• 0 Posts
  • 32 Comments
Joined 11 months ago
cake
Cake day: August 18th, 2023

help-circle



  • That’s why I put “real threat” in quotes ; I was paraphrasing what I consider to be the excessive focus on FR

    I’m a security professional. FR is not the easiest way to track everybody/anybody. It’s just the most visible and easily grok’d by the general public because it’s been in movies and TV forever

    To whit, FR itself isn’t what makes it “easy”, but rather the massive corpus of freely available data for training combined with the willingness of various entities to share resources (e.g. Sharing surveillance video with law enforcement).

    What’s “easiest” entirely depends on the context, and usually it’s not FR. If I’m trying to identify the source of a particular set of communications, FR is mostly useless (unless I get lucky and identify, like, the mailbox they’re using or something silly like that). I’m much more interested in voice identification, fingerprinting, geolocation, etc in that scenario

    Again, FR is just…known. And visible. And observable in its use for nefarious purposes by shitty governments and such.

    It’s the stuff you don’t see on the news or in the movies that you should really be worried about

    (and I’m not downvoting you either; that’s for when things don’t contribute, or deserve to be less visible because of disinformation; not for when you disagree with someone)


  • I know what you’re arguing and why you’re arguing it and I’m not arguing against you.

    I’m simply adding what I consider to be important context

    And again, the things I listed specifically are far from the only ways to track people. Shit, we can identify people using only the interference their bodies create in a wifi signal, or their gait. There are a million ways to piece together enough details to fingerprint someone. Facial recognition doesn’t have a monopoly on that bit of horror

    FR is the buzzword boogieman of choice, and the one you are most aware of because people who make money from your clicks and views have shoved it in front of your face. But go ahead and tell me about what the “real threat” is 👍👍👍




  • oh I see, you just suck at reading comprehension

    Please go reread the post you replied to. Nobody, myself included, “decided it had to be about the US”. They asked a question. They wanted to know if it could be malicious, and the thing that made them think about it was the fact it’s Super Tuesday.

    The only thing I’ve ever been arguing is that it is reasonable to think about whether BGP could be abused for malicious intent when you realize it’s Super Tuesday. That’s it. It’s a reasonable connection to make that would precipitate the question. They didn’t even ask “is this because it’s Super Tuesday?”

    But go off, chief. Can’t pass up a perfectly good opportunity to let your angst out


  • This is an example of how you can make factually true statements that are contextually irrelevant.

    When a major outage occurs on the day in US politics when 15 states all vote for their party nominees, it’s not unreasonable to question whether there was malicious intent.

    You’re like a “not all men” or “all lives matter” person barging into a conversation, hijacking a perfectly reasonable discussion to push your agenda. Just stop.


  • Ahhh yes, let me just get all of my brothers’ business’ account’s followers to switch to telegram. I’m sure they’ll all be willing…

    “Just use something else, duh!” is ignorant. Not everyone uses social media to just post memes and argue with strangers. Some people use it for making money, or for access to support resources, or for a specific community that is important to their well-being.






  • Sometimes redundancy doesn’t help when it comes to network traffic routing. That system is based heavily on trust and an incorrect route being published can cause recursive loops and such that get propagated very quickly to everyone.

    There was a case like this a few years back where a bad route got published by a small ISP, claiming they could handle traffic to a certain set of destinations, but then immediately trying to send that traffic back out again (because they couldn’t actually route to that destination), which bounced right back to them because of the bad route. It was propagated based on implicit trust and took down huge chunks of the Internet for a while