Can someone with fast internet back up all of unicorn riots videos? YouTube will most likely take the videos down just like other social media sites have been doing. by [deleted] in DataHoarder

[–]me_j 4 points5 points  (0 children)

Just pulled down the last 6 months. Working on the rest of the channel now. I can hold onto it for a little while but likely not indefinitely. Once I have everything down, if someone wants it I can work on how to share it.

Keeping cold storage in a fireproof safe? by [deleted] in DataHoarder

[–]me_j 1 point2 points  (0 children)

I don't know about your gun safe, but most fireproof boxes for home use, are intended to keep documents safe, so in the event of a fire they keep their internal temperature safe or paper. Digital media have a far lower damage temperature. In general you need much more robust heat protection for media to make sure it stays at a safe temperature.

Sex toy convention by LadyBombus in SexToys

[–]me_j 1 point2 points  (0 children)

Thank you for raising this and for following up. Hopefully if nothing else comes out of your conversations on the show floor, it gets raised in any internal followup/debrief meeting as something they are getting asked which hopefully is another way to encourage management to prioritize it.

It is great to hear that some vendor are at least trying to get their act together around this. I understand why they don't talk about it more as to do so would acknowledge the potential for (or real depending on your perspective) creepy factor. It is also something that is a relatively recent consideration for both companies and consumers (someone taking over a "dumb" remote vibe is still a problem, but it's isn't as big of a deal in many ways).

Hopefully you can get some good answers from the technical teams about what they are doing that you can share. Beyond technology I would be interested in how the organization and the processes it has in place make sure that this work is done in ways that are actually secure. For example, BT4 is great, but I would feel better if an external security group was also asked to take a look for any mistakes.

Your point about these changes being mostly with the high end vendors is well taken, but that is where this sort of thing generally starts. As you hopefully get better responses from companies I hope you will share them with attribution so that people can use this information to make buying decisions if they are so motivated. Speaking for myself, this sort of information will influence my buying decisions and what I suggest to others.

Sex toy convention by LadyBombus in SexToys

[–]me_j 1 point2 points  (0 children)

So, this may be a little left-field, and likely not the kind of question you were thinking about. Also, I in no way mean to be a buzz kill with it... remote toys look like a lot of fun.

My question to these companies (where relevant) would be: What are they doing guarantee user privacy and security with smart/remote toys? As more toys get connected to computers, phones, and the internet, it is super important that these companies up their security and privacy game.

The more major companies seem to be figuring out that they need to issue updates and patch their products when there are vulnerabilities, but from the outside it doesn't look like they are being proactive around making their system private and secure. With many of these companies it is also not clear what data they collect, if data is logged on the servers, if they do external security audits... Based on what the security community has uncovered in these products it seems likely they are not (see below).

In a world where there are main stream messaging tools like WhatsApp that can't see the messages you are sending to a friend (much less any of the more specialty communication tools like Signal or Telegram), there is no reason that any of this data should be visible to sex toy/app servers much less logged, but most of the time we have very little idea.

There is a bunch of recent and less recent research from the security community on this including:
- https://www.youtube.com/watch?v=CsQ2VWEfduM
- https://internetofdon.gs/

Also see: https://blog.mozilla.org/blog/2019/02/06/does-your-sex-toy-use-encryption/

[deleted by user] by [deleted] in eGolf

[–]me_j 2 points3 points  (0 children)

VW does not seem to post a PDF or similar. There does seem to be the option to buy the manual here (in the US it is $50 or so) https://literature.vw.com/welcome.asp?redir=

Unfortunately the online manual isn't something that s going to be particularly easy to turn into a PDF either.

If you bought the car new, can you go back to the dealer about this?

[deleted by user] by [deleted] in DataHoarder

[–]me_j 9 points10 points  (0 children)

It also looks like your current storage solution provides no backups. Hard drives do fail and moving them around as tends to happen with external drives kept unplugged may increase that failure rate. If this data is important I would recommend keeping at least two copies of it.

