debanqued

joined 3 years ago
 

The two situations are kind of similar. Whether a friend is using an “Invite a friend” mechanism or they are syncing their address book, either way their shitty choice of controller is getting my personal data. And in both cases the data controller proactively implements code to facilitate the sharing.

Also seems to reinforce my previous conjecture: E-mail fundamentally incompatible with the GDPR

I suppose the difference is that invite-a-friend is purely a data share, whereas other cases are to facilitate the data subject’s use of the service.

[–] debanqued@beehaw.org 0 points 3 months ago

I would not interact on a centralised Cloudflare node like LW. But I still appreciate your suggestion because it might inspire me to check with some of these decentralised venues:

  • krabb.org/c/selfhosted
  • europe.pub/c/SelfHosted
  • lemmy.nexus/c/selfhosted
  • lemmy.rmict.nl/c/selfhost
  • selfhosted.forum/c/main
[–] debanqued@beehaw.org 0 points 3 months ago* (last edited 3 months ago) (3 children)

That looks useful for sure. Not sure what it does as far as direct PC-phone transactions but I think it would help with some of my needs.

It apparently uses a server for a lot of things, but in some cases that will be useful, such as reaching heavily restricted websites.

(edit: I don’t find the phone app.. i wonder if the jar file can run on android)

[–] debanqued@beehaw.org 0 points 3 months ago (1 children)

sideload what, exactly?

To get apps, I usually bring a tor-only laptop into a cafe and download apk files, then later sideload them using adb. But this does nothing to solve the problem I described.

[–] debanqued@beehaw.org 0 points 3 months ago* (last edited 3 months ago)

Oh, sorry about the confusion. Indeed I framed it in the context of software we need, then crossposted to relevant groups. I will adjust the title.

I should add that part of the idea is to solicit suggestions from those who have perhaps hacked something together.

 

cross-posted from: https://beehaw.org/post/23925690

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

 

cross-posted from: https://beehaw.org/post/23925690

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

 

cross-posted from: https://beehaw.org/post/23925690

the problem

The web is littered with enshitified Tor-hostile resources generally deployed with the naive idea that Tor users are criminals. The Tor community can barely function. The web is broken in countless ways and it’s not always obvious whether Tor users are targeted by the marginalisation because firewalls never state why they are blocking. Sometimes they block based on geolocation or user-agent strings, and sometimes a resource is simply down for everyone. Tor users are left assuming their exit node IP is the culprit.

Also a problem: some people actually have no Internet at home. For some it is temporary and for others it is a permanent way of living a mostly analog life.

the solution (for many cases)

Use the clearnet at a cafe with open access. Of course it’s unreasonable to haul a desktop computer into a cafe or to carry a laptop at all times, so it would be useful to send fetch orders from your PC to your phone. When the phone connects to public Wi-Fi, you tap to execute the queue of fetch orders. Then when back at your PC you download the fulfilled orders from the phone.

This could even be useful within the home, since the block or malfunction can be a number of things. A smartphone could try to execute fetch orders over Orbot, which may or may not fail. And if it fails, it remains an unfulfilled order to retry in a cafe.

Aria2 would be perfect for the underlying heavy lifting because it supports many protocols (HTTP, FTP, bittorrent), and it exists on both the PC and Android. The Android code is apparently just a backend. It’s broken or useless on its own and needs a controller such as the app proposed here.

insufficient alternatives

The usual workarounds have compromises. A VPN may or may not work but it’s still a bit far from anonimity. The VPN provider is essentially like another ISP who can snoop on you.

Download managers already exist on smartphones, but there is no seamless PC interoperability. And (AFAIK) they are just for simple files, not for webpages or Youtube videos.

There is Newpipe but it has no PC interoperability. You must search YT using the Newpipe UI.

[–] debanqued@beehaw.org 0 points 6 months ago (2 children)

Thanks. That may indeed be a good answer.

I’m confused because it claims to work offline yet it’s also p2p and uses no centralised server. Perhaps mgs queue up until both parties are simultaneously connected at some point? Guess I’ll have to study it more.

 

Ireland has their own data protection act which largely mirrors the GDPR. I first have to wonder why. Why rewrite an EU regulation, if not to do something twisted? IIUC, Ireland is part of the EU thus automatically obligated to enforce the full GDPR as-is. (Unlike Great Britain, who left the union but decided voluntarily to keep the GDPR, so they had to mirror it and rewrite some parts that are irrelevant to an EU outsider). Or is Ireland somehow outside the EU too, yet with the Euro?

