Those aren't the problem, it's any "free" mobile app in the App Store or Play Store with an advertising SDK (which is almost all of them) that uses your location to "keep your weather forecast up-to-date" but also provide data brokers with your location...
Sure, and—setting aside the issues with all the millions of smart phone users who can't properly consent to these apps and their permissions because they don't have the knowledge to know what they're actually consenting to—the great thing is that I can choose not to install these apps. And I don't!
I don't have the same choice with cameras everywhere that feed into a company with a security team run by donkeys and that provides minimal to no oversight to the government bodies using the camera data to do an end run around the fourth amendment.
Uh... it's also the cell phone companies that triangulate every powered phone at all times and provide that info to data brokers, police departments, and intelligence agencies.
thanks for the HN community - the video is how I ended up here and its one of the few social media-esque sites I bother visiting. Taught me a pile of things about coding and CS that weren't in my mechanical engineering degree.
I thought this video was a lot better than the Veritasium video. The Veritasium video was awkward. I think they tried to follow the formula from the (excellent) blue led video that performed so well, but it just didn't work.
Disagree, I thought the Veritasium video was fantastic. You understand how the machine works in depth, the history of its development and challenges it encountered, and hear from people actively working on it. It’s a science lesson and history lesson. Like usual, they keep the video engaging and focused on the story, while still keeping a lot of depth with the science. It’s a great format
Tailscale is not marketed as an "anonymity VPN". You're still using the devices in your Tailnet.
Tailsacle provides managed, policy-driven secure connectivity, where the network admin controls access, and where packet payloads are end-to-end encrypted between their nodes using device-to-device links that are WireGuard-based. Their TCP relay system (DERP) helps connectivity when direct peer-to-peer isn’t possible, but traffic through DERP still remains end-to-end encrypted.
Reverse path is available in the contextual menu, and also in the right sidebar under Subpath Operations when you select a subpath inside a path that contains multiple subpaths.
Fill rule / winding can be changed from the paint menu (the one with the colored circles that expands for fill/stroke options).
reply