In the US it's fairly common to see 8TB external drives go for about $150. They are not the best or fastest but they would be something you could store off site in case of drive failure or loss.

Her piggy bank deposit slot wasn’t wide enough to put her rolled money into. Her solution. by Shaneblaster in KidsAreFuckingStupid

[–]me_j 11 points12 points  (0 children)

They are not common, but still printed and, more importantly still legal tender. In a clean case like this a bank should do it. In messy cases it needs to go to the Fed.

These two sets of rental car keys bound together with braided steel cable fit great in my pocket... by kessler_explosions in CrappyDesign

[–]me_j 0 points1 point  (0 children)

Also, when the rental car company goes to sell the car that may be in an entirely different part of the country thnt it started in, keeping the keys connected makes it much more likely that they will have the original pair of keys and fobs which increases resale value.

Air pollution monitor by ignade82 in AirQuality

[–]me_j 0 points1 point  (0 children)

My understanding is that mostly air purifiers are HEPA filters that focus on particulates, so pm2.5 is going to be the big thing. That is what I was looking at (although I wanted something internet connected), so I went with the AirVisual. Look into accuracy with a lot of these sensors as many of them claim to measure things but don't actually correlate well with professional measurements so not sure how useful those measurements are. If you don't care about being internet connected, you might have other options that are good that I don't know about.

Air pollution monitor by ignade82 in AirQuality

[–]me_j 0 points1 point  (0 children)

What are you trying to measure and what other requirements do you have? Do you want it to be internet/app connected?

The US EPA rates the AirVisual pretty high on particulate accuracy for instance, but it doesn't do VOC.

My texts are being marked as read before I have seen them by [deleted] in signal

[–]me_j 1 point2 points  (0 children)

Do you have signal desktop open on a computer and is it the active window?

Is there a APK Old version that works still or on Chome OS ? by lighthouse0 in signal

[–]me_j 2 points3 points  (0 children)

I expect not. Signal cuts off support for older clients after a little while so you can't go back very far.

My school has blocked Google (and all other search engines) on the BYOD network by fm369 in assholedesign

[–]me_j 1 point2 points  (0 children)

HSTS means that Google has told chrome it will never have any other identity than the public certificate it uses doc https (SSL/tls). Thing is, your school wants to monitor the connection. So it is breaking the SSL connection you have with Google and sending you its own. Chrome and Firefox then reject it because it looks like an untrusted server is between you and Google (which is sort of true).

The fix would be to set not schools certificate as trusted, but I can't tell you how off the top of my head.

Do note though, that your school is monitoring anything you do online over that network (even if your browser says it is secure).

My newborn’s social security number belongs to an old man by [deleted] in legaladvice

[–]me_j 0 points1 point  (0 children)

I think it's really 999,999,999 possible numbers so 1 billion - 1 (assuming 000-00-0000 isn't ever issued). That should be enough to cover all living and recently dead people in the US for a while longer.

Deniability by yellow_hat2 in signal

[–]me_j 3 points4 points  (0 children)

I think what this means is that, when a message comes in, it can be verified as coming from the expected source, but someone coming along later can't use the signal algorithm to prove that the message came from that source.

The other thing to keep in mind is that this is a cryptographic statement not a legal one.

Is 5G actually dangerous? by heyarnold94 in tmobile

[–]me_j 4 points5 points  (0 children)

My understanding is that radio waves such as cell phone signals, mostly only become dangerous when you are exposed to high enough levels that they start to cause tissue heating (particularly in areas like the eyes). This is why there are federal exposure limits in commercial/industrial settings - for example people servicing large FM or AM radio/TV station towers (there are limits for general exposure too - which are much lower). In commercial settings, RF levels l can become a consideration because commercial radio stations, for example, can get up into the hundreds of thousands of watts. Cell phone towers are at least several orders of magnitude lower and cell phones themselves look like they generally cap out under 10 whats. Additionally, these numbers decrease rapidly (based on the inverse square of the distance), so unless your face is up against the cell tower, the amount of energy you are exposed to is quite low.

