Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Do not comply.

Do not comply.

Geplant Angeheftet Gesperrt Verschoben Uncategorized
privacymasssurveillancehumanrightsfascismageverificationidentityverification
61 Beiträge 34 Kommentatoren 1 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • catsalad@infosec.exchangeC catsalad@infosec.exchange

    @simonzerafa @Em0nM4stodon Thank you! I'm way more interested in the researcher's published finding :3

    simonzerafa@infosec.exchangeS This user is from outside of this forum
    simonzerafa@infosec.exchangeS This user is from outside of this forum
    simonzerafa@infosec.exchange
    schrieb zuletzt editiert von
    #40

    @catsalad

    Use the Source! 😉

    I need to finish reading the article, but the bits I did read were interesting.

    1 Antwort Letzte Antwort
    0
    • avuko@infosec.exchangeA avuko@infosec.exchange

      @breathOfLife @Em0nM4stodon

      With my apologies to my German friends, but from our collective history, my most direct association is #AusweisBitte!

      And it is not about age, it’s about creating a global panopticon. They (many of them the very same people) have been planning and working towards this for years.

      #AgeVerification #NeverAgain #HellNo #DoNotComply

      mxverda@lgbtqia.spaceM This user is from outside of this forum
      mxverda@lgbtqia.spaceM This user is from outside of this forum
      mxverda@lgbtqia.space
      schrieb zuletzt editiert von
      #41

      @avuko "they" who. Rich people, tech bros etc sure @breathOfLife @Em0nM4stodon

      1 Antwort Letzte Antwort
      0
      • catsalad@infosec.exchangeC catsalad@infosec.exchange

        @Em0nM4stodon It's SO BAD too

        https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

        faoluin@chitter.xyzF This user is from outside of this forum
        faoluin@chitter.xyzF This user is from outside of this forum
        faoluin@chitter.xyz
        schrieb zuletzt editiert von
        #42

        @catsalad @Em0nM4stodon Cc @FirewallDragons for this article

        1 Antwort Letzte Antwort
        0
        • skorpy@chaos.socialS skorpy@chaos.social shared this topic
          ixi@mastodon.onlineI ixi@mastodon.online shared this topic
        • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

          @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

          Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

          project1enigma@chaos.socialP This user is from outside of this forum
          project1enigma@chaos.socialP This user is from outside of this forum
          project1enigma@chaos.social
          schrieb zuletzt editiert von
          #43

          @Intaglio_Dragon @Em0nM4stodon

          No it's not a solution.

          Id requirements still exclude those who don't have the privilege to have the right kind of id. Even if implemented in a cryptographically sound way.

          project1enigma@chaos.socialP 1 Antwort Letzte Antwort
          0
          • project1enigma@chaos.socialP project1enigma@chaos.social

            @Intaglio_Dragon @Em0nM4stodon

            No it's not a solution.

            Id requirements still exclude those who don't have the privilege to have the right kind of id. Even if implemented in a cryptographically sound way.

            project1enigma@chaos.socialP This user is from outside of this forum
            project1enigma@chaos.socialP This user is from outside of this forum
            project1enigma@chaos.social
            schrieb zuletzt editiert von
            #44

            @Intaglio_Dragon @Em0nM4stodon

            And then if the client side is available only as one app you're bound to, even if the protocol itself is sound, you may still have side channels from trackers if not outright implementation security holes.

            intaglio_dragon@furry.engineerI 1 Antwort Letzte Antwort
            0
            • thezwick32@hachyderm.ioT thezwick32@hachyderm.io

              @Em0nM4stodon
              Check out the list of companies that can access ALL OF YOUR PERSONAL DATA through the most popular facial tracking company, Persona:

              https://infosec.exchange/@briankrebs/116103192779110422

              project1enigma@chaos.socialP This user is from outside of this forum
              project1enigma@chaos.socialP This user is from outside of this forum
              project1enigma@chaos.social
              schrieb zuletzt editiert von
              #45

