[-] jarfil@beehaw.org 5 points 1 day ago

That... depends.

Lemmy is just a carrier software, its license has nothing to do with comments.
Instances however, each have their own TOS and can enforce license controls.

Ideally, all comments should have a "license" field, so stuff like instances with ads on them, or subscription-only instances, or CC0/CC-AS only instances, could inform other instances of their rights, and avoid comments that don't meet their policies.

[-] jarfil@beehaw.org 6 points 1 day ago

I haven't done sandbox detection for some years now, but around 2020, it was already "difficult" as in hard to write from scratch... yet already skid easy as in "copy+paste" from something that does it already. Surely newer sandboxes take more stuff into account, but at the same time more detection examples get published, simply advancing the starting point.

So maybe TikTok has a few people focused on it, possibly with some CI tests for several sandboxes. I don't think it's particularly hard to do 🤷

[-] jarfil@beehaw.org 9 points 1 day ago* (last edited 1 day ago)

There is some irony to be had, in discussing this stuff on a page that starts by asking me to login, then to be good and disable my ad blocker, only to proceed with keeping half the text of the article as images so you can't copy+paste it... and even all the comments!

Anyhow...

https://www.boredpanda.com/tik-tok-reverse-engineered-data-information-collecting/?utm_source=twitter&utm_medium=social&utm_campaign=organic

😈 Thanks for telling us where you got the link from, I didn't really care. 😁

Static backup (possibly): https://archive.is/UD2SA

*Phone hardware (cpu type, number of course, hardware ids, screen dimensions, dpi, memory usage, disk space, etc)

Check out: https://amiunique.org/fingerprint

No app needed!

Using that as a baseline... the CPU type, memory usage, disk space, etc. are some extra data points freely available to all apps.

A developer can distribute an app with multiple versions, some targeting more modern and capable devices, some older and more limited. It's a feature, not a bug!

*Other apps you have installed (I've even seen some I've deleted show up in their analytics payload - maybe using as cached value?)

This is overreaching for an app that has nothing to do with managing other apps. Still, you may want some app with those capabilities... so let's call it "sus".

*Everything network-related (ip, local ip, router mac, your mac, wifi access point name)

Your IP is... well, you're using it to connect, they will see it, duh.

The rest is overreaching and comes into PI violation terrain, but can be used for geo location... the OS does it, that's the data it uses to fine-tune the GPS's location.

*Whether or not you're rooted/jailbroken

Typical feature for banking ad DRM protected apps. Nothing to see here.

*Some variants of the app had GPS ping- ing enabled at the time, roughly once every 30 seconds - this is enabled by de- fault if you ever location-tag a post IIRC

Best answered by a comment [1] (SEE BELOW).

TL;DR: more DRM stuff.

*They set up a local proxy server on your device for "transcoding media", but that can be abused very easily as it has zero authentication

This is somewhat sus, but a local proxy by itself, doesn't mean any sort of risk, or that it could be exploited.

For example, Tor can be accessed using a local proxy (although VPN mode is safer).

The scariest part of all of this is that much of the logging they're doing is remotely configurable,

Not exactly. It's how feature flags, and remote testing/debugging works too.

and unless you reverse every single one of their native libraries (have fun reading all of that assembly, assuming you can get past their customized fork of OLLVM!!!) and manually inspect every single obfuscated function.

This is worse (why do they use a custom OLLVM fork?), and obfuscation usually means they have something to hide. It's the opposite of security for the user.

They have several different protections ir. place to prevent you from reversing or debugging the app as well. App behavior changes slightly if they know you're trying to figure out what they're doing.

Not good, but unfortunately allowed. That behavior is shared by both DRM protected software, and malware.

There's also a few snippets of code on the Android version that allows for the downloading of a remote zip file, unzipping it, and executing said binary. There is zero reason a mobile app would need this functionality legitimately.

False.
There are two legitimate reasons: plugins, and DLCs.

It can be used for shady stuff, but is also a "feature, not a bug".

On top of all of the above, they weren't even using HTTPS for the longest time. They leaked users' email addresses in their HTTP REST API, as well as their secondary emails used for password resets. Don't forget about users' real names and birthdays, too. It was alllll publicly viewable a few months ago if you MITM'd the application.

Well, that's just stupid, there is zero reason to send data unencrypted.

They encrypt all of the analytics requests with an algorithm that changes with every update (at the very least the keys change) just so you can't see what they're doing.

Ehm... this is the correct behavior. See previous point.

They also made it so you cannot use the app at all if you block com- munication to their analytics host off at the DNS-level.

Sus... but see the introductory part of this comment. Should boredpanda also be banned?

TikTok put a lot of effort into preventing people like me from figuring out how their app works. There’s a ton of obfuscation involved at all levels of the application, from your standard Android variable renaming grossness to them (bytedance) forking and customizing ollvm for their native stuff. They hide functions, prevent debuggers from attaching, and employ quite a few sneaky tricks to make things difficult. Honestly, it’s more complicated and annoying than most games I’ve targeted,”

This is bad, and a reason to use FLOSS apps... but since it's been an accepted behavior for Privative Software, along with DRM... don't blame the player, blame the game.

No, seriously, blame the DMCA and friends. There is no way to at the same time "enforce DRM, keep a copy of all keys at a trusted third party, and keep users secure"... so the current situation is "you get none of those".


[1]

sr71Girthbird 39 points 1 day ago

Not OP but I work at a company providing video infrastructure, and one of our products is an analytics suite. It provides all the data he men- tioned and ton more. Turner, Discovery, New York Times, Hulu, and everyone's favorite company, MindGeek all use our Analytics, among hundreds of other large customers. Specifically where this guy says, "Some variants of the app had GPS pinging enabled at the time, roughly once every 30 seconds" that's called a heartbeat. The app or video player within the app has to have a heart- beat so that the player can detect if a viewer is still watching video etc. Our analytics + video player services send a regular heartbeat every 8 seconds. It definitely pulls in your exact location.

