Tag: privacy

  • VirusTotal Firefox Browser Extension

    VirusTotal Firefox Browser Extension

    Something I try to share with people is the need to test links before you click them. Not all links, but anything suspicious. For me that means anything I receive via email.

    VirusTotal has been a tool/service I’ve been using for a long while. Their browser extension facilitates the scanning of suspicious links by situating the functionality into the context sensitive menu triggered by a right click.

    Screenshot of the NYSee.nyc homepage. A context sensitive menu is displayed with the item, "Preview of VT4Browsers + Google TI
VT4Browsers + Google TI" toggled open and the option "Scan selected link" highlighted.
    Screenshot of a VirusTotal URL scan results page. Information about the safety of the scanned link is displayed with the summary up top and the indiviual vendors scan results are displayed in a table below.

    Selecting that menu option triggers the VirusTotal URL scan page to open and initiates the scan of that link. Results of that scan are returned and from those you can decide for yourself if you trust what’s on the other side of that link.

    Screenshot of the VT4Browsers + Google TI firefox extension page. Details about the extension are displayed with a "Remove" button to their right. Below are screenshots showing the functionality of the extension.

    May your clicks be merry and bright

    https://addons.mozilla.org/en-US/firefox/addon/vt4browsers

  • It’s Time for the VPN Industry to Innovate (Obscura Interview)

    Techlore Talks

    You don’t have to trust Obscuraβ€”you just have to trust that not both Obscura and Mullvad are compromised.

  • Kismet: a One Month Run

    Kismet: a One Month Run

    I’ve just closed out the Kismet process I had running around the clock for just over a month.

    In that month the database files, which I had rotating daily were typically growing to 5GB before flipping. The total data collected is roughly 150GB.

    $ du -sh ./*
    49G	./kismet
    100G	./kismet_logs
    
    # And the log files themselves
    
    β”Œβ”€β”€ kismet
    β”‚   β”œβ”€β”€ logged
    β”‚   β”‚   β”œβ”€β”€ capture-20251213.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251215.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251216.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251217.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251218.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251219.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251220.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251221.kismet
    β”‚   β”‚   β”œβ”€β”€ capture-20251222.kismet
    β”‚   β”‚   └── capture-20251223.kismet
    β”‚   └── processed
    β”‚       β”œβ”€β”€ 20251215
    β”‚       β”œβ”€β”€ 20251216
    β”‚       β”œβ”€β”€ 20251217
    β”‚       β”œβ”€β”€ 20251218
    β”‚       β”œβ”€β”€ 20251219
    β”‚       β”œβ”€β”€ 20251220
    β”‚       β”œβ”€β”€ 20251221
    β”‚       β”œβ”€β”€ 20251222
    β”‚       β”œβ”€β”€ 20251223
    β”‚       └── boop
    └── kismet_logs
        β”œβ”€β”€ capture-20251224.kismet
        β”œβ”€β”€ capture-20251225.kismet
        β”œβ”€β”€ capture-20251226.kismet
        β”œβ”€β”€ capture-20251227.kismet
        β”œβ”€β”€ capture-20251228.kismet
        β”œβ”€β”€ capture-20251229.kismet
        β”œβ”€β”€ capture-20251230.kismet
        β”œβ”€β”€ capture-20251231.kismet
        β”œβ”€β”€ capture-20260101.kismet
        β”œβ”€β”€ capture-20260102.kismet
        β”œβ”€β”€ capture-20260103.kismet
        β”œβ”€β”€ capture-20260104.kismet
        β”œβ”€β”€ capture-20260105.kismet
        β”œβ”€β”€ capture-20260106.kismet
        β”œβ”€β”€ capture-20260107.kismet
        β”œβ”€β”€ capture-20260108.kismet
        β”œβ”€β”€ capture-20260109.kismet
        β”œβ”€β”€ capture-20260110.kismet
        β”œβ”€β”€ capture-20260111.kismet
        β”œβ”€β”€ capture-20260112.kismet
        β”œβ”€β”€ capture-20260113.kismet
        β”œβ”€β”€ capture-20260114.kismet
        β”œβ”€β”€ capture-20260115.kismet
        └── capture-20260116.kismet

    In that processed directory is data I experimented with early on. I hadn’t and still haven’t put much time into it, but was mostly curious about how discreet, as in how unique individual devices are. Much of it generally is.

    It’s really not about the static devices around me. I’m more focused on the devices passing my apartment window.

    Turns out it was trivial to identify an individual device and recognize it every time it passed by. Creepy. Yes. Alarming. Also yes.

    We bleed massive amounts of data as we walk down the street. I want to know what that data is, and from that, how that data might be used by others. That data you’re (un)knowingly sharing is being collected on a massive scale, then is turned around and sold to just about anyone who’s interested in paying for it.

    The United States has some of the most disgracefully absent privacy laws in the world. Advertisers have found that your data is especially valuable, allowing them to build profiles to better target you with ads. They know an astonishing amount of information about us.

    Many say they know more about us than we do ourselves.

    I have lots to share about this. In the coming days and weeks, as I dive into and start working with the data, I’ll expand on what that data actually is, how it’s being used and what you might consider in adjustingβ€”or notβ€”your habits with that information in mind.

    While transforming this data into information, it will simultaneously be transformed into visual form. Exactly what that will look like I’m unsure of at the moment. I like to see where an idea takes me, and to watch how the process governs the eventual shape it takes.

    Maybe this knowledge prompts you to make adjustments. Maybe you’ll become aware of these things and simply move on as, who knows, your unknowingly surrendered data might make the groceries in your cart cheaper than the identical groceries in the cart of the person behind you. However, maybe the algorithm thinks you’re rich. Prepare to pay more for that flight (via Harvard’s Berkman Klein Center for Internet & Society).

  • 39C3 – A post-American, enshittification-resistant internet

    Cory Doctorow Β· 39C3

    Trump has staged an unscheduled, midair rapid disassembly of the global system of trade. Ironically, it is this system that prevented all of America’s trading partners from disenshittifying their internet: the US trade representative threatened the world with tariffs unless they passed laws that criminalized reverse-engineering and modding. By banning “adversarial interoperability,” America handcuffed the world’s technologists, banning them from creating the mods, hacks, alt clients, scrapers, and other tools needed to liberate their neighbours from the enshittificatory predations of the ketamine-addled zuckermuskian tyrants of US Big Tech.

    Well, when life gives you SARS, you make sarsaparilla. The Trump tariffs are here, and it’s time to pick the locks on the those handcuffs and set the world’s hackers loose on Big Tech. Happy Liberation Day, everyone!

    We’re very much aware of Cory’s Enshittification concept. With everyone up to speed in this audience he’s able to chart the path out with the people who will take us there.

  • How CAPTCHAs work | What does CAPTCHA mean?

    Cloudflare Learning Center

    How does reCAPTCHA work without any user interaction?

    The latest versions of reCAPTCHA are able to take a holistic look at a user’s behavior and history of interacting with content on the Internet. Most of the time, the program can decide based on those factors whether or not the user is a bot, without providing the user with a challenge to complete. If not, then the user will get a typical reCAPTCHA challenge.

    If I were stopped and asked on the street to choose a CAPTCHA, image recognition reCAPTCHAs are by far my fav CAPTCHA. I consider it a success on my part whenever I’m confronted with these. Don’t get me wrong, these are annoying af, but it signals to me that they know little about me, something I go to great lengths, and forfeit a lot of convenience to achieve.

    CAPTCHA me if you can.