Art.18, the right to restriction of processing, has been expanded from a ½ page to several pages full of loopholes and exceptions watered down to the point of data subjects not really getting this right.

Art.21, the right to object, has been torn out completely (not mirrored at all), but there is a blurb about removing the right to object specifically giving policians an exemption on election matters, and postal service matters.

If they add a restriction on the right and say nothing more on it, then I suppose that implies the art.21 right is otherwise in force, correct? It’s bizarre because other GDPR sections have been redundantly rewritten to very similarly reflect the GDPR. So I’m trying to make sense of what it means when redundancy is in place sometimes and not others. And what happens when a redundant section of code has a silent omission with no language to explicitly state intent to dishonor the omitted part.

There are some peculiar omissions from the duty of data processors as well.

I have not read it completely but I did not notice any Irish law that strengthens data protection. I only see shenanigans that work against data subjects.

Is it fair to say that tech giants love Ireland and put their HQ there for tax purposes, where the EU’s version of Silicon Valley is expected to be established, which then effectively pressures Ireland to weaken the GDPR as much as possible to maintain that attraction?

[–] debanqued@beehaw.org 0 points 8 months ago* (last edited 8 months ago)

Depends on how you define the goal. It’s not going to work like magic, all in one motion. Indeed you are right that the DPAs are not going to take remedial action on the spot. The DPAs ignore most cases that get filed by individuals no matter how solid the law and evidence is.

After dealing with deadbeat DPAs, I’ve lowered my expectations quite a bit. The DPA cannot legally ignore the complain wholly. They must file it and acknowledge it. Then they will ignore it, sure. For me, it’s about getting the valid complaint on record. Then it gets reported in the stats and metrics in annual reports and the 4-year report that the EDPB prepares for the Commission. It helps add to the collossal embarrassment of DPA inaction.

 

cross-posted from: https://beehaw.org/post/21500261

If you’re not in Europe, move along. You’re stuffed and this thread can’t¹ help you.

European email self hosters--

Tech giants screw self-hosters over by crudely blocking email on the sole basis of IP address (e.g. if the IP is residential). Before 2016, we were as fucked as everyone (in fact worse b/c European ISPs tend to block² egress port 25).

Post 2016, we have the GDPR which has an Article 22 that gives us rights against Automated Individual Decision Making. It has become unlawful to profile people on a crude discriminatory basis without human intervention. The motherfuckers “predict” that you’re a baddy/spammer based on your personal information, which wholly consists of nothing more than your IP address. It’s as unsophisticated and prejudiced as it gets. They’re not using anything intelligent like spamassassin (as the cheap bastards want to save money for their greedy shareholders by reducing processing power at your expense).

Why let them get away with it? And unless you’re a boot-licker, you don’t dance for them either. Well, to some extent you may have to implement DKIM, SPF, DMARC, etc, but it’s debatable. Either way, you do you, and if in the end MS or Google or whatever imperial tech giant empire blocks you from sending email to their server on the blunt basis of your IP address, consider filing an Art.77 complaint to the relevant DPA citing Art.22 violations.

¹ Exceptionally, some non-EU regions have created their own variant of the GDPR like Brazil and some US states (e.g. CCPA in California). But AFAIK, they are all very watered down, weak and mostly useless. Just there for show. I don’t imagine that Art.22 sentiment has been adopted outside of Europe but plz correct me if I am wrong.
² If egress port 22 is blocked by your ISP, then you’re probably fucked anyway but there are some tricks to get the block disabled (free and non-free).

 

If you’re not in Europe, move along. You’re stuffed and this thread can’t¹ help you.

European email self hosters--

Tech giants screw self-hosters over by crudely blocking email on the sole basis of IP address (e.g. if the IP is residential). Before 2016, we were as fucked as everyone (in fact worse b/c European ISPs tend to block² egress port 25).

Post 2016, we have the GDPR which has an Article 22 that gives us rights against Automated Individual Decision Making. It has become unlawful to profile people on a crude discriminatory basis without human intervention. The motherfuckers “predict” that you’re a baddy/spammer based on your personal information, which wholly consists of nothing more than your IP address. It’s as unsophisticated and prejudiced as it gets. They’re not using anything intelligent like spamassassin (as the cheap bastards want to save money for their greedy shareholders by reducing processing power at your expense).

