lurkerlady [she/her]

  • 14 Posts
  • 63 Comments
Joined 3 years ago
cake
Cake day: March 28th, 2022

help-circle






  • lurkerlady [she/her]@hexbear.nettomemes@hexbear.net___
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    1 month ago

    So like, unless youre really digging into wireshark or something over a long time, you really dont know what connections are encrypted or unencrypted coming from your OS. Thats more what I’m referring to. Certain OSes like whonix have safeguards for this, and linux in general is much better about this. Its hypothetically possible a malicious actor could hijack an operation that isnt encrypted coming from your OS to bork you.

    And yeah tor browser on its own without JS and high tracking prevention is the way to go if you dont want a big hassle dealing with your OS. I was more referring to TORing all of your computer traffic, which should only be done with specific OSes. Mullvad browser with vpn is fine for the vast majority of people and it doesnt reduce speed a lot like TOR does.


  • lurkerlady [she/her]@hexbear.nettomemes@hexbear.net___
    link
    fedilink
    English
    arrow-up
    24
    ·
    edit-2
    1 month ago

    Tor can be very dangerous if you don’t compartmentalize it enough and use the wrong software with it. Its pretty well documented that if you request a normal http page (not https) malicious tor nodes are constantly checking for it so they can attempt to serve you bad shit to steal info. You never really know when your computer on say, a windows machine, will make a bad request. So it becomes imperative to use operating systems and technologies that limit that issue. (Re: use tor only on the tor browser, or use qubes+whonix to compartmentalize potential bad requests).

    The most secure ‘every day’ thing someone can do is use almost any linux distro, mullvad browser (or a normal hardened firefox), and a trusted vpn (proton, mullvad, ivpn, out of these three mullvad is probably the best).

    the most secure thing possible (re dont do this its ridiculous for 99.9% of people) is probably a sneaky self-made wireguard vpn entry node + tor + qubes/whonix. and by sneaky wireguard vpn i mean doing stuff and things in order to not pay for an ISP with your vpn server. that means you have pivpn or something setup on a hidden raspberry pi on a network you probably dont have permission to run vpns on.



  • lmao the company running this, Hi Auto, is also an israeli firm

    from what i can tell they hook into google voice’s api and then hook the output into an llm to respond. the order is put into their system through RAG. this is like, script kiddie shit but they have a company of 50 people doing it (with 12 actual programmers). they also advertise 90% accuracy of the order which is fucking abysmal, any legit data scientist would be ashamed of such a low rate. it should be noted that accuracy is usually measured per token, so imagine it getting 10% of your syllables wrong in your order, which can end up with an order that is very wrong and could trigger the wrong RAG (ordering something you dont want). some of this is likely due to issues with audio quality from shit ass drive thru mics, loud motors, and bad noise cancelling. you can get a much higher accuracy spooling up a random local speech+llm model at home while picking your nose