking about the recent wave of smartphones that flip open. I’m talking about early 2000s-era basic phones, whose smartest feature was the game Snake or, if you were lucky, the ability to set your favorite song as your ringtone.

Folks are returning to basic phones—or in the case of Gen Z, turning for the first time—out of recognition that doom scrolling on a smartphone for hours each day is not good for mental health. For some older adults, basic phones, which offer few features beyond calling and texting, are preferable to smartphones for their simplicity. There are lots of reasons why someone might have a basic phone—not to mention they’re cheaper and more durable than a lot of smartphones.

Using simple phones that have little data on them is a legitimate, and common, practice for journalists, whistleblowers, human rights activists, and other people seeking to protect their identities or those of others from surveillance by the government or malicious actors. The Committee to Protect Journalists recommends that journalists cycle through “low-cost burner phones every few months” to maintain their safety and that of their sources. Even athletes competing in the 2022 Beijing Olympics were advised to use burner phones in light of the overreaching state surveillance in China.

Using a burner phone is not evidence of criminal intent—it’s a reasonable response to the threat of surveillance and government overreach. While burner phones are not immune from location tracking via cell towers, the fact that they contain much less data than a smartphone can make them a more secure form of communication.

How deeply invasive of privacy rights will the AG’s logic extend? Will the prosecution argue that using a virtual private network (VPN) is evidence of criminal intent? What about communicating via encrypted messaging apps, like Signal? The First Amendment protects the right to anonymous speech, and the use of privacy protection measures like VPNs and Signal has become commonplace in today’s world. The AG has already asserted in the RICO indictment that anonymous speech communicated online constitutes a conspiracy, but if the AG argues that using VPNs and Signal is evidence of criminal intent, he would be going even further by claiming that the very tools which make people feel safe to communicate online are themselves evidence of criminal intent, thereby assuming criminality before the speech has even taken place.

The position the AG has taken in Ayla King’s case has the potential to make all of us suspects. If you have a smartphone with data on it, the information on the phone can be used as evidence against you. And if you have a phone with no data on it or no phone at all, that can be used as evidence against you.

The state’s use of the absence of evidence as affirmative evidence is an unsettling development, and one that seems desperate. Is it—and perhaps the RICO charges themselves—a sign of prosecutorial weakness in a case intended to silence criticism and criminalize First Amendment expression?


(update) possible awareness campaign action: Would it be worthwhile for people who do not carry a smartphone to write to the Georgia AG to say they don’t carry a smartphone? The idea being to improve the awareness of the AG.

take action

[–] soloActivist@links.hackliberty.org 0 points 3 weeks ago* (last edited 3 weeks ago) (3 children)

Not sure what your point is. Monero is far more traceable than cash. Any self-respecting privacy advocate would fight against the war on cash first and foremost. Anything else is less important to fight for because it’s less private. When cash is gone, gold coins will probably be more private than Monero.

[–] soloActivist@links.hackliberty.org 1 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

If you try bringing 100k in cash to buy a car/house, there is a good chance it’ll get seized by police.

In the US debtors are /entitled/ to pay their debts using legal tender, and mortgages are not excluded AFAIK. In the UK, you can legally pay your mortgage with legal tender.

if you use a cell phone they know what store you went into. That can be combined with other metadata to know exactly what you’re doing. Carrying cash does not fix this.

You need not carry a mobile phone. I don’t. Cash is part of that equation. If I walk into an unsurveilled shop with cash, no phone, and no loyalty card to buy liquor, how does that get pinned on me?

It could become criminal in the future to not carry a smartphone (with the direction things are going in), but that’s not yet the case in most of the world.

 

cross-posted from: https://links.hackliberty.org/post/2667522

Apparently some company I do business with shared my data with another corp without me knowing, then that corp who I did not know had my data was breached.

WTF?

Then the breached corp who could not competently secure the data in the first place offers victims a gratis credit monitoring services (read: offers to let yet another dodgy corp also have people’s sensitive info thus creating yet another breach point). Then the service they hired as a “benefit” to victims outsources to another corp and breach point: Cloudflare.

WTF?

So to be clear, the biggest privacy abuser on the web is being used to MitM a sensitive channel between a breach victim and a credit monitoring service who uses a configuration that blocks tor (thus neglecting data minimization and forcing data breach victims to reveal even more sensitive info to two more corporate actors, one of whom has proven to be untrustworthy with private info).

I am now waiting for someone to say “smile for the camera, you’ve been punk’d!”.

(update)
Then the lawyers representing data breach victims want you to give them your e-mail address so they can put Microsoft Outlook in the loop. WTF? The shit show of incompetence has no limit.