Why let them get away with it? And unless you’re a boot-licker, you don’t dance for them either. Well, to some extent you may have to implement DKIM, SPF, DMARC, etc, but it’s debatable. Either way, you do you, and if in the end MS or Google or whatever imperial tech giant empire blocks you from sending email to their server on the blunt basis of your IP address, consider filing an Art.77 complaint to the relevant DPA citing Art.22 violations.

¹ Exceptionally, some non-EU regions have created their own variant of the GDPR like Brazil and some US states (e.g. CCPA in California). But AFAIK, they are all very watered down, weak and mostly useless. Just there for show. I don’t imagine that Art.22 sentiment has been adopted outside of Europe but plz correct me if I am wrong.
² If egress port 22 is blocked by your ISP, then you’re probably fucked anyway but there are some tricks to get the block disabled (free and non-free).

 

Art.22 ¶1 declares:

The data subject shall have the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her or similarly significantly affects him or her.

without stating who is liable for infringements. Paragraph 3 says

the data controller shall implement suitable measures to safeguard the data subject's rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and to contest the decision.

That assumes the data controller is aware of and in control of the AIDM. Often data processors implement AIDM without the data controller even knowing. Art.28 ¶1 says:

Where processing is to be carried out on behalf of a controller, the controller shall use only processors providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject.

Of course what happens in reality is processors either make no guarantee or the guarantee is vague with no mention of AIDM. So controllers hire processors blindly. When the controller is some tiny company or agency and the processor is a tech giant like Microsoft or Amazon, it’s a bit rich to put accountability on the controller and not the processor. The DPAs don’t want to sink micro companies because of some shit Amazon did for which the controller was not even aware.

As a data subject I have little hope that a complaint of unlawful AIDM will play out. It’s like not even having protection from AIDM. Article 29 Working Party wrote AIDM guidelines in 2017, but they make no mention of processors.

 

cross-posted from !gdpr@sopuli.xyz : https://beehaw.org/post/21385410

As I mentioned in another post, many data protection authorities are deadbeats. Knowing that my Art.77 complaints are in vain, my question is how the complaints might be made useful. Suppose we just use the DPA as a prop. We file an Art.77 complaint and CC the data controller a copy of the complaint.

Normally it might be a bad strategy to show the data controller your hand. But when you essentially expect the DPA to be a dead-end anyway, perhaps our best move among shitty options is to use art.77 to get the data controller’s attention on the off chance that the data controller does not know the DPA is a deadbeat.

 

As I mentioned in another post, many data protection authorities are deadbeats. Knowing that my Art.77 complaints are in vain, my question is how the complaints might be made useful. Suppose we just use the DPA as a prop. We file an Art.77 complaint and CC the data controller a copy of the complaint.

Normally it might be a bad strategy to show the data controller your hand. But when you essentially expect the DPA to be a dead-end anyway, perhaps our best move among shitty options is to use art.77 to get the data controller’s attention on the off chance that the data controller does not know the DPA is a deadbeat.

 

cross-posted from !gdpr@sopuli.xyz : https://beehaw.org/post/21385256

Many data protection authorities are deadbeats. They do the legal minimum, which is to accept complaints, file them, and acknowledge them. Then do nothing. So stale cases just rot.

Data subjects have a right to complain (Art.77) at no cost, but they apparently do not have a right to a free appeal and the art.78 right to sue is not gratis either.

Unlawful inaction can legally be appealed but appeals are costly. DPAs know this, so they enjoy getting away with neglecting to act on Art.77 complaints.

So first I wonder if my legal theory is sound: If we have a right to complain under art.77 at no cost and the DPA neglects to investigate, then by extension we could argue that a right to complain at no cost implies a right to appeal inaction at no cost. Is that a weak argument? Do we need to ask EU lawmakers to specifically guarantee the right to a free appeal of DPA inaction?

 

Many data protection authorities are deadbeats. They do the legal minimum, which is to accept complaints, file them, and acknowledge them. Then do nothing. So stale cases just rot.

Data subjects have a right to complain (Art.77) at no cost, but they apparently do not have a right to a free appeal and the art.78 right to sue is not gratis either.

