I've said it before and I'll say it again: the most persistent, resourceful and difficult adversaries to secure against are kids behind parental/school controls and employees behind corporate firewalls: #infosec https://www.washingtonpost.com/technology/2019/10/15/teens-find-circumventing-apples-parental-controls-is-childs-play/
@okennedy This problem already exists, you have a central mastodon sysadmin who isn't an expert in these areas and likely doesn't share your views as the one abusing the #hatespeech hashtag. With my approach the user at least has a recourse if they discover someone in their feed is abusing tagging--one click and it's resolved.
Phase one is to get the tagging feature in place. Phase two is to expand it to give individuals even more control over what they filter and more visibility into it.
@okennedy It's a crowd that you explicitly choose (like how you can choose whether you see boosts from someone you follow). You won't see bullying or tribal behavior unless you follow a bully or tribe and choose to see their tags. I give examples in that link.
@okennedy The approach I'd like to take is something I documented in this feature request: https://source.puri.sm/liberty/smilodon/issues/6
In essence, allow users to add custom hashtags to posts, allow their followers (optionally) to see them, search/filter on them.
Giving users the power to moderate their own feeds is the key. Centralized moderation will always be flawed--a company can never represent your sensitivities as well as you and your peers (and will likely bow to outside pressure to censor, whether it's China or groups of users).
https://www.vice.com/en_us/article/a35yke/tech-companies-didnt-plan-for-chinese-censorship
@zemmert Back in my day grub.cfg contained references to actual kernels and initrd files. Now it's some kind of crazy dynamic bash script...
I just got rickrolled by @kyle
This is among the reasons I never post pictures of my son. I understand and accept risks to my own identity, but I don't own his online identity--I'm merely a steward of it until he's an adult. I hope at that point I can hand it off to him untarnished and unexploited. #privacy
https://www.nytimes.com/interactive/2019/10/11/technology/flickr-facial-recognition.html
@blacklight447 It's from lava flows.
Yes, we know you're excited; Yes, you can see the anodized chassis we got into this Aspen batch; Yes, we are asking you to be patient as we incrementally ship through tens of thousands of Librem 5 phones over the next handful of months; Yes, you will get yours. Yes, you will be impressed. @purism #librem5
It's called #Hacktober because it's finally cold enough to walk around in a black hoodie.
Librem 5 - first run walk through video https://youtu.be/Gvnt78mK-Ac #Linux #LinuxPhone #LinuxMobile #LinuxSmartphone #smartphone #Purism #Librem5 #Librem5Aspen #PureOS #GNOME #privacy #security
An amazing fact about this calculator: not only does it work without batteries, it works without access to my address book, location, and photo album! They were advanced in the olden days. #privacy #technology
My run through of the Librem 5 privacy and security-focussed mobile phone... What a joy to finally have it in my hands! My congratulations to the extraordinary team at Purism.
https://invidio.us/watch?v=Gvnt78mK-Ac&hl=en-US&local=false&autoplay=0&subtitles=%2C%2C #privacy #security #librem5
My son successfully navigated my "MacGuyver obstacle course" featuring a lockpick set high out of reach, bomb-diffusing clues inside a padlocked bag, and a snap circuits "bomb" behind a locked bathroom door. #prouddad #lifeskills
Sure, Spot is creepy, but on the plus side I'd be one step closer to owning my own "Rat Thing" and turning my van into Ng's "wheelchair" from Snow Crash! #vanlife https://www.youtube.com/watch?v=wlkCQXHEgjA
Technical author, FOSS advocate, public speaker, Linux security & infrastructure geek, author of The Best of Hack and /: Linux Admin Crash Course, Linux Hardening in Hostile Networks and many other books, ex-Linux Journal columnist.