• 0 Posts
  • 14 Comments
Joined 10 months ago
cake
Cake day: June 5th, 2025

help-circle


  • i used to work for a company with sensitive data. disks that did get a certificate, where wiped by our guys first. then a truck from the recycling/destruction company would arrive and disks get shredded 1 at a time. the whole setup was in a way, that you could observe the disks being torn into pieces, somewhat bigger than sawdust.

    two of our IT guys, two of the guys doing the destroying and some C-Suit would have to sign for every disk they observed being torn to pieces. if you do want to make sure your data is gone, there are ways to do it. admittedly, this way is a bit of a stunt. but it was fun being paid for observing bits of metal being reduced to pieces.


  • most people can get behind parental control. that is why bad actors are pushing for age verification everywhere nowadays.

    i think the issue many people have with that field is, that it enables bad actors to do things. all the while, it does not really do the thing it is supposed to do: if i trust my kid with sudo, the field can easily be altered. if i do not trust my kid with sudo, it cannot install anything either way.

    with your last paragraph i (and probably most people) agree. but we already have those tools, right? at least until i knew computers better than my parents, there was no way i could install anything without them being OK with it. even when i was admin on my very own desktop, i was heavily reliant on the parents for everything costing money. yes, even my dumb ass figured out how to pirate stuff. but to do that while being afraid to brick your precious device with some virus - you need some tech literacy, which is for sure beyond changing one value.


  • who and what is your threat model? as @macros@feddit.org pointed out this article was probably rather accurate.

    if you just want to browse anonymously - it is likely, that even the biggest tech corpos can’t de-anonymise you.

    if you do small time crime, like buying and selling contraband - likely law enforcement would try to catch you in the real world. you have more vertices and vulnerabilities there, different enforcement agencies are experienced exploiting these.

    if you paint a big ass target on your back and get the interest of the CIA or similar - you are probably fucked one way or the other. they may have the ability to de-anonymise you. but if you listen to people that did get caught or do the catching (e.g: darknet diaries), most of the times it is a small mistake. if you only ever play defence, that is enough to loose the game. but what are your options if your adversary is a national agency?











  • age verification is just a BS strawman. do you remember when we where young? we would access stuff and find ways to buy stuff. but whenever there was a reasonable but fair gap, it would be much harder to get whatever we wanted: buying weed was so much easier, than buying alcohol (without the appropriate age).

    pirating is easy (even i figured it out before having enough money to buy movies & games). so the kids will just pirate that stuff and get their way anyway. age verification at the store makes so much more sense. sure, there are ways to circumvent those. but it is a reasonable stop block.