• 0 Posts
  • 81 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle






  • The value of tokens on the Blockchain are ostensibly related to the value of the apps that stake/work supports. NFTs were just another attempt at creating some real app/service value which didn’t have all the difficulty or intrinsic value problems that being a payment processor does.

    The core problem is the same though. Speculative value of the tokens can’t really exceed the actual intrinsic value of the underlying Blockchain apps. For such apps to actually work as intended, more thought needs to go into anti-speculation mechanisms.








  • But there is a viable alternative. In this very thread I supplied images of the ostensibly censored prompts from a different generative website. Unless those images have ironically been censored from the lemmy instance.

    The point is that in the western media model, the existence of the Disney channel doesn’t mean that HBO can’t exist. And even if popular sentiment means that HBO doesn’t exist now because of some market force, it can certainly exist in the future if those consumer preferences change. I’d argue that western media has easily, about 200 years demonstrating this very principle.

    If an autocrat bans content, it will never exist. Or rather, the only examples I can really think of where a monarch or autocrat has willingly chosen to liberalize media control, are the handful of European monarchies which ceded political authority to a liberal constitution. Whether you believe this reflects your own reality is inconsequential - it’s trivially simple to demonstrate that western society has become more permissive over time compared to its illiberal counterparts.


  • Yes, you can obviously build your own version of event detection and remote storage, and then appify it in a way which is secure and ergonomically useful, nobody is claiming otherwise. This requires a considerable amount of expertise to do safely, and additional complexity generally expands your threat surface. For you, that may be fine. I’m pretty tech literate and have a bunch of other self hosted services, but I just don’t think the additional complexity is worth maintaining for push notifications. Again, that might be different for you.


  • socsa@lemmy.mltoPrivacy@lemmy.mlPrivacy Respecting Ring Doorbell Equivalent?
    link
    fedilink
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    11 months ago

    Relatively minor from the perspective that the actual information which will leak from a Nest camera isn’t really that unique. And as a network device, it’s fairly simple to isolate and secure. The video a doorbell camera shoots is generally of “in view” public space, already visible to any camera. Your identity is already likely tied to the installation address where you’ve paid for the account with your credit card, which is also probably tied to that same address. If these things are not true, then you should obviously defer to your individual threat profile and disregard what I say.

    The worst part of it is that these doorbell cameras could provide a state actor with a daily face shot database, but if you control it, then it can also be an adversarial source to that end.

    But “minor” for me, is different from “minor” for you. For me, petty crime, and maybe some local cops with beef are a much bigger deal than hiding from the feds. That’s my whole point here. Know your own threat profile. If officer Barbrady kicks down your door and violates your rights, he’s going to take your local video server, but he’s much less likely to get access to some random silicon valley colo farm. Don’t fear the cloud, understand how to use it as a tool within your own threat profile.


  • Which is once again, the reason why understanding your threat surface properly so that you set up security enclaves which let you get value from cloud services without sacrificing privacy is more important than ever. Honestly, these posts frustrate me a bit. People are going to give up real, tangible security benefits of these modern security services over the spectre of relatively minor privacy issues which can be almost entirely mitigated with some pretty simple best practices that anyone interested in security should be doing anyway.


  • socsa@lemmy.mltoPrivacy@lemmy.mlPrivacy Respecting Ring Doorbell Equivalent?
    link
    fedilink
    arrow-up
    7
    arrow-down
    3
    ·
    edit-2
    11 months ago

    As a tangent, for me the entire utility for this stuff is cloud integration and alerts. Otherwise the only use of the camera is sending your insurance company videos of the break-in. This is one of those places where I am willing to give up a bit of privacy in a controlled way for the ability to get alerts in real time in case I need to call emergency services while away from home. Or tell my wife the delivery driver left the gate open and to close it so the dog doesn’t get out.

    To be honest, if you have a good security framework to begin with, there’s no reason why a ring camera is super dangerous.



  • A lot of people also don’t understand that a heat pump is still heating your home, even though the air it blows might be a bit lower than your body temperature, so it feels “cool.” When that happens people assume it has stopped working and switch to aux heat. This is one of the major reasons people insist that heat pumps don’t work in the cold, even though they still have plenty of capacity margin to heat the dwelling.

    My old system was actually set up so that it would pulse the electric aux heater every few minutes or so to help prevent this “drafty” feeling, and to extend the time between defrost cycles.