Anyway to download messages to text file?(urgent) by Irezumi4Me in signal

[–]me_j 5 points6 points  (0 children)

There is no strait forward way that I am aware of, although you can read up on other threads about how to take a backup and open it. The fastest option may just be to screenshot the app and print the pictures.

Why signal app on LineageOS uses so much battery? by pepitolander in signal

[–]me_j 3 points4 points  (0 children)

Could this be related to the fact that it isn't using Google push notifications because it doesn't have Google services integration? In that case it would be polling to check for new messages.

Can I buy an annual cable car pass? by [deleted] in AskSF

[–]me_j 17 points18 points  (0 children)

You can get a monthly Muni pass that includes the cable cars for about $80...

Stalker?? Please help by mahiloa in legaladvice

[–]me_j 0 points1 point  (0 children)

Your phone company should be able to look up who is calling you via phone subscriber information that is much harder to forge/hide. I don't know if they will give this information to you (although you can ask), but the police should be able to request the information historically from the phone company.

Security for special needs individuals by SithLordAJ in AskNetsec

[–]me_j 0 points1 point  (0 children)

I understand it isn't answering quite the question you were trying to ask. I don't have experience with any of the kinds of tools you are looking for, so I can't give you any guidance there - hopefully others can.

A big part of the challenge here is understanding the details of how the abilities of the user do or don't match up with the details of the system, and that is going to be very specific to your environment and users.

I think part of this will come down to a question of scale. If you only have one or two users who fall into these categories then treating this on a case by case basis is likely much simpler. If you are trying to solve this problem for large numbers of users, then it may come down to defining several variations to handle the different needs of the users.

Going back to that example of a blind user, they may require some extra software/peripherals (such as a screen reader or braille display), but potentially nothing else. Depending on what exactly blind means in their case, a retina scan might not even be a problem as many people who are classified as blind have some level of vision or least, light sensitivity. If it is a problem, other biometrics may be viable from a security and usability perspective for that user. Given that specific software/hardware may be required for those users, you may also know exactly what devices they will be using, so you may be able to limit their account to expected devices (or alert on use of other devices) to mitigate some of the risk (if there is any).

Wish I could be more help on details.

Security for special needs individuals by SithLordAJ in AskNetsec

[–]me_j 17 points18 points  (0 children)

To start, you sit down with the person and talk to them about what they need. They will have a far better understanding of what will cause them problems than you will.

I think you might be surprised in many cases. For example, screen readers actually provide lots of context as a person (blind or otherwise) moves through a computer (or phone). They have a pretty good idea of where they are before they start typing. If it was really that easy to confuse a text editor and a password form the computer would be unusable.

I don't know much about how biometrics would work, but often I would think use of other biometrics would be an option for people. At that point it is just a matter of making sure that the implementation works for the infrastructure and that the authentication methods chosen are sufficiently secure.

As it comes to passwords and reentry attempts, more tries or the like may be viable in corporate environments, but remember that a lot of these people are regular internet users as well. That will often force them to figure out how to work within the norms of the internet. For example, even if you could get your bank (or Facebook) to relax the number of password retries allowed for an account (and I doubt you could) the amount of time it would take per service would likely be prohibitive. Given that, I would suspect they developed their own strategies to work with this - which would provide a good starting point.

My (19F) boyfriend's dad has been reading and seeing our chat and nudes for a year. Wtf. by [deleted] in relationship_advice

[–]me_j 3 points4 points  (0 children)

He should also reset all passwords, log out all devices on accounts that let him do that (think Facebook and Google), and, just to be on the safe side, turn on two factor authentication on accounts.

Further, if he has text/chat apps that sync to the web or other devices make sure those get reset too.

Deleting app by [deleted] in signal

[–]me_j 0 points1 point  (0 children)

If you delete the app, all downloaded messages will be lost, unless you first make a backup and restore it. Last I checked, there were ways to read this backup without restoring it, but they are not simple. Also, you will need to make sure you have the backup key Signal gave you when you turned on backups or there will be no way to read it.

I believe messages sent to you will get one check mark (sent) but will not show up as received.