[-] jarfil@beehaw.org 6 points 1 day ago

an article about Xi Ping's government warning about USAian surveillance

Not possible. The CCP doest "warn", it orders to block the app/site/word/photo, and it never existed. Anyone daring to say that it did, or to warn of stuff the CCP didn't say, gets imprisoned or worse (see: the doctor who dared to warn abot COVID, instead of following CCP's truth).

[-] jarfil@beehaw.org 9 points 1 day ago* (last edited 1 day ago)

On modern Android, apps need to ask for each permission when they're about to use it for the first time. Not sure about Apple.

Google Play will also periodically revoque permissions to apps that haven't used them for some time.

[-] jarfil@beehaw.org 5 points 1 day ago

This comment © 2024 by jarfil is licensed under CC BY 4.0. To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/

No they don't. It's not only not applied to their comment, but also misnamed.

[-] jarfil@beehaw.org 16 points 1 day ago

doubted that a social media company had the resources to write such a program.

Em... writing a different manifest and asking the OS to reinstall itself, is not rocket science. Detecting that it's running in a testing environment and not asking for permission to access some types of data, is also quite easy. Downloading a different update or modules depending on which device and environment it gets installed to, is basic functionality.

It's still sneaky behavior and a dark pattern, but come on.

[-] jarfil@beehaw.org 2 points 2 days ago* (last edited 2 days ago)

You asked where do they get the data from... well, that's the answer 🤷

The numbers could be fictitious (you didn't ask whether they get "reliable data"), or they could be doctoring them themselves... but there is a number of companies whose work is to let sites put trackers that gather user data, so they can in turn use it as a point when luring advertisers.

It isn't "highly guarded confidential" information, websites would happily submit their access logs if that could make them look more appealing to advertisers... but they don't, because: a) they could be sending fake data, which would make the aggregating company lose face, meaning they won't accept self-reported data, and b) site logs contain a lot of users' personal information, sharing which could fall afoul of privacy legislation.

They may still have to pay for access to parse that data, or extract it from the data made publicly available (...which could still be doctored, but 🤷)

[-] jarfil@beehaw.org 4 points 2 days ago

Ah... I didn't catch on that. Nvm then.

[-] jarfil@beehaw.org 11 points 2 days ago

Keep in mind that "having a plan", doesn't say when that plan is to be executed.

If you asked me, every object launched into orbit, should have a safe de-orbit plan beforehand. Chances are, as more private entities get onboard launching space stations, there might be regulations put in place to require a de-orbit plan for the launch to get approved.

Getting a de-orbit plan for the ISS now, might be just a preemptive plan for when those regulations get enacted.

[-] jarfil@beehaw.org 8 points 2 days ago* (last edited 2 days ago)

There is no Lagrange point "North".

L1 is sunwards, L2 is counter-sunwards, L3 is on the other side of the Sun, L4 is Eastwards, and L5 is Westwards.

Going from LEO to L1/L2, requires a ∆v of 7.5km/s, which is comparable to the 9.4km/s ∆v required to go from Earth surface to LEO.

Meanwhile, the ISS keeps getting slowed down by Earth's atmosphere, and it only takes a ∆v of 1km/s or less, to plunge it into denser atmosphere for reentry.

48
submitted 2 months ago by jarfil@beehaw.org to c/space@beehaw.org
11
submitted 4 months ago* (last edited 4 months ago) by jarfil@beehaw.org to c/technology@beehaw.org

Brace for impact.

27
submitted 8 months ago by jarfil@beehaw.org to c/news@beehaw.org

Israeli troops and tanks launched a brief ground raid into northern Gaza overnight into Thursday, the military said, striking several militant targets in order to “prepare the battlefield” ahead of a widely expected ground invasion

6
Deleted posts (beehaw.org)
submitted 9 months ago* (last edited 9 months ago) by jarfil@beehaw.org to c/support@beehaw.org

It's unnerving to find an interesting post, with an interesting conversation, only to see it deleted (not even mod removed) with hanging replies in the inbox and no way to reply back.

Is there any feature that would allow continuing those conversations? Other than direct messages, which get "black holed" (no way to see own replies). Could these conversations be somehow continued, either recovered in Lemmy, or maybe via Mastodon?

270
submitted 10 months ago by jarfil@beehaw.org to c/technology@beehaw.org

The difference between the two security features is that Safe Browsing will compare a visited site to a locally stored list of domains, compared to Enhanced Safe Browser, which will check if a site is malicious in real-time against Google's cloud services.

While it may seem like Enhanced Safe Browsing is the better way to go, there is a slight trade-off in privacy, as Chrome and Gmail will share URLs with Google to check if they are malicious and temporarily associate this information with your signed-in Google account.

90
submitted 11 months ago* (last edited 11 months ago) by jarfil@beehaw.org to c/technology@beehaw.org

This time, straight from a patent granted to a blockchain company, with no accompanying paper or proof.

Edit: after reviewing the patent, and as pointed out by @floofloof@lemmy.ca, this is an incredible amount of BS. The patent's initial date is Feb 2020, issue date Dec 2021. It has no proof, because it claims to speculatively apply a possible theory by someone else, onto how to make a flexible Type II semiconductor out of a Type I semiconductor, in case this ever happens to be possible with that theory. Basically a patent troll waiting to see if someone happens to make possible the elements they've used in the patent, then jump in and claim an application.

Honestly, didn't know speculative patents like this were possible.

view more: next ›

jarfil

joined 1 year ago