Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Do not comply.

Do not comply.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
privacymasssurveillancehumanrightsfascismageverificationidentityverification
61 Beiträge 34 Kommentatoren 1 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • codinghorror@infosec.exchangeC codinghorror@infosec.exchange

    @Phracker2Art @Em0nM4stodon “but my friends are there” well, get more and better friends.

    growfediverse@dillyofapickle.comG This user is from outside of this forum
    growfediverse@dillyofapickle.comG This user is from outside of this forum
    growfediverse@dillyofapickle.com
    schrieb zuletzt editiert von
    #37
    @Em0nM4stodon @codinghorror @Phracker2Art "But arent all your friends there?"
    Me: "Not any more" 👋
    1 Antwort Letzte Antwort
    0
    • catsalad@infosec.exchangeC catsalad@infosec.exchange

      @Em0nM4stodon It's SO BAD too

      https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

      simonzerafa@infosec.exchangeS This user is from outside of this forum
      simonzerafa@infosec.exchangeS This user is from outside of this forum
      simonzerafa@infosec.exchange
      schrieb zuletzt editiert von
      #38

      @catsalad @Em0nM4stodon

      The link to the original blog posting:

      https://vmfunc.re/blog/persona

      The only winning move is not to play.

      catsalad@infosec.exchangeC 1 Antwort Letzte Antwort
      0
      • simonzerafa@infosec.exchangeS simonzerafa@infosec.exchange

        @catsalad @Em0nM4stodon

        The link to the original blog posting:

        https://vmfunc.re/blog/persona

        The only winning move is not to play.

        catsalad@infosec.exchangeC This user is from outside of this forum
        catsalad@infosec.exchangeC This user is from outside of this forum
        catsalad@infosec.exchange
        schrieb zuletzt editiert von
        #39

        @simonzerafa @Em0nM4stodon Thank you! I'm way more interested in the researcher's published finding :3

        simonzerafa@infosec.exchangeS 1 Antwort Letzte Antwort
        0
        • catsalad@infosec.exchangeC catsalad@infosec.exchange

          @simonzerafa @Em0nM4stodon Thank you! I'm way more interested in the researcher's published finding :3

          simonzerafa@infosec.exchangeS This user is from outside of this forum
          simonzerafa@infosec.exchangeS This user is from outside of this forum
          simonzerafa@infosec.exchange
          schrieb zuletzt editiert von
          #40

          @catsalad

          Use the Source! 😉

          I need to finish reading the article, but the bits I did read were interesting.

          1 Antwort Letzte Antwort
          0
          • avuko@infosec.exchangeA avuko@infosec.exchange

            @breathOfLife @Em0nM4stodon

            With my apologies to my German friends, but from our collective history, my most direct association is #AusweisBitte!

            And it is not about age, it’s about creating a global panopticon. They (many of them the very same people) have been planning and working towards this for years.

            #AgeVerification #NeverAgain #HellNo #DoNotComply

            mxverda@lgbtqia.spaceM This user is from outside of this forum
            mxverda@lgbtqia.spaceM This user is from outside of this forum
            mxverda@lgbtqia.space
            schrieb zuletzt editiert von
            #41

            @avuko "they" who. Rich people, tech bros etc sure @breathOfLife @Em0nM4stodon

            1 Antwort Letzte Antwort
            0
            • catsalad@infosec.exchangeC catsalad@infosec.exchange

              @Em0nM4stodon It's SO BAD too

              https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

              faoluin@chitter.xyzF This user is from outside of this forum
              faoluin@chitter.xyzF This user is from outside of this forum
              faoluin@chitter.xyz
              schrieb zuletzt editiert von
              #42

              @catsalad @Em0nM4stodon Cc @FirewallDragons for this article

              1 Antwort Letzte Antwort
              0
              • skorpy@chaos.socialS skorpy@chaos.social shared this topic
                ixi@mastodon.onlineI ixi@mastodon.online shared this topic
              • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                project1enigma@chaos.socialP This user is from outside of this forum
                project1enigma@chaos.socialP This user is from outside of this forum
                project1enigma@chaos.social
                schrieb zuletzt editiert von
                #43

                @Intaglio_Dragon @Em0nM4stodon

                No it's not a solution.

                Id requirements still exclude those who don't have the privilege to have the right kind of id. Even if implemented in a cryptographically sound way.

                project1enigma@chaos.socialP 1 Antwort Letzte Antwort
                0
                • project1enigma@chaos.socialP project1enigma@chaos.social

                  @Intaglio_Dragon @Em0nM4stodon

                  No it's not a solution.

