• 0 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: August 19th, 2023

help-circle


  • Someone made a mistake here. It’s not getting your IP address. An IP address is assigned by the gateway when you’re connected to an access point. An IP address is not an identity. They are always changing and can be shared. This has already been tested and upheld in court.

    It’s actually collecting your MAC address. Which is exchanged when your phone or tablet scan nearby WiFi points or Bluetooth devices. However, this can already be defeated. By default iOS and Android both have the option to randomise the MAC address in intervals. Making it extremely difficult to prove anything. This feature exists because the devices real MAC address never changes. It is unique. Alternatively, users can disable WiFi and Bluetooth scanning entirely. However, your device no longer participates in the Find My Devices program by Apple and Google, location does take longer to acquire in some scenarios, and accuracy may take longer to triangulate.











  • From their own privacy policy they outline what they do:

    For research and development purposes, we may use datasets such as those that contain images, voices or other data that could be associated with an identifiable person.

    To provide location-based services on Apple products, Apple and our partners and licensees, such as maps data providers, may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device.

    Apple’s websites, online services, interactive applications, email messages, and advertisements may use “cookies” and other technologies such as pixel tags and web beacons.

    We also use personal information to help us create, develop, operate, deliver, and improve our products, services, content and advertising

    At times Apple may provide third parties with certain personal information to provide or improve our products and services, including to deliver products at your request, or to help Apple market to consumers.

    Apple may collect location, IP Address, network information, Bluetooth information, connected devices, accessories, personal demographics, browsing history, browser fingerprint, device fingerprint, search history, app data, usage data, performance, diagnostics, product interaction, transaction information, payment information, purchasing records, contacts, social graph, watch history, listening interests, reading list, call metadata, device information, messaging metadata, email addresses, salary, income, assets, health data, ad interaction, in-app purchases, in-app subscriptions, app downloads, music downloads, movie downloads, TV show downloads, Apple ID, IDFA, Random Unique ID, UUID, IMEI, Hardware serial number, SIM serial number, phone number, telemetry, cookies, Nearby WiFi MAC, Siri request history, Web sign-in, songs played, play and pause times, playlists, engagement and library.

    Literally all of this is what Google does. The only thing Apple does differently is hinder 3rd party apps to a greater degree, whereas Google is more permissive. But to be fair, Google has been improving the Privacy features of Android with each version.

    https://tosdr.org/en/service/158





  • Balancing, customer needs, limitation of hardware/infrastructure. Copper doesn’t handle symmetrical download and upload as well (this is where fiber comes in). There can be too much noise resulting in degraded consistency. Its prone to interference and leaks. To improve reliability, you get asymmetrical plans. Most people just want download. Which has historically been the cheaper choice. An example local to my area, a home plan will be 800 down and 20 up. A business plan will be 500 down and 300 up. The business plan costs more.


  • Your use of the Platform is licensed, not sold, to you, and you hereby acknowledge that no title or ownership with respect to the Platform or the Games is being transferred or assigned and this Agreement should not be construed as a sale of any rights.

    From the Blizz terms.

    WoW has always revolved around having a server handle everything and your client is just the textures/models viewer where you tell the server what to do, I have been fine with this. But I do agree, it should say something else on the button. Other games that are not MMO shouldn’t be a “license” to play. If you buy it, you can play it whenever and wherever. Features that are not multiplayer should work regardless. Some things just shouldn’t be tied to a server. I really despise modern gaming because of this.

    Anecdotal experience: Gran Turismo Sport recently lost its servers. When they went down, the Mileage Exchange shop went with it. This means all the cosmetics for cars. and a few unique cars, are now unobtainable for future players. PD could have patched the shop to be a complete list of everything and you buy it with the plethora of points you will collect in the future as you race. But no, they didn’t.


  • Your entire statement here stems from not knowing what you’re talking about. That’s OK. I’ll provide some insight.

    Secure Boot is a security feature of UEFI that only allows trusted, cryptographically signed operating systems to boot. The nature of this prevents rootkits. Software that runs before the OS and injects itself. BIOS has many hard limitations and disadvantages over the modern standard that is UEFI. Your comparison going from 32 to 64 bit architecture is quite fitting. It’s not that different. There are many hard limitations and disadvantages to 32 bit. It’s unfit for today’s standards due to lack of features and security. All aspects of technology have to move forward.