 

Apparently some company I do business with shared my data with another corp without me knowing,

WTF?

then that corp who I did not know had my data was breached.

WTF?

Then the breached corp who could not competently secure the data in the first place offers victims gratis credit monitoring services (read: offers to let yet another dodgy corp also have people’s sensitive info thus creating yet another breach point). Then the service they hired as a “benefit” to victims outsources to another corp and breach point: Cloudflare.

WTF?

So to be clear, the biggest privacy abuser on the web is being used to MitM a sensitive channel between a breach victim and a credit monitoring service who uses a configuration that blocks tor (thus neglecting data minimization and forcing data breach victims to reveal even more sensitive info to two more corporate actors, one of whom has proven to be untrustworthy with private info).

I am now waiting for someone to say “smile for the camera, you’ve been punk’d!”.

(update)
Then the lawyers representing data breach victims want you to give them your e-mail address so they can put Microsoft Outlook in the loop. WTF? The shit show of incompetence has no limit.

(update 2)
It’s interesting to note that the FTC as well as a data breach lawyer both recommend that data breach victims take advantage of the free credit monitoring. I’m a bit surprised. As much as I want to cause the breached company to incur a cost for that subscription, it seems like a foolish move to put my sensitive info in the hands of yet another dodgy 3rd party.

 

The link is Cloudflare-free, popup-free and reachable to Tor users.

(edit) Some interesting factors--

from the article:

For a period of over 2 years, Uber transferred those data to Uber's headquarters in the US, without using transfer tools. Because of this, the protection of personal data was not sufficient. The Court of Justice of the EU invalidated the EU-US Privacy Shield in 2020.

Yes but strangely & sadly the US benefits from an adequacy decision, which IIRC happened after 2020. This means the US is officially construed as having privacy protections on par with Europe. As perverse as that sounds, no doubt Uber’s lawyers will argue that point.

The Dutch DPA started the investigation on Uber after more than 170 French drivers complained to the French human rights interest group the Ligue des droits de l’Homme (LDH), which subsequently submitted a complaint to the French DPA.

Wow! I wonder what triggered so many drivers to consult a human rights group. I mean, consider that Uber users and drivers are all happy to run a closed-source Google-gated app.. this is not a demographic who cares about privacy. So what triggered 170 complaints? I wonder if the Dutch DPA would have taken any action had there not been 170 cross-border complainants.

The French DPA gives some interesting insight. Info to attempt to satisfy access requests were in English, not French, which breaks the accessibility rule. The French article gives more a feeling of not 170 proactive complaints, but maybe the human rights org complained on behalf of 170 drivers. I am quite curious from an activist point of view if 170 drivers proactively initiated a complaint.

The fourth breach is interesting:

by not explicitly mentioning the right to data portability in their privacy statement.

Is data portability even useful for Uber drivers in France? I’ve never used Uber (fuck Google), but I imagine drivers have feedback about how well they perform and maybe they want to port that data to an Uber competitor.. but there is no Uber competitor in France, is there? Is Lyft in France?

 

I normally grab a #youtube video via #invidious onion instances this way:

yt-dlp --proxy http://127.0.0.1:8118 -f 18 http://ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion/watch?v="$videoID"

Now it leads to:

ERROR: [youtube] $videoID: Sign in to confirm you’re not a bot. This helps protect our community. Learn more

There used to be a huge number of Invidious instances. Now the official list is down to like ½ dozen.

 

This email provider gives onion email addresses:

pflujznptk5lmuf6xwadfqy6nffykdvahfbljh7liljailjbxrgvhfid.onion

Take care when creating the username to pull down the domain list and choose the onion domain. That address you get can then be used to receive messages. Unlike other onion email providers, this is possibly the only provider who offers addresses with no clearnet variations. So if a recipient figures out the clearnet domain it apparently cannot be used to reach you. This forces Google and MS out of the loop.

It’s narrowly useful for some situations where you are forced to provide an email address against your will (which is increasingly a problem with European governments). Though of course there are situations where it will not work, such as if it’s a part of a procedure that requires confirmation codes.

Warning: be wary of the fact that this ESP’s clearnet site is on Cloudflare. Just don’t use the clearnet site and keep CF out of the loop.

 

I have lots of whistles to blow. Things where if I expose them then the report itself will be instantly attributable to me by insiders who can correlate details. That’s often worth the risks if the corporate baddy who can ID the whistle blower is in a GDPR region (they have to keep it to themselves.. cannot doxx in the EU, Brazil, or California, IIUC).

But risk heightens when many such reports are attributable under the same handle. Defensive corps can learn more about their adversary (me) through reports against other shitty corps due to the aggregation under one handle.

