Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Do not comply.

Do not comply.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
privacymasssurveillancehumanrightsfascismageverificationidentityverification
61 Beiträge 34 Kommentatoren 1 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • em0nm4stodon@infosec.exchangeE em0nm4stodon@infosec.exchange

    Do not comply.

    Do not share your ID or biometric data with abusive platforms requesting it. You have a choice to say no, complain, and leave.

    This is an important act of resistance for the future of humanity.

    This isn't just about privacy, this is also about safety, diversity, democracy, and human rights.

    #Privacy #MassSurveillance #HumanRights #Fascism #AgeVerification #IdentityVerification

    catsalad@infosec.exchangeC This user is from outside of this forum
    catsalad@infosec.exchangeC This user is from outside of this forum
    catsalad@infosec.exchange
    schrieb zuletzt editiert von
    #36

    @Em0nM4stodon It's SO BAD too

    https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

    simonzerafa@infosec.exchangeS faoluin@chitter.xyzF cutepenguin@mastodon.mlC 3 Antworten Letzte Antwort
    0
    • codinghorror@infosec.exchangeC codinghorror@infosec.exchange

      @Phracker2Art @Em0nM4stodon “but my friends are there” well, get more and better friends.

      growfediverse@dillyofapickle.comG This user is from outside of this forum
      growfediverse@dillyofapickle.comG This user is from outside of this forum
      growfediverse@dillyofapickle.com
      schrieb zuletzt editiert von
      #37
      @Em0nM4stodon @codinghorror @Phracker2Art "But arent all your friends there?"
      Me: "Not any more" 👋
      1 Antwort Letzte Antwort
      0
      • catsalad@infosec.exchangeC catsalad@infosec.exchange

        @Em0nM4stodon It's SO BAD too

        https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

        simonzerafa@infosec.exchangeS This user is from outside of this forum
        simonzerafa@infosec.exchangeS This user is from outside of this forum
        simonzerafa@infosec.exchange
        schrieb zuletzt editiert von
        #38

        @catsalad @Em0nM4stodon

        The link to the original blog posting:

        https://vmfunc.re/blog/persona

        The only winning move is not to play.

        catsalad@infosec.exchangeC 1 Antwort Letzte Antwort
        0
        • simonzerafa@infosec.exchangeS simonzerafa@infosec.exchange

          @catsalad @Em0nM4stodon

          The link to the original blog posting:

          https://vmfunc.re/blog/persona

          The only winning move is not to play.

          catsalad@infosec.exchangeC This user is from outside of this forum
          catsalad@infosec.exchangeC This user is from outside of this forum
          catsalad@infosec.exchange
          schrieb zuletzt editiert von
          #39

          @simonzerafa @Em0nM4stodon Thank you! I'm way more interested in the researcher's published finding :3

          simonzerafa@infosec.exchangeS 1 Antwort Letzte Antwort
          0
          • catsalad@infosec.exchangeC catsalad@infosec.exchange

            @simonzerafa @Em0nM4stodon Thank you! I'm way more interested in the researcher's published finding :3

            simonzerafa@infosec.exchangeS This user is from outside of this forum
            simonzerafa@infosec.exchangeS This user is from outside of this forum
            simonzerafa@infosec.exchange
            schrieb zuletzt editiert von
            #40

            @catsalad

            Use the Source! 😉

            I need to finish reading the article, but the bits I did read were interesting.

            1 Antwort Letzte Antwort
            0
            • avuko@infosec.exchangeA avuko@infosec.exchange

              @breathOfLife @Em0nM4stodon

              With my apologies to my German friends, but from our collective history, my most direct association is #AusweisBitte!

              And it is not about age, it’s about creating a global panopticon. They (many of them the very same people) have been planning and working towards this for years.

              #AgeVerification #NeverAgain #HellNo #DoNotComply

              mxverda@lgbtqia.spaceM This user is from outside of this forum
              mxverda@lgbtqia.spaceM This user is from outside of this forum
              mxverda@lgbtqia.space
              schrieb zuletzt editiert von
              #41

              @avuko "they" who. Rich people, tech bros etc sure @breathOfLife @Em0nM4stodon

              1 Antwort Letzte Antwort
              0
              • catsalad@infosec.exchangeC catsalad@infosec.exchange

                @Em0nM4stodon It's SO BAD too

                https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

                faoluin@chitter.xyzF This user is from outside of this forum
                faoluin@chitter.xyzF This user is from outside of this forum
                faoluin@chitter.xyz
                schrieb zuletzt editiert von
                #42

                @catsalad @Em0nM4stodon Cc @FirewallDragons for this article

                1 Antwort Letzte Antwort
                0
                • skorpy@chaos.socialS skorpy@chaos.social shared this topic
                  ixi@mastodon.onlineI ixi@mastodon.online shared this topic
                • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                  @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                  Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                  project1enigma@chaos.socialP This user is from outside of this forum
                  project1enigma@chaos.socialP This user is from outside of this forum
                  project1enigma@chaos.social
                  schrieb zuletzt editiert von
                  #43

                  @Intaglio_Dragon @Em0nM4stodon

                  No it's not a solution.