              @TheZwick32 @Em0nM4stodon and persona is linked to Thiel

              fluffykittycat@furry.engineerF 1 Antwort Letzte Antwort
              0
              • catsalad@infosec.exchangeC catsalad@infosec.exchange

                @Em0nM4stodon It's SO BAD too

                https://www.malwarebytes.com/blog/news/2026/02/age-verification-vendor-persona-left-frontend-exposed

                cutepenguin@mastodon.mlC This user is from outside of this forum
                cutepenguin@mastodon.mlC This user is from outside of this forum
                cutepenguin@mastodon.ml
                schrieb zuletzt editiert von
                #46

                @catsalad
                Evil is welcome in future, which we have been waiting for so much...
                You all want technical progress, you all want super technology from your favorite anime and manga?..
                Well, here you go, here you go...
                So in song singing,
                "Do you feel unhappy, XXI Century Man?.."
                Similar technologies for about 10 years already are used in Russian Federation, but here it is, on your street comrade Major...
                But, please, only don't fall to Luddite hysteria!! Progress don't return back!!
                @Em0nM4stodon

                1 Antwort Letzte Antwort
                0
                • project1enigma@chaos.socialP project1enigma@chaos.social

                  @Intaglio_Dragon @Em0nM4stodon

                  And then if the client side is available only as one app you're bound to, even if the protocol itself is sound, you may still have side channels from trackers if not outright implementation security holes.

                  intaglio_dragon@furry.engineerI This user is from outside of this forum
                  intaglio_dragon@furry.engineerI This user is from outside of this forum
                  intaglio_dragon@furry.engineer
                  schrieb zuletzt editiert von
                  #47

                  @project1enigma @Em0nM4stodon I admit that my knowledge on the subject is limited, and maybe it was foolish of me to speak up in the first place.

                  No doubt, online ID verification shares some of the same problems as face-to-face ID verification. What I mentioned may merely be a technical solution to a non-technical problem (or, once again, I may be speaking out of ignorance).

                  1 Antwort Letzte Antwort
                  0
                  • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                    @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                    Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                    etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                    etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                    etsyy@mastodon.catgirl.cloud
                    schrieb zuletzt editiert von
                    #48

                    @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                    etsyy@mastodon.catgirl.cloudE sar@social.elderlogs.netS 2 Antworten Letzte Antwort
                    0
                    • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                      @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                      etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                      etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                      etsyy@mastodon.catgirl.cloud
                      schrieb zuletzt editiert von
                      #49

                      @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                      fluffykittycat@furry.engineerF iwein@mas.toI 2 Antworten Letzte Antwort
                      0
                      • intaglio_dragon@furry.engineerI intaglio_dragon@furry.engineer

                        @Em0nM4stodon Whenever I see discussions about online ID/age verification come up, I tend to see a few people speaking up about ZKP (zero knowledge proofs). Admittedly, I know almost nothing about it, but a cursory read on the subject makes it sound like it could be a solution to the problem.

                        Of course, this is assuming that one takes the stated/claimed problems (e.g. protecting age-restricted spaces from those who are underage) at face value. When it's more likely that the goal of these programs is broad surveillance and control, which nobody would willingly accept if it was presented so plainly.

                        fluffykittycat@furry.engineerF This user is from outside of this forum
                        fluffykittycat@furry.engineerF This user is from outside of this forum
                        fluffykittycat@furry.engineer
                        schrieb zuletzt editiert von
                        #50

                        @Intaglio_Dragon @Em0nM4stodon even if it worked (no one can explain toe how.their system is both anonymous and can't be gamed by someone handing out ZKP tokens like Halloween candy) there's also the matter.that we're giving unaccountable control of what people under 18/25/whatever can see or do to people who freely admit they want to do anti LGBT stuff with it, and that's just the start. What else will whoever decides this deem "harmful to Minors"