So each report should really be under a unique one-time-use handle (or no handle at all). Lemmy nodes have made it increasingly painful to create burner accounts (CAPTCHA, interviews, fussy email domain criteria, waiting for approval followed by denial). It’s understandable that unpaid charitable admins need to resist abusers.

Couldn’t this be solved by allowing anonymous posts? The anonymous post would be untrusted and hidden from normal view. Something like Spamassassin could score it. If the score is favorable enough it could go to a moderation queue where a registered account (not just mods) could vote it up or down if the voting account has a certain reputation level, so that an anonymous msg could then possibly reach a stage of general publication.

It could even be someone up voting their own msg. E.g. if soloActivist is has established a history of civil conduct and thus has a reputation fit for voting, soloActivist could rightfully vote on their own anonymous posts that were submitted when logged-out. The (pseudo)anonymous posts would only be attributable to soloActivist by the admin (I think).

A spammer blasting their firehose of sewage could be mitigated by a tar pit -- one msg at a time policy, so you cannot submit an anonymous msg until SA finishes scoring the previous msg. SA could be artificially slowed down as volume increases.

As it stands, I just don’t report a lot of things because it’s not worth the effort that the current design imposes.

 

(cross-posting is broken on links.hackliberty.org, so the following is manually copied from the original post)


When your bank/CU/brokerage demands that you login to their portal to update KYC info soloActivist to Privacy@fedia.io ·

In the past I have only seen PayPal spontaneously demand at arbitrary/unexpected moments that I jump their their hoops -- to login and give them more info about me. I reluctantly did what they wanted, and they kept my account frozen and kept my money anyway.

So I’ve been boycotting PayPal ever since. Not worth it for to work hard to find out why they kept my account frozen and to work hard to twist their arm to so that I can give them my business.

Now an actual financial institution is trying something similar. They are not as hostile as PayPal was (they did not pre-emptively freeze my account until I dance for them), but they sent an email demanding that I login and update my employment information (even though it has not changed). Presumably they will eventually freeze my account if I do not dance for them to satisfy their spontaneous demand.

I just wonder how many FIs are pulling this shit. And what are people doing about it? Normally I would walk.. pull my money out and go elsewhere. But the FI that is pushing KYC harassment has a lot of power because they offer some features I need that I cannot get elsewhere, and I have some stocks through them, which makes it costly/non-trivial to bounce.

I feel like we should be keeping a public database on FIs who pull this shit, so new customers can be made aware of who to avoid.

 

Pushover consumers accepted “Know Your Customer” abuses to their 4th Amendment rights in the banking sector, so why wouldn’t the same work when it comes to internet service? I have no doubt that the privacy apathetic masses will accept this in a heartbeat.

 

The bank requires customers who use their phone app to:

  1. buy a new recent smartphone, repeatedly (because the bank’s app detects when it is running on an Android emulator and denies service)
  2. subscribe to mobile phone service (which also costs money and also in some regions requires supplying national ID to the mobile carrier to copy for their records which customers then must trust them to secure)
  3. share their mobile phone number with a power abusing surveillance capitalist who promotes the oil industry (Google / Totaal)
  4. create a Google account and agree to their terms (which includes not sharing software that was fetched from the Playstore jail)
  5. share their IMEI# with Google
  6. share all their app versions with Google, thus keeping Google informed of known vulns for which they are vulnerable
  7. share with Google where they bank and trust Google not to sell that info to debt collectors
  8. install proprietary non-free software and trust the security of non-reviewable code
  9. share the mobile phone number with the bank

Why are so many people okay with this?

 

cross-posted from: https://links.hackliberty.org/post/125466

My credit card issuer apparently never gets to know what I purchased at stores, cafes, & restaurants -- and rightfully so. The statement just shows the shop name, location, and amount.

Exceptionally, if I purchase airfare the bank statement reveals disclosures:

  • airline who sold the ticket
  • carrier
  • passenger name
  • ticket number
  • city pairs

So that’s a disturbing over-share. In some cases the airline is a European flag carrier, so IIUC the GDPR applies, correct? Doesn’t this violate the data minimization principle?

Airlines no longer accept cash, which is also quite disturbing (and illegal in jurisdictions where legal tender must be accepted when presented for PoS transactions).

Has anyone switched to using a travel agent just to be able to pay cash for airfare?

UPDATE

A relatively convincing theory has been suggested in this other cross-posted community:

https://links.hackliberty.org/comment/414338

Apparently it’s because credit cards offer travel insurance & airlines have incentive to have another insurer involved. Would be useful if this were documented somewhere in a less refutable form.

view more: next ›