• 4 Posts
  • 2.3K Comments
Joined 2 years ago
cake
Cake day: June 23rd, 2023

help-circle

  • The common topological targets of eminent domain are problematic and obviously someone like Robert Moses was giving extreme reverence to the rich. But regardless of who was damaged by his eminent domain details, the value that it added for everyone was enormously positive, and would have been even greater were he not a racist. I’m specifically talking about his parks and railroads as detailed in the Power Broker.

    The legal method he was able to leverage to build infrastructure should be excercised more broadly vs land-trusts, and holding companies like america’s ancient rail barons. Though you don’t even need to go that far. Just use it to reclaim abandoned rail-lines + RoW. Yes it’s a payout to the railroad’s, but it’s an enormous resource through the heart of many cities. National rail expansion merged with amtrack? new parks, bike trails, etc etc. It could be used to revitalize the very neighborhoods that were most hurt by past abuses.





  • PowerCrazy@lemmy.mltoProgrammer Humor@lemmy.mlZero Trust Architecture
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    11 days ago

    Ultimately your concerns stem from the philosophy of privacy, but you are weak on what practical privacy means. You have to give up a certain amount of privacy to participate in society at all. This is the case regardless of any technology. Once you decide you need a cell phone, you now have a tracking device on your person that can be used by anyone that wants to track you, specifically. You cannot prevent this regardless of what you do. Assuming you are not a person of interest for a nation-state, this exchange of privacy for convenience is rational.

    There are things you can do in-order to increase your privacy in any un-trusted network though. For example: MAC-address randomization. DNS Proxies, VPNs, Privacy focused Browsers block-lists no-script etc etc.

    Not all of these are relevant in all situations, and all of them can be made moot as soon as you login to some place. i.e. logging into a lemmy instance means that you now are uniquely identifiable and information can start being collected about you.

    Now the question of “trust.” i.e. you don’t “trust” your friends network? Why not? Any argument that you can make about not knowing their network applies 10-fold to the cell network that you have absolutely chosen to trust. So the measures that you take with your own device to protect it from the public phone network, are equally effective on any wireless network. And that is where privacy advocates start getting squirrely.

    tl;dr, if you have already taken the above steps, all untrusted networks should be treated the same according to your personal privacy envelope.


  • This is a great example of someone who has a lot of fear in their life that stems from ignorance, but tries to pass it off as something else. But make no mistake, you have a large gap in knowledge, and that knowledge gap combined with the paranoia of what you read from “privacy advocates” means your life is much harder and more insecure then you realize.










  • Cloudflare is in an interesting space. They are a service provider (ddos protection, scalable edge caching, SSL termination, etc) that allows the highly centralized internet to function. However they aren’t a gatekeeper at all. You only need cloudflare if you are in the top 5% of internet websites by volume. So when cloudflare has a problem, Lemmy isn’t affected, but Reddit is. My blog isn’t affected, but someone like https://blog.ipspace.net/ is affected.

    My personal browsing habbits meant I didn’t even realize there was a cloudflare problem until I read an article about it on Lemmy. Anyway, just a tangent, but as a network engineer I’m sure i’ll be interested in the RCA.