                  Id requirements still exclude those who don't have the privilege to have the right kind of id. Even if implemented in a cryptographically sound way.

                  project1enigma@chaos.socialP 1 Antwort Letzte Antwort
                  0
                  • project1enigma@chaos.socialP project1enigma@chaos.social

                    @Intaglio_Dragon @Em0nM4stodon

                    No it's not a solution.

                    Id requirements still exclude those who don't have the privilege to have the right kind of id. Even if implemented in a cryptographically sound way.

                    project1enigma@chaos.socialP This user is from outside of this forum
                    project1enigma@chaos.socialP This user is from outside of this forum
                    project1enigma@chaos.social
                    schrieb zuletzt editiert von
                    #44

                    @Intaglio_Dragon @Em0nM4stodon

                    And then if the client side is available only as one app you're bound to, even if the protocol itself is sound, you may still have side channels from trackers if not outright implementation security holes.

                    intaglio_dragon@furry.engineerI 1 Antwort Letzte Antwort
                    0
                    • thezwick32@hachyderm.ioT thezwick32@hachyderm.io

                      @Em0nM4stodon
                      Check out the list of companies that can access ALL OF YOUR PERSONAL DATA through the most popular facial tracking company, Persona:

                      https://infosec.exchange/@briankrebs/116103192779110422

                      project1enigma@chaos.socialP This user is from outside of this forum
                      project1enigma@chaos.socialP This user is from outside of this forum
                      project1enigma@chaos.social
                      schrieb zuletzt editiert von
                      #45

                      @TheZwick32 @Em0nM4stodon and persona is linked to Thiel

                      fluffykittycat@furry.engineerF 1 Antwort Letzte Antwort
                      0
                      • catsalad@infosec.exchangeC catsalad@infosec.exchange

                        @Em0nM4stodon It's SO BAD too

                        https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

                        cutepenguin@mastodon.mlC This user is from outside of this forum
                        cutepenguin@mastodon.mlC This user is from outside of this forum
                        cutepenguin@mastodon.ml
                        schrieb zuletzt editiert von
                        #46

                        @catsalad
                        Evil is welcome in future, which we have been waiting for so much...
                        You all want technical progress, you all want super technology from your favorite anime and manga?..
                        Well, here you go, here you go...
                        So in song singing,
                        "Do you feel unhappy, XXI Century Man?.."
                        Similar technologies for about 10 years already are used in Russian Federation, but here it is, on your street comrade Major...
                        But, please, only don't fall to Luddite hysteria!! Progress don't return back!!
                        @Em0nM4stodon

                        1 Antwort Letzte Antwort
                        0
                        • project1enigma@chaos.socialP project1enigma@chaos.social

                          @Intaglio_Dragon @Em0nM4stodon

                          And then if the client side is available only as one app you're bound to, even if the protocol itself is sound, you may still have side channels from trackers if not outright implementation security holes.

                          intaglio_dragon@furry.engineerI This user is from outside of this forum
                          intaglio_dragon@furry.engineerI This user is from outside of this forum
                          intaglio_dragon@furry.engineer
                          schrieb zuletzt editiert von
                          #47

                          @project1enigma @Em0nM4stodon I admit that my knowledge on the subject is limited, and maybe it was foolish of me to speak up in the first place.

                          No doubt, online ID verification shares some of the same problems as face-to-face ID verification. What I mentioned may merely be a technical solution to a non-technical problem (or, once again, I may be speaking out of ignorance).

