Hebben wij wel iets voor, “Purism”, die van die kraakheldere maar peperdure klaptops met zelfs een ‘open source BIOS’. En binnenkort een super hygiënische telefoon:
The Librem 5 will not wholesale gather your data for profit. It will not lock you into an ecosystem that controls you. It will not require you to enter banking details to simply get an app from an app store.
Tired of your digital life being exploited online?
Ja, intussen wel, 24 x 7 strandwandelen met gure zeewind. Laten zandstralen heet dat in de industrie.
Preorder Now, $699 USD
Verstikt nog een geluid proberen te maken over die andere reuzen die op ze zitten:
|Competitive chart (privacy, security, freedom)|
|User Controls Device||Yes||No||No|
|Trackers Disabled by Default||Yes||No||No|
|Privacy Protection By Default||Yes||No||No|
|Does Not Track You||Yes||No||No|
|Layered Security Protection||Yes||No||No|
|User Controlled Source Code||Yes||No||No|
|Separates CPU from Cellular Baseband||Yes||No||No|
|IP-Native Communication First||Yes||No||No|
|Decentralized Communication by Default||Yes||No||No|
Hebben wij wel iets voor, “Positive Technologies”, will successfully bypass the UK contactless verification limit of £30 on all Visa cards, irrespective of the card terminal:
The researchers also found that this attack is possible with cards and terminals outside of the UK. The attack works by manipulating two data fields that are exchanged between the card and the terminal during a contactless payment.If payment needs an additional cardholder verification (which is required for payments over 30 pounds in the UK), cards will answer “I can’t do that,” which prevents against making payments over this limit.
Secondly, the terminal uses country specific settings, which demand that the card or mobile wallet provide additional verification of the cardholder, such as through the entry of the card PIN or fingerprint authentication on the phone.
Als “Purism” je jouw nieuwe ‘Librem 5’ telefoon opgestuurd heeft:
Card thieves can now make larger payments than they could before. But now, they don’t even need to steal the card. Criminals could, for instance, take a payment from a card when the user wasn’t looking with their own mobile payments machine (though a malicious merchant would eventually be caught by banks’ fraud systems if they used the same terminal). Or even more dastardly, it’s possible to take a payment reading from a credit card using a mobile phone, send the data to another phone and make a payment on that second device going beyond the limit, the researchers claimed. For the hack to work, all the fraudsters need is to be close to their victim.
Last van de warmte zeker? Hebben wij wel iets voor, “Terms and Conditions May Apply” (2013):
Transcriptie, English, auto-generated:
So far the population seems fine with it if they weren’t they know who to call.
Oordeel native New Yorker and freelance film critic, maar zozo:
The information and ideas presented in “Terms and Conditions May Apply” typically lack context. Hoback quotes Zuckerberg’s now-infamous instant message rant about how early Facebook users are, “dumb fucks” for freely giving their information to him. But he doesn’t tell us that Zuckerberg said these things while drunk, and in college. He asks Barrett Brown, a Hacktivist Group Anonymous representative, if “privacy is dead” rather than ask someone like Glenn Greenwald or any other authority to break down what’s happened, and why it matters. Because Hoback only tries to explain so much, he winds up stirring an already overburdened pot.
De eigen blurb van deze Simon Abrams over hemzelf:
Simon’s currently writing a book on the exploitation of blood and gore on film.