this post was submitted on 27 Oct 2024
83 points (97.7% liked)

Asklemmy

43700 readers
1546 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
 

What I do is to run the exiftool to strip all the metadata from the image. Next, I check if there are any identifying details in the image like landmarks or background details (e.g. stuff on my whiteboard). And finally I check for the unwanted reflections or for the setup that could be recognised outside the community I share the photo with. Last but not least, I never share a photo in more than one place.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 3 points 12 hours ago (1 children)

The CIA and NSA were able to remotely access any device or social media account without the owner knowing, all the way back as early as the early 2000's. Edward Snowden revealed this to an apathetic public. If they could do that back then without AI, I can't imagine what they can do now.

[โ€“] [email protected] 4 points 11 hours ago* (last edited 11 hours ago)

Probably significantly less actually. Because all the encryption and communication protocols are open source and regularily audited, they have become more and more secure. All sides of this conflict have an interest in these systems being secure because everyone indcluding the feds themselves are using them. From looking at actual cases they have to either wait for a zero day to infiltrate a phone remotely or physically compromise it (airport, etc).

Back when every country was developing its own IT systems, it was different, but now everything is globalized. If Russia/Iran/China is suffering from a 0day, chances are the US is suffering from it aswell.