

what would be your way of disposing that sensitive data?
not arguing that there are disks beind disposed inproperly.


what would be your way of disposing that sensitive data?
not arguing that there are disks beind disposed inproperly.


i used to work for a company with sensitive data. disks that did get a certificate, where wiped by our guys first. then a truck from the recycling/destruction company would arrive and disks get shredded 1 at a time. the whole setup was in a way, that you could observe the disks being torn into pieces, somewhat bigger than sawdust.
two of our IT guys, two of the guys doing the destroying and some C-Suit would have to sign for every disk they observed being torn to pieces. if you do want to make sure your data is gone, there are ways to do it. admittedly, this way is a bit of a stunt. but it was fun being paid for observing bits of metal being reduced to pieces.


most people can get behind parental control. that is why bad actors are pushing for age verification everywhere nowadays.
i think the issue many people have with that field is, that it enables bad actors to do things. all the while, it does not really do the thing it is supposed to do: if i trust my kid with sudo, the field can easily be altered. if i do not trust my kid with sudo, it cannot install anything either way.
with your last paragraph i (and probably most people) agree. but we already have those tools, right? at least until i knew computers better than my parents, there was no way i could install anything without them being OK with it. even when i was admin on my very own desktop, i was heavily reliant on the parents for everything costing money. yes, even my dumb ass figured out how to pirate stuff. but to do that while being afraid to brick your precious device with some virus - you need some tech literacy, which is for sure beyond changing one value.


who and what is your threat model? as @macros@feddit.org pointed out this article was probably rather accurate.
if you just want to browse anonymously - it is likely, that even the biggest tech corpos can’t de-anonymise you.
if you do small time crime, like buying and selling contraband - likely law enforcement would try to catch you in the real world. you have more vertices and vulnerabilities there, different enforcement agencies are experienced exploiting these.
if you paint a big ass target on your back and get the interest of the CIA or similar - you are probably fucked one way or the other. they may have the ability to de-anonymise you. but if you listen to people that did get caught or do the catching (e.g: darknet diaries), most of the times it is a small mistake. if you only ever play defence, that is enough to loose the game. but what are your options if your adversary is a national agency?


register is way too lenient with those lawmakers. at least link to eff.org, e.g: their resource hub about age verification. there is a whole section about how banning VPNs won’t work and is a stupid idea.


again displaying, that DRM only hurts legitimate users. a pirate has never had the problem of backing up, moving or sharing his library…


sometimes you don’t have to (or can’t) have a full plan A-Z. Sometimes you just have to start somewhere - usually with gathering ppl. euromaidan is a great example of that.
but yes, louis could have put more concrete plans in his first video. as he has them. on the other hand he probably throws many things and sees what sticks. i guess that is what you have to do, if you try to change legislation against corpos with much more everything than you.


we can argue about the choice of symbol until the world ends. the symbol is just a thing people can recognise and rally around.
the first step of any movement is to gather people. then do something. so yes, changing a picture is lazy, but it is a virtual rally point. he talks about next steps in another video: https://odysee.com/@rossmanngroup:a/you-changed-your-profile-to-clippy-now:6


lazy copy of my comment in another thread:
here, the video which started all: https://odysee.com/@rossmanngroup:a/change-your-profile-picture-to-clippy.:e
and where he goes a bit more into detail and talks about many of the points seen in this thread: https://odysee.com/@rossmanngroup:a/you-changed-your-profile-to-clippy-now:6


deleted by creator


exactly what i am talking about. age restriction at the physical store kept you away for a while, while not forcing an alternative/underground market. however, if you knew the only way to get it is on an alternative store - you would immediately have looked there.


if you can run a private server, you can get rid of all ‘phone home’ requirements.
so you just need a cracked copy of the game itself. luckily it is completely legal to remove digital locks on anything you bought in many countries (not the usa though).


age verification is just a BS strawman. do you remember when we where young? we would access stuff and find ways to buy stuff. but whenever there was a reasonable but fair gap, it would be much harder to get whatever we wanted: buying weed was so much easier, than buying alcohol (without the appropriate age).
pirating is easy (even i figured it out before having enough money to buy movies & games). so the kids will just pirate that stuff and get their way anyway. age verification at the store makes so much more sense. sure, there are ways to circumvent those. but it is a reasonable stop block.
for me and you, that is probably enough.
but you always need to know who or what is a potential threat to you. in the end it is just about making it enough of a pain for whoever might be interested in your data, so it is not worthwhile to them. having to break out forensic tools - just to get encrypted data, is probably painful enough for most. make them play puzzles with metal and glass shards will for sure open some wounds to pour salt on.
cremating disks is a thing for hacker collectives. termite is an extremely interesting thing to observe. but i am pretty sure there are more practical reasons, why people do that.