                        The whole thing's evil

                        1 Antwort Letzte Antwort
                        0
                        • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                          @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                          fluffykittycat@furry.engineerF This user is from outside of this forum
                          fluffykittycat@furry.engineerF This user is from outside of this forum
                          fluffykittycat@furry.engineer
                          schrieb zuletzt editiert von
                          #51

                          @etsyy @Intaglio_Dragon @Em0nM4stodon even suggesting it helps legitimize it. And we k.ow that they won't be using your bespoke crypto. They're uploading your ID to the pedophile Nazi vampire peter thiel, who then scans against 34 police databases (hey! We were promised this was just an age check!) And then leaves it so insecure the people who leak it Can't be called hackers because they didn't even have to hack anything to get all of it

                          1 Antwort Letzte Antwort
                          0
                          • project1enigma@chaos.socialP project1enigma@chaos.social

                            @TheZwick32 @Em0nM4stodon and persona is linked to Thiel

                            fluffykittycat@furry.engineerF This user is from outside of this forum
                            fluffykittycat@furry.engineerF This user is from outside of this forum
                            fluffykittycat@furry.engineer
                            schrieb zuletzt editiert von
                            #52

                            @project1enigma @TheZwick32 @Em0nM4stodon who in turn is linked to Epstein

                            project1enigma@chaos.socialP 1 Antwort Letzte Antwort
                            0
                            • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                              @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange there is no technical solution to governments imposing authoritarian policies.

                              sar@social.elderlogs.netS This user is from outside of this forum
                              sar@social.elderlogs.netS This user is from outside of this forum
                              sar@social.elderlogs.net
                              schrieb zuletzt editiert von
                              #53

                              @etsyy @Intaglio_Dragon @Em0nM4stodon

                              The French came up with a technology to deal with overbearing elites a wee while back...

                              😉😂

                              1 Antwort Letzte Antwort
                              0
                              • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange if verifying id was actually the goal (not to mention a useful or productive goal), perhaps, but it's almost always a means of tracking and controlling populations. offering concessions to that pursuit is ridiculous

                                iwein@mas.toI This user is from outside of this forum
                                iwein@mas.toI This user is from outside of this forum
                                iwein@mas.to
                                schrieb zuletzt editiert von
                                #54

                                @etsyy @Intaglio_Dragon
                                I was once involved in an idea around technical id verification (which I abandoned for ethical reasons). There is no technical solution to this either that isn't completely dystopian as far as I can tell.

                                Chosing to trust people can only be done in a non-technical way, and the cost of broken trust is much lower than the cost of lacking trust.

                                I don't have the spoons to write down the whole argument, but I hope more people can trust this to be correct 🙂

                                @Em0nM4stodon

                                etsyy@mastodon.catgirl.cloudE 1 Antwort Letzte Antwort
                                0
                                • iwein@mas.toI iwein@mas.to

                                  @etsyy @Intaglio_Dragon
                                  I was once involved in an idea around technical id verification (which I abandoned for ethical reasons). There is no technical solution to this either that isn't completely dystopian as far as I can tell.

                                  Chosing to trust people can only be done in a non-technical way, and the cost of broken trust is much lower than the cost of lacking trust.

                                  I don't have the spoons to write down the whole argument, but I hope more people can trust this to be correct 🙂

                                  @Em0nM4stodon

                                  etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                  etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                  etsyy@mastodon.catgirl.cloud
                                  schrieb zuletzt editiert von
                                  #55

                                  @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange on the surface, in a vacuum, I'm not against id verification or adjacent, but seeing as we don't live in a vacuum, I'm always forced to ask "why?" and then the subsequent "how?", neither of which have ever received a satisfactory response.

                                  etsyy@mastodon.catgirl.cloudE 1 Antwort Letzte Antwort
                                  0
                                  • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                    @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange on the surface, in a vacuum, I'm not against id verification or adjacent, but seeing as we don't live in a vacuum, I'm always forced to ask "why?" and then the subsequent "how?", neither of which have ever received a satisfactory response.

