• 3 Posts
  • 436 Comments
Joined 4 years ago
cake
Cake day: January 17th, 2022

help-circle

  • utopiah@lemmy.mltoPiracy@lemmy.mlThe way of the pirate
    link
    fedilink
    English
    arrow-up
    2
    ·
    21 hours ago

    To be clear I don’t think anybody wants to pirate anything.

    I think most people who met an artist creating content they admire absolutely want to help them make more.

    But… when somehow this artist get “represented” by an absolute asshole who tries to get as much money as possible while breaking all the way we have to actually enjoy the art, convince more artists to do the same, coerce others who refuse then repeats the cycle worsening the situation for everybody, including for people who do not even want to be involved, … well fuck that.





  • Historical context : it’s a 1yo post.

    TPM itself isn’t the problem. TPM itself technically might be a good solution, what the FSF precisely put forward is “out of the user’s control”. They even mention how it’s not about theoretical ideas but how it’s actually used. If Microsoft gets to decide HOW your computers works DESPITE you wanting NOT to behave that way AND it makes Microsoft itself, or its partners, even more entrenched then it’s a serious problem, it means “your” computer is their computer.

    What we have all witnessed is that bit by bit OSes like Windows, but also MacOS and Android, are not simply providing stores or tightly controllers channel (with fees for themselves) but ALSO removing entirely, or making it radically harder, to install software the user actually wants to install (not malware).

    It’s not about TPM, it’s as usual about who control your computer.








  • Worthwhile yet tricky. Companies like OpenAI, Google, Meta, etc are full of experts in statistics and they have access to a lot of storage space. If use a service from those companies, say 4hrs per day between 7am and 9pm, at a certain frequency, e.g. 10 requests / hour, then suddenly, when you realize you actually do not trust them with your data, you do 10000 req/hr for 1hr then that’s a suspect pattern. Then might be able to rollback until before that “freak” event automatically. They might still present you as a user your data with the changes but not in their internal databases.

    So… I’m not saying it’s not a good idea, nor useful, but I bet doing it properly is hard. It’s probably MUCH harder than do a GDPR (or equivalent) take out request then deletion request AND avoiding all services that might leverage your data from these providers.







  • Agree but nobody forces you to use anything except ProtonMail or ProtonVPN. In fact I have a visionary account and I mostly just use ProtonMail. I do use ProtonVPN but I also have WireGuard. Also my ProtonMail addresses are behind domains I host. If tomorrow I decide to switch away from Proton, I can.

    So… sure Proton is not perfect and centralization is bad but IMHO it’s like saying Firefox is imperfect so it’s fine to use Chrome or Chromium browsers. Imperfect alternatives to BigTech and surveillance capitalism is better than relying on the things you hate until something “perfect” never comes along.


  • something watching, logging connections to everyone connected to that torrent

    Might be, FWIW there are quite a few ways to torrent in a rather private way, namely require encrypted connection, have a blocklist, require to be behind a VPN, etc … but in the end you still share data with strangers, that’s the core premise. The whole point is to facilitate the sharing of data reliably but then who joins the pool is outside of the protocol itself.