                  Id requirements still exclude those who don't have the privilege to have the right kind of id. Even if implemented in a cryptographically sound way.

                  project1enigma@chaos.socialP This user is from outside of this forum
                  project1enigma@chaos.socialP This user is from outside of this forum
                  project1enigma@chaos.social
                  schrieb zuletzt editiert von
                  #44

                  @Intaglio_Dragon @Em0nM4stodon

                  And then if the client side is available only as one app you're bound to, even if the protocol itself is sound, you may still have side channels from trackers if not outright implementation security holes.

                  intaglio_dragon@furry.engineerI 1 Antwort Letzte Antwort
                  0
                  • thezwick32@hachyderm.ioT thezwick32@hachyderm.io

                    @Em0nM4stodon
                    Check out the list of companies that can access ALL OF YOUR PERSONAL DATA through the most popular facial tracking company, Persona:

                    https://infosec.exchange/@briankrebs/116103192779110422

                    project1enigma@chaos.socialP This user is from outside of this forum
                    project1enigma@chaos.socialP This user is from outside of this forum
                    project1enigma@chaos.social
                    schrieb zuletzt editiert von
                    #45

                    @TheZwick32 @Em0nM4stodon and persona is linked to Thiel

                    fluffykittycat@furry.engineerF 1 Antwort Letzte Antwort
                    0
                    • catsalad@infosec.exchangeC catsalad@infosec.exchange

                      @Em0nM4stodon It's SO BAD too

                      https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

                      cutepenguin@mastodon.mlC This user is from outside of this forum
                      cutepenguin@mastodon.mlC This user is from outside of this forum
                      cutepenguin@mastodon.ml
                      schrieb zuletzt editiert von
                      #46

                      @catsalad
                      Evil is welcome in future, which we have been waiting for so much...
                      You all want technical progress, you all want super technology from your favorite anime and manga?..
                      Well, here you go, here you go...
                      So in song singing,
                      "Do you feel unhappy, XXI Century Man?.."
                      Similar technologies for about 10 years already are used in Russian Federation, but here it is, on your street comrade Major...
                      But, please, only don't fall to Luddite hysteria!! Progress don't return back!!
                      @Em0nM4stodon

                      1 Antwort Letzte Antwort
                      0
                      • project1enigma@chaos.socialP project1enigma@chaos.social

                        @Intaglio_Dragon @Em0nM4stodon

                        And then if the client side is available only as one app you're bound to, even if the protocol itself is sound, you may still have side channels from trackers if not outright implementation security holes.

                        intaglio_dragon@furry.engineerI This user is from outside of this forum
                        intaglio_dragon@furry.engineerI This user is from outside of this forum
                        intaglio_dragon@furry.engineer
                        schrieb zuletzt editiert von
                        #47

                        @project1enigma @Em0nM4stodon I admit that my knowledge on the subject is limited, and maybe it was foolish of me to speak up in the first place.

                        No doubt, online ID verification shares some of the same problems as face-to-face ID verification. What I mentioned may merely be a technical solution to a non-technical problem (or, once again, I may be speaking out of ignorance).

                        1 Antwort Letzte Antwort
                        0
                        • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                          @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                          Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                          etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                          etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                          etsyy@mastodon.catgirl.cloud
                          schrieb zuletzt editiert von
                          #48

                          @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                          etsyy@mastodon.catgirl.cloudE sar@social.elderlogs.netS 2 Antworten Letzte Antwort
                          0
                          • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                            @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                            etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                            etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                            etsyy@mastodon.catgirl.cloud
                            schrieb zuletzt editiert von
                            #49

                            @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                            fluffykittycat@furry.engineerF iwein@mas.toI 2 Antworten Letzte Antwort
                            0
                            • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                              @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                              Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                              fluffykittycat@furry.engineerF This user is from outside of this forum
                              fluffykittycat@furry.engineerF This user is from outside of this forum
                              fluffykittycat@furry.engineer
                              schrieb zuletzt editiert von
                              #50

                              @Intaglio_Dragon @Em0nM4stodon even if it worked (no one can explain toe how.their system is both anonymous and can't be gamed by someone handing out ZKP tokens like Halloween candy) there's also the matter.that we're giving unaccountable control of what people under 18/25/whatever can see or do to people who freely admit they want to do anti LGBT stuff with it, and that's just the start. What else will whoever decides this deem "harmful to Minors"

