lurkerlady [she/her]

  • 28 Posts
  • 81 Comments
Joined 3 years ago
cake
Cake day: March 28th, 2022

help-circle

























  • lmao the company running this, Hi Auto, is also an israeli firm

    from what i can tell they hook into google voice’s api and then hook the output into an llm to respond. the order is put into their system through RAG. this is like, script kiddie shit but they have a company of 50 people doing it (with 12 actual programmers). they also advertise 90% accuracy of the order which is fucking abysmal, any legit data scientist would be ashamed of such a low rate. it should be noted that accuracy is usually measured per token, so imagine it getting 10% of your syllables wrong in your order, which can end up with an order that is very wrong and could trigger the wrong RAG (ordering something you dont want). some of this is likely due to issues with audio quality from shit ass drive thru mics, loud motors, and bad noise cancelling. you can get a much higher accuracy spooling up a random local speech+llm model at home while picking your nose



  • Krolden is taking issue that they can see the vpn traffic at all, as in they can see that youre using a vpn (re: ISP knows who you are) and can sell that info to third parties who will now use your identity associated with that IP address (because ISP sold them info that the VPN connection came from you)

    theres ways around this of course and its actually somewhat easy to measure how big your fingerprint is. most sites of course wont have access to this paid info so reducing fingerprint is only useful to hide from google or cloudflare, and even then they wont know specifically what data you have, just what IPs you accessed. also since so many people use the same VPN it makes it very difficult to track you, you need to have a large fingerprint which can be mitigated by using linux (or with piracy, having a separate server that doesnt fuck with anything but torrents and so on)

    ISPs can also tell if youre using i2p or tor so ultimately its just a masturbatory argument, of course nothing is perfect, we all know that shrug-outta-hecks the only way to be truly secure is to steal internet from someone else without them knowing who you are, and you also need to be sure they dont have cameras and you have a sophisticated setup with qubes + vpn + (maybe) tor depending on what you want to do. this is of course an absurd amount of security for looking at pig poop memes on hexbear


  • And now we’re getting back to the original point of this new secret protocol, it hides that its vpn traffic, at least to current systems. I’ve been able to visit sites that normally block me or limit me. From what I can tell it reduces speed by half or so but if your speed is already good its usable, whereas something like TOR drops it all to a crawl, like 300kb/s if youre lucky. Dial up shit. This new protocol implementation good for daily driver obfuscation


  • as to 2 i do use wireguard and so on on occasion but its not really a good way to obfuscate who you are to some random website or bypass a firewall (unless you own a server in china or something)

    ive heard of i2p but afaik it has similar issues with slowness as tor, hosting your own exit relay from that list of isps is still going to result in excessive latency

    im talking stuff like daily driver privacy, not ‘organizing a revolution’ privacy, which really shouldnt be done on the internet to begin with


  • If you read about how it was chosen it was elected by a community poll and they mentioned they didnt really verify anything. Yeah, ridiculous thing to do, but possible for a lib that doesnt know what bellingcat is, and they later apologized shrug-outta-hecks take it as you want, theyre obviously libs and the other alternatives arent any better, and are probably worse

    you could always host your own mail of course but that has its own issues too, you obviously cant host your own vpn so the only option is tor which can be very messy to use regularly