Unlawful inaction can legally be appealed but appeals are costly. DPAs know this, so they enjoy getting away with neglecting to act on Art.77 complaints.

So first I wonder if my legal theory is sound: If we have a right to complain under art.77 at no cost and the DPA neglects to investigate, then by extension we could argue that a right to complain at no cost implies a right to appeal inaction at no cost. Is that a weak argument? Do we need to ask EU lawmakers to specifically guarantee the right to a free appeal of DPA inaction?

[–] debanqued@beehaw.org 0 points 9 months ago* (last edited 9 months ago) (1 children)

no, the government doesn’t serve the people it serves power.

First of all, you’re wrong, unless you have limited your comment to a particular gov where votes in an election don’t count -- which is not the situation I am in. I’m in a jurisdiction where not only is there a decent voting system, the reps in gov also take public surveys and sentiment into account for operational design. I’m also in a jurisdiction where civil disobedience has effect. E.g. so many cyclists were unlawfully turning right on red that they decided to scrap the prohibition for cyclists.

You also seem to misunderstand the fact that my drop-in-the-ocean action need not change anything, just as my drop-in-the-ocean election vote is never the one vote that makes a difference.

Unless power thinks you as a group are worth the effort, they will ignore your mailed documents, state you failed to file paper work and you now have to deal with (problems incurred due to not having completed the paper work).

This assumes a scenario where I not only have an obligation to submit something but I also have an obligation to supply an email address. Obviously my form of submission accounts for these factors. The inquiry in the OP does not inherently cover such scenarios, and that’s deliberate.

Paper processes are going away.

Only in regions that are largely populated pushovers and digital zombies, without a right to be analog movement (or the rights to have a movement).

But the point was, there are no good XMPP libraries that would enable a willing government to easily onboard that support. If there were, it would be a very different discussion.

Keyword there is /easily/. It was not easy for Munich to replace all their Windows PCs with linux, but difficulty of deployment was not a show-stopper.

The question is essentially: if e-mail is scrapped, what is the next most qualifying replacement for the given requirements? If XMPP is not the answer, what is?

[–] debanqued@beehaw.org 0 points 9 months ago (3 children)

The gov can /want/ all they want. It is the gov who serves the people, not the other way around. And we (the people) are have some control. That is, if you object to the gov’s email policy or hosting company, you can simply withold your email address. You can send them snail mail. Then they have to pay someone to scan it and react. This is in fact what I do.

I include an XMPP address along with OMEMO fingerprints in the letterhead. It’s mostly symbolic. No one actually uses it. Exceptionally, some attempt to use my XMPP address as an email address. So now I write “note: xmpp is not email” next to the xmpp address.

[–] debanqued@beehaw.org 0 points 9 months ago (1 children)

I’ve installed Deltachat but not experimented at all with it. What happens if someone sends an unencrypted msg to an email account that uses Deltachat? I would expect the msg to still be accepted by the mail server and MS to still see the unencrypted traffic.

[–] debanqued@beehaw.org 0 points 9 months ago* (last edited 9 months ago) (5 children)

I find XMPP to be /more/ reliable than email, which is largely due to anti-spam zealots like #SpamHaus who block or blackhole email on the basis of IP address, along with countless other anti-spam techniques that cause collateral damage to legit email. I actually cannot send email to Google or MS users because of this crazed zealotry that has lost sight of the purpose of security: availability.

XMPP is certainly glitchy and has a variety of issues, but at least it has not yet been sabotaged by anti-spam zealots, and large corps using anti-spam measures as an excuse to break the platform for those not patronising a large corp.

The other alternative is they provide a website

That’s for person→gov msgs. It is not something I can put in my letterhead as a way for them to reach me. Also, the webforms likely just result in an email transmission that traverses MS servers in-the-clear anyway.

[–] debanqued@beehaw.org 0 points 2 years ago

Sign-up still requires a phone number… -.-"

Thanks for the warning -- that was my first question. It is my top reason (among many other reasons) for avoiding Signal.

Checkout Matrix/Element or Session,

All 3 of the sites you linked are Cloudflare sites (thus antithetical to privacy). Yes, I know you can use some of that tech without touching CF, but when they run CF websites it reveals hypocrisy & not understanding the goals of their audience.

view more: next ›