I agree looking forward to your whitelisting of the piratebay in ur search engines and the modification of the llms you have invested in helping with such activities.
A trained Gen. AI model does not just view it though. It generates content out of it which is copying and prohibited by plenty of licenses (GPL-licensed open source projects for example).
I think the copy they're referring to is the initial one that puts it on the Internet without a paywall. Not those that come along after and take a copy.
As others have said, it's all about your threat model.
For me, I keep mic and camera off at all times until I need it. Its a slight nuisance, but I'm nearly sure that it covers all the bases.
I could go hardcore and physically disable the mic in my phone, then only use earbuds for my mic. That's a bit much for me, and maybe my situation is a bit much for you.
I guess they could, but you will have to consider the purpose for getting meta data from the visitor. Most of the time it is just used for styling purposes to enhance your experience, blocking JS completely breaks alot of websites today's because they are often rendered using Js based front-end frameworks.
Look for a JS blocking extension, try out what works for you and spend some extra time tweaking it for websites you visit often, then you don't have to rely on a specific browser.
And if you are going for anonymity on the web you will be sticking out like sore thumb if you block something. Being anonymous works best when you are hiding in the masses, what you want is alot of computers reporting a similar setup, then if is very hard to pinpoint who's browser belongs to who. A good example is never using the Tor browser in a maximized window, because then your screen resolution is an fingerprinting factor.
Sounds like you trust iOS sandboxing. I have my suspicions it’s not perfect, so how big of a deal it is depends on your threat model. If I’m on iOS I tend to manually enable the camera if I ever need it, and I also avoid using apps when possible.
If I needed to use an app daily that requires camera access, I might change my habit because that sounds like a lot of work.
I agree. To your last point, I think you need to add more nuance. Lots of apps can take pics and thus require access same as mic. It’s not always a red flag until it is, which naturally should bring you back to a threat model you are comfortable with when analyzing whether permissions are valid
Privacy
Newest
This magazine is not receiving updates (last activity 0 day(s) ago).