Here’s a “funny” story. Back in the day I was working (IT) for insurance companies. I’ve pitched an idea to one of the larges companies about a device connected to an OBD port to track a driver’s habits and adjust premiums based on that. I was turned down, but I heard from an unofficial source that the company was already testing such a device. That was 15 years ago.
Privacy regulations? They don't know how to handle all the data? They realized they'd have to triple rates based on the actual data they were receiving?
That's just giving up your rights from the get go. They can get a warrant to compel the fingerprint.
In this computer age, warrant requests are a button press to send a docusign e-mail to a judge, who can click the sign button while he sips his cappuccino. Make them work for it.
It makes them more money. And most of their customers couldn't even explain how their engine works. And if the customer had an actual choice they would have purchased a more expensive car without this tracking.
Hi Anth0rx, yes — I’ve looked into all of them. Here are some hot-takes:
Loginet is just a front for a cryptocurrency. It’s decentralized but not distributed. It’s primary purpose is to selling you hot air, though.
I2P can only talk to other I2P users. There are far from enough users on it to reliably use it for P2P. There’s nothing inherently wrong with it, it just never reached critical mass. The set-up process is probably too complicated for most potential users.
GNUnet has been “fixing the internet” for literally two decades. They‘ve yet to deliver anything. The software download pages clearly warns that it’s still “not yet ready”. It’s an interesting project, but it doesn’t seem to be going anywhere.
Daniel Aleksandersen 2023-07-02 15:17Z
The project change log does not indicate any work on any of the things discussed in this article. I might revisit this after the next beta release.
TLDR: Censorship resistant doesn't mean anything if they can find you and nail you to a cross
Different purposes. Tor was intended so you could access the real web anonymously.
I2p the whole thing is an anonymous web. Everybody is a node. Tracing a packet never ends because you can't be sure you found the origin of the packet. Which only gets worse the longer somebody remains connected to i2p. And it even can handle torrenting, a torrent client is built in.
The Premier League wants domain registrar GoDaddy to identify people connected to dozen of pirate sports streaming domains that broadcast live football matches. The information, including IP-addresses and payment information, could assist with enforcement efforts. In addition, the Premier League would like GoDaddy to take action against these infringements but, as far as we know, that hasn't happened yet.
Spanish football league LaLiga has asked a local court to charge the directors of Google, Apple, and Huawei in a row over an IPTV player app. The companies removed the Newplay app from their stores in 2022 to comply with a court order but LaLiga says that apps already installed on users' phones must be remotely deactivated.
People saying flip phones. But search for grey scale e-ink phones. Pretty sure they can only handle apps the company designed for them. Battery life is forever. And they can practice using their pocket computers.
For iphone brothers and sisters (courtsey of rpcameron)
You must be using an Android device. On the iPhone, 5 quick presses of the side/power button (or long-pressing power+volume) will bring up the Power Off/SOS menu; any future attempt to unlock will require the passcode. (Either action can be down without any screen interaction, meaning that you can enable this feature silently as soon as you feel it necessary.)
(Also to note for iPhones: if you choose a 7 digit or longer passcode, the entry field does not indicate how long the passcode is; the same is true if you choose an alphanumeric passcode.)
(Extra safety for those in the US if you are in a car, after doing the above stash your phone in the console/glove box; if it is within a sealed compartment not on your person additional cause/warrant is required to gain access to the device.)
Asked about experts’ arguments that Microsoft’s strategy of profiting off of cybersecurity is incompatible with a security-first mindset, Faehl says, “We would disagree with that characterization.”
Your phone isn't trackable? You avoided all the license plate scanners? Your work/home has a higher rate of accidents between them?