"#3nweb is a set of protocols that sincerely implement Principle of Least Authority #pola in services with #clientserverarchitecture ... No plain text on a server... No unnecessary metadata on a server... Nothing to steal from the server" #toread
I wrote a blog post that's a fairly detailed how-to on conducting usability testing for free software: https://samuelhewitt.com/blog/2019-08-27-how-to-run-a-usability-test-on-free-software-linux
It's gonna take a lot to drag us away from you
There's nothing that a hundred nodes on Tor could ever do
I wish domains weren't all trackin' ya
Gonna take some time to build a `net without those ads
"The truth is that a motivated mob can target anyone, marginalized or not. We would all benefit from effective anti-harassment tools... We suggest that #userempowerment via client-side features is a more robust and safer approach." #libremone
https://puri.sm/posts/curbing-harassment-with-user-empowerment/
Prepaid SIM cards & mandatory #SIMcardregistration are especially widespread in Africa, allowing for a more pervasive #masssurveillance system of people using prepaid SIM cards, as well as exclusion of people who can't
Want to know more? 👉🏼 https://www.privacyinternational.org/long-read/3109/africa-sim-card-registration-only-increases-monitoring-and-exclusion
"Milosevic's well-researched study... points towards new policy solutions... [The author] argues that cyberbullying should be viewed... as part of the larger social problem of the culture of humiliation." #harassment #libremsocial #toread
Very much enjoying Nicky Case's explorable explanations and thought-provoking minigames! #freeculture
"Moving forward, we aim to make simple security the default. Security features are enabled and cannot be disabled; enhancements are applied when you update. Experimental security features are disabled by default, but you can enable them at any time." #libremone #security #ux
https://puri.sm/posts/librem-one-design-principles-simple-secure-applications/
@davidrevoy Your illustrations bring the user personas in our recent blog post to life! Thank you 😺
"In this post we will outline the touchstones we have used to do just that–engineer trustworthy services that everyone can use... We hope it will facilitate communication with friends and colleagues as we hack towards a common goal…" #libremone #userstory #userpersona
https://puri.sm/posts/librem-one-design-principles-services-you-can-trust/
I wrote a piece on the @purism blog on why consent is critical for #privacy, the tech industry's failure to get consent, and as a result how "Privacy has become the tattoo removal of the information age". https://puri.sm/posts/consent-matters-when-tech-shares-your-secrets-without-your-permission/
Client-side heuristics beat human-maintained lists in #PrivacyBadger - perhaps they could be useful elsewhere? #designpattern
"The techniques used by trackers are always evolving, so Privacy Badger’s countermeasures have to evolve, too. In the process of developing the new cookie-sharing heuristic, we learned more about how to evaluate and iterate on our detection metrics."
This is a fantastic long read from Valentina Pavel via @privacyint
"If we keep our focus primarily on figuring out data ownership, we face the risk of sidetracking the discussion onto a very questionable path. This is an open invitation to develop new language for clearer conversations and to better shape our demands for the future we want to see." #scenario4 #datarights
https://privacyinternational.org/long-read/3088/our-data-future
Do you like #ruby and pleistocene megafauna? Then you might be interested in this position!
Purism is a very progressive team, we encourage all interested people to apply, regardless of location, income, gender, age, race, religion, skin, height, weight, sexual orientation, or any other personal trait(s). We do not discriminate and are proud to operate a safe-work-place. More details in the link.
Just revisited "Encrypt All Sites Eligible (EASE) Mode" in #httpseverywhere
Great workflow that 1) warns you when visit an HTTP-no-S domain and 2) allows you to disable the warning for that single domain, if you trust it... and all intermediaries. 😲
I tested with http://internetbadguys.com since example.com uses HTTPS these days. 🔒
Read more here: https://www.eff.org/deeplinks/2018/12/how-https-everywhere-keeps-protecting-users-increasingly-encrypted-web
"WebRTC WG has asked for privacy and security considerations around the disclosure of a user's local IP address in #webrtc "
https://www.w3.org/wiki/Privacy/IPAddresses
You can prevent this with, for example, #ublockorigin or #privacybadger - see https://github.com/gorhill/uBlock/wiki/Prevent-WebRTC-from-leaking-local-IP-address for some discussion.
My favorite response to #libremone so far: "I don't know about this... Names Sound to political biased (#liberal) and federal (#fediverse) to not suspect undercover #NSA devs involved."
You got me 🕴
Free software professional. Free culture enthusiast.
Opinions are my own. (If not me, who else?)