                              The whole thing's evil

                              1 Antwort Letzte Antwort
                              0
                              • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                                fluffykittycat@furry.engineerF This user is from outside of this forum
                                fluffykittycat@furry.engineerF This user is from outside of this forum
                                fluffykittycat@furry.engineer
                                schrieb zuletzt editiert von
                                #51

                                @etsyy @Intaglio_Dragon @Em0nM4stodon even suggesting it helps legitimize it. And we k.ow that they won't be using your bespoke crypto. They're uploading your ID to the pedophile Nazi vampire peter thiel, who then scans against 34 police databases (hey! We were promised this was just an age check!) And then leaves it so insecure the people who leak it Can't be called hackers because they didn't even have to hack anything to get all of it

                                1 Antwort Letzte Antwort
                                0
                                • project1enigma@chaos.socialP project1enigma@chaos.social

                                  @TheZwick32 @Em0nM4stodon and persona is linked to Thiel

                                  fluffykittycat@furry.engineerF This user is from outside of this forum
                                  fluffykittycat@furry.engineerF This user is from outside of this forum
                                  fluffykittycat@furry.engineer
                                  schrieb zuletzt editiert von
                                  #52

                                  @project1enigma @TheZwick32 @Em0nM4stodon who in turn is linked to Epstein

                                  project1enigma@chaos.socialP 1 Antwort Letzte Antwort
                                  0
                                  • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                    @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                                    sar@social.elderlogs.netS This user is from outside of this forum
                                    sar@social.elderlogs.netS This user is from outside of this forum
                                    sar@social.elderlogs.net
                                    schrieb zuletzt editiert von
                                    #53

                                    @etsyy @Intaglio_Dragon @Em0nM4stodon

                                    The French came up with a technology to deal with overbearing elites a wee while back...

                                    😉😂

                                    1 Antwort Letzte Antwort
                                    0
                                    • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                      @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                                      iwein@mas.toI This user is from outside of this forum
                                      iwein@mas.toI This user is from outside of this forum
                                      iwein@mas.to
                                      schrieb zuletzt editiert von
                                      #54

                                      @etsyy @Intaglio_Dragon
                                      I was once involved in an idea around technical id verification (which I abandoned for ethical reasons). There is no technical solution to this either that isn't completely dystopian as far as I can tell.

                                      Chosing to trust people can only be done in a non-technical way, and the cost of broken trust is much lower than the cost of lacking trust.

                                      I don't have the spoons to write down the whole argument, but I hope more people can trust this to be correct 🙂

                                      @Em0nM4stodon

                                      etsyy@mastodon.catgirl.cloudE 1 Antwort Letzte Antwort
                                      0
                                      • iwein@mas.toI iwein@mas.to

                                        @etsyy @Intaglio_Dragon
                                        I was once involved in an idea around technical id verification (which I abandoned for ethical reasons). There is no technical solution to this either that isn't completely dystopian as far as I can tell.

                                        Chosing to trust people can only be done in a non-technical way, and the cost of broken trust is much lower than the cost of lacking trust.

                                        I don't have the spoons to write down the whole argument, but I hope more people can trust this to be correct 🙂

                                        @Em0nM4stodon

                                        etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                        etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                        etsyy@mastodon.catgirl.cloud
                                        schrieb zuletzt editiert von
                                        #55

                                        @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange on the surface, in a vacuum, I'm not against id verification or adjacent, but seeing as we don't live in a vacuum, I'm always forced to ask "why?" and then the subsequent "how?", neither of which have ever received a satisfactory response.

                                        etsyy@mastodon.catgirl.cloudE 1 Antwort Letzte Antwort
                                        0
                                        • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                          @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange on the surface, in a vacuum, I'm not against id verification or adjacent, but seeing as we don't live in a vacuum, I'm always forced to ask "why?" and then the subsequent "how?", neither of which have ever received a satisfactory response.

                                          etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                          etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                          etsyy@mastodon.catgirl.cloud
                                          schrieb zuletzt editiert von
                                          #56

                                          @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange they are always predicated on some sense of exclusion or superiority and are intended to be enforced via extremely easily manipulated and corruptible means.

                                          tldr reductive and unproductive. a waste of time

                                          iwein@mas.toI 1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen



                                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Über dieses Forum