                          1 Antwort Letzte Antwort
                          0
                          • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                            @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                            Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                            etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                            etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                            etsyy@mastodon.catgirl.cloud
                            schrieb zuletzt editiert von
                            #48

                            @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                            etsyy@mastodon.catgirl.cloudE sar@social.elderlogs.netS 2 Antworten Letzte Antwort
                            0
                            • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                              @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                              etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                              etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                              etsyy@mastodon.catgirl.cloud
                              schrieb zuletzt editiert von
                              #49

                              @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                              fluffykittycat@furry.engineerF iwein@mas.toI 2 Antworten Letzte Antwort
                              0
                              • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                                @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                                Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                                fluffykittycat@furry.engineerF This user is from outside of this forum
                                fluffykittycat@furry.engineerF This user is from outside of this forum
                                fluffykittycat@furry.engineer
                                schrieb zuletzt editiert von
                                #50

                                @Intaglio_Dragon @Em0nM4stodon even if it worked (no one can explain toe how.their system is both anonymous and can't be gamed by someone handing out ZKP tokens like Halloween candy) there's also the matter.that we're giving unaccountable control of what people under 18/25/whatever can see or do to people who freely admit they want to do anti LGBT stuff with it, and that's just the start. What else will whoever decides this deem "harmful to Minors"

                                The whole thing's evil

                                1 Antwort Letzte Antwort
                                0
                                • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                  @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                                  fluffykittycat@furry.engineerF This user is from outside of this forum
                                  fluffykittycat@furry.engineerF This user is from outside of this forum
                                  fluffykittycat@furry.engineer
                                  schrieb zuletzt editiert von
                                  #51

                                  @etsyy @Intaglio_Dragon @Em0nM4stodon even suggesting it helps legitimize it. And we k.ow that they won't be using your bespoke crypto. They're uploading your ID to the pedophile Nazi vampire peter thiel, who then scans against 34 police databases (hey! We were promised this was just an age check!) And then leaves it so insecure the people who leak it Can't be called hackers because they didn't even have to hack anything to get all of it

                                  1 Antwort Letzte Antwort
                                  0
                                  • project1enigma@chaos.socialP project1enigma@chaos.social

                                    @TheZwick32 @Em0nM4stodon and persona is linked to Thiel

                                    fluffykittycat@furry.engineerF This user is from outside of this forum
                                    fluffykittycat@furry.engineerF This user is from outside of this forum
                                    fluffykittycat@furry.engineer
                                    schrieb zuletzt editiert von
                                    #52

                                    @project1enigma @TheZwick32 @Em0nM4stodon who in turn is linked to Epstein

                                    project1enigma@chaos.socialP 1 Antwort Letzte Antwort
                                    0
                                    • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                      @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                                      sar@social.elderlogs.netS This user is from outside of this forum
                                      sar@social.elderlogs.netS This user is from outside of this forum
                                      sar@social.elderlogs.net
                                      schrieb zuletzt editiert von
                                      #53

                                      @etsyy @Intaglio_Dragon @Em0nM4stodon

                                      The French came up with a technology to deal with overbearing elites a wee while back...

                                      😉😂

                                      1 Antwort Letzte Antwort
                                      0
                                      • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                        @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                                        iwein@mas.toI This user is from outside of this forum
                                        iwein@mas.toI This user is from outside of this forum
                                        iwein@mas.to
                                        schrieb zuletzt editiert von
                                        #54

                                        @etsyy @Intaglio_Dragon
                                        I was once involved in an idea around technical id verification (which I abandoned for ethical reasons). There is no technical solution to this either that isn't completely dystopian as far as I can tell.

                                        Chosing to trust people can only be done in a non-technical way, and the cost of broken trust is much lower than the cost of lacking trust.

                                        I don't have the spoons to write down the whole argument, but I hope more people can trust this to be correct 🙂

                                        @Em0nM4stodon

                                        etsyy@mastodon.catgirl.cloudE 1 Antwort Letzte Antwort
                                        0
                                        • iwein@mas.toI iwein@mas.to

                                          @etsyy @Intaglio_Dragon
                                          I was once involved in an idea around technical id verification (which I abandoned for ethical reasons). There is no technical solution to this either that isn't completely dystopian as far as I can tell.

                                          Chosing to trust people can only be done in a non-technical way, and the cost of broken trust is much lower than the cost of lacking trust.

                                          I don't have the spoons to write down the whole argument, but I hope more people can trust this to be correct 🙂

                                          @Em0nM4stodon

                                          etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                          etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                          etsyy@mastodon.catgirl.cloud
                                          schrieb zuletzt editiert von
                                          #55

                                          @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange on the surface, in a vacuum, I'm not against id verification or adjacent, but seeing as we don't live in a vacuum, I'm always forced to ask "why?" and then the subsequent "how?", neither of which have ever received a satisfactory response.

                                          etsyy@mastodon.catgirl.cloudE 1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen



                                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Über dieses Forum