This is a good idea, as it might eventually lead to policies or laws that would reduce the spam.
I wouldn’t get my hopes up for resolution any time soon, though. Keep in mind that some of the biggest influence campaigns targeting US politics are run by foreign parties, and bulk text messages are cheap and consequence-free. Sadly, stopping it might require changing your phone number.
Yes, of course they could. Generating an image fingerprint is not all that computationally expensive by today’s standards.
Is it unique enough to track you? It doesn’t have to be, since online tracking generally keys off of a set of data, rather than a single item. But just for the sake of argument, consider that services like tineye and google images have pretty good success at matching images even with no additional data.
Is it (or will it eventually be) worthwhile for data collectors? You would have to ask them.
Indeed, protocol is independent from implementation language, but that isn’t the question at hand.
Do you know whether Beehaw will still federate with the lemmyverse (and therefore the rest of us) after moving to Sublinks?
That could also mean client API-compatible, so Lemmy apps would work with it, which doesn’t address federation.
Will it federate with Lemmy? I would miss you folks.
Who cares? It’s run by reactionary incels, transphobes, and racists.
Wait until you find out who runs Lemmy development.
Anthony Bray the convicted burglar?
Tell me you’re an opinionated novice without telling me you’re an opinionated novice.
(edit:specificity)
Use Tor.
Do you mean Tor Browser? Because using Tor alone won’t stop fingerprinting.
Wildermyth is a lovely combination of storytelling and xcom-style combat, with a genealogy system and chances for your heroes (and their descendants) to reappear in future games.
I think that was sometimes true in the past, but they ended that practice years ago.
Related: A very similar question posted by the same person yesterday.
How to turn them square?
I don’t think yt-dlp has built-in image cropping, so it’s just going to download thumbnails in the resolutions provided by the server. (See the --list-thumbnails option.) To crop what you download, consider a tool like ImageMagick.
Obviously you need someone joining the room for the room metadata to be shared between homeservers.
Well then, your assertion that Matrix gives it freely is false.
Not so with Matrix, where a joining homeserver get full retroactive access to all the room metadata since the room’s creation.
This is false, too. Historical event visibility is controlled by a room setting. (And if you don’t trust admins of a sensitive room to configure for privacy, then you’re going to have bigger problems, no matter what platform it’s on.)
you really need to stop privacy LARPing
LARPing? I’m not the one stirring up drama with falsehoods and patronizing snark, am I? Farewell.
Matrix stores all this info and gives it freely to other servers retroactively(!)
Can you show me the part of the spec that allows a server with no room members to get private room info from another server? I’m skeptical, but if true, I believe that would be worth reporting as a bug.
network layer sniffing (which is anyway much harder to do)
You’re funny.
The network layer of all internet servers reveals almost everything you listed. Signal has the same problem, and there’s nothing they can do about that. The only way to avoid it is to use a completely peer-to-peer model (Matrix has started work on this, btw) and avoid communicating across network routes that can be monitored.
There might be one exception, depending on what you mean by “Accounts”: The user IDs participating in a room can be seen by server operators and room members. But then again, server operators can already see their users’ IP addresses (which is arguably more sensitive than a user ID), and I believe room members have to be allowed into the room in order to see them. For most of us, that’s fine. Far from a disaster.
Human behavior is funny, isn’t it? No matter what the topic, there are always people around who like to repeat criticism they heard from someone else, even if it’s so vague as to be useless (“metadata disaster”) or they don’t understand the details at all.
It’s not a disaster. A few minor bits of metadata (avatars and reactions, IIRC) haven’t been moved into the encrypted part of the protocol yet. If that’s a problem for your use case, then you might want to choose a platform with different flaws, or simply avoid those features. It’s already good enough for the needs of many privacy-minded folks, though, and it continues to get better.
I couldn’t bring myself to watch more than half of this.
tl;dr: This video is a misleading, sensationalist, bad-fath, hit piece. It’s constructed upon faulty logic, fear of things used or supported by governments, and a single anonymous person’s poorly-reasoned conclusions.
Have you considered using the
at
andshutdown
commands together to accomplish this?