                                    etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                    etsyy@mastodon.catgirl.cloudE This user is from outside of this forum
                                    etsyy@mastodon.catgirl.cloud
                                    schrieb zuletzt editiert von
                                    #56

                                    @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange they are always predicated on some sense of exclusion or superiority and are intended to be enforced via extremely easily manipulated and corruptible means.

                                    tldr reductive and unproductive. a waste of time

                                    iwein@mas.toI 1 Antwort Letzte Antwort
                                    0
                                    • etsyy@mastodon.catgirl.cloudE etsyy@mastodon.catgirl.cloud

                                      @iwein@mas.to @Intaglio_Dragon@furry.engineer @Em0nM4stodon@infosec.exchange they are always predicated on some sense of exclusion or superiority and are intended to be enforced via extremely easily manipulated and corruptible means.

                                      tldr reductive and unproductive. a waste of time

                                      iwein@mas.toI This user is from outside of this forum
                                      iwein@mas.toI This user is from outside of this forum
                                      iwein@mas.to
                                      schrieb zuletzt editiert von
                                      #57

                                      @etsyy

                                      I find the subject very interesting, so I'll go into it a little bit more. Even though I agree with your conclusion that it is a waste of time, I also think it's not a waste of time to understand the mechanisms you're touching on. And they're very poorly understood by most people.

                                      I am myself a counter example to the premise that they're always based on exclusion or superiority…or I stand to be corrected (please feel free to do that).

                                      I'll share the example. (1/n)

                                      iwein@mas.toI 1 Antwort Letzte Antwort
                                      0
                                      • iwein@mas.toI iwein@mas.to

                                        @etsyy

                                        I find the subject very interesting, so I'll go into it a little bit more. Even though I agree with your conclusion that it is a waste of time, I also think it's not a waste of time to understand the mechanisms you're touching on. And they're very poorly understood by most people.

                                        I am myself a counter example to the premise that they're always based on exclusion or superiority…or I stand to be corrected (please feel free to do that).

                                        I'll share the example. (1/n)

                                        iwein@mas.toI This user is from outside of this forum
                                        iwein@mas.toI This user is from outside of this forum
                                        iwein@mas.to
                                        schrieb zuletzt editiert von
                                        #58

                                        @etsyy why?

                                        My (foolish) intention was to enable global universal base income for all humans.

                                        The trick my left brain came up with was to id all humans, and then automatically give them a set amount of money on a certain schedule.

                                        how? 1

                                        The money would be sent to the wallet unlocked by an id, and naturally disappear from the system on the death of the individual. I still think that would create a fairer society in theory, but it hinges on the id mechanism. (2/n)

                                        iwein@mas.toI 1 Antwort Letzte Antwort
                                        0
                                        • iwein@mas.toI iwein@mas.to

                                          @etsyy why?

                                          My (foolish) intention was to enable global universal base income for all humans.

                                          The trick my left brain came up with was to id all humans, and then automatically give them a set amount of money on a certain schedule.

                                          how? 1

                                          The money would be sent to the wallet unlocked by an id, and naturally disappear from the system on the death of the individual. I still think that would create a fairer society in theory, but it hinges on the id mechanism. (2/n)

                                          iwein@mas.toI This user is from outside of this forum
                                          iwein@mas.toI This user is from outside of this forum
                                          iwein@mas.to
                                          schrieb zuletzt editiert von
                                          #59

                                          @etsyy
                                          how? 2

                                          To id people consistently (to prevent fraud), you'll need biometrics and/or some kind of central authority. And that's where the id breaks down into dystopia.

                                          failure

                                          in this design id becomes power, and id-ing people is not free. This means that identifying authorities have power over people, and whenever this happens, superiority and exclusion are more or less natural consequences.

                                          I found that this idea was most appealing to fascists, for entirely the wrong reasons…

                                          (3/n)

                                          iwein@mas.toI 1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen



                                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Über dieses Forum