1
0
Fork 0
mirror of https://git.sr.ht/~seirdy/seirdy.one synced 2024-09-19 20:02:10 +00:00

Compare commits

...

6 commits

Author SHA1 Message Date
Rohan Kumar
caea36777d
syndicate 2024-05-22 04:58:17 -04:00
Rohan Kumar
82fb39330f
New note: coercion and Windows Recall 2024-05-22 04:45:44 -04:00
Rohan Kumar
c4a9465f56
Joined bukmark.club 2024-05-22 03:06:31 -04:00
Rohan Kumar
682487c3d1
Join Sloop modern web directory 2024-05-21 23:00:26 -04:00
Rohan Kumar
5ec1973add
Split bullet list into paragraphs 2024-05-21 23:00:13 -04:00
Rohan Kumar
e4911721a3
Move slatecave to reciprocal links 2024-05-21 19:30:40 -04:00
3 changed files with 33 additions and 1 deletions

View file

@ -69,6 +69,8 @@ The {{<mention-work itemtype="WebSite">}}{{<cited-work name="1MB Club" url="http
- [Nerd Listings](http://nerdlistings.info/)
- [ooh.directory](https://ooh.directory/)
- [List-Me.com](https://list-me.com/)
- [Sloop Modern Web Directory](https://directory.sloop.nz/modern/)
- [BUKMARK.CLUB](https://bukmark.club/)
<details>
<summary>Pending directories</summary>

View file

@ -144,6 +144,7 @@ Sites that link back to me:
<a href="https://daudix.codeberg.page/about/">{{<picture name="b/daudix" alt="Daudix." width="162" height="62" class="pix">}}</a>
<a href="https://dj-chase.com/">{{<picture name="b/dj-chase" alt="DJ Chase." width="162" height="62" class="pix">}}</a>
<a href="https://astrid.tech/">{{<picture name="b/astriddottech" alt="astrid dot tech in glitchy distorted letters." width="162" height="62" class="pix">}}</a>
<a href="https://slatecave.net/railstation">{{<picture name="b/slatecave" alt="slatecave.net." width="162" height="62" class="pix">}}</a>
### Other personal sites
@ -151,7 +152,6 @@ Sites that link back to me:
<a href="https://itzzen.net/">{{<picture name="b/itzzen" alt="www dot itzzen dot net." width="162" height="62" class="pix">}}</a>
<a href="https://moth.monster/">{{<picture name="b/moth" alt="The word “moth” in a brown-on-orange palette next to a flat inverted moth icon." width="162" height="62" class="pix">}}</a>
<a href="https://tilde.town/~georgemoody/">{{<picture name="b/georgemoody" alt="Georgemoody." width="162" height="62" class="pix">}}</a>
<a href="https://slatecave.net/">{{<picture name="b/slatecave" alt="slatecave.net." width="162" height="62" class="pix">}}</a>
<a href="https://owlsroost.xyz/">{{<picture name="b/owlsroost" alt="Owls Roost." width="162" height="62" class="pix">}}</a>
<a href="https://easrng.net/">{{<picture name="b/easrng" alt="easrng." width="162" height="62" class="pix">}}</a>
<a href="https://viatrix.is-hella.gay/">{{<picture name="b/vivi-8831" alt="Viatrix." width="162" height="62" class="pix">}}</a>
@ -197,7 +197,11 @@ The following badges come from the sites they link to:
Other credits:
- The W3C CSS badge is from {{<mention-work role="doc-credit" itemtype="Article" itemprop="citation">}}{{<cited-work name="The W3C “validation” icons" url="https://www.w3.org/QA/Tools/Icons" extraName="headline">}} by the <abbr itemscope="" itemtype="https://schema.org/Organization" itemprop="publisher" title="World Wide Web Consortium">W3C</abbr>{{</mention-work>}}
- I took the WAI-AA WCAG 2.2 badge from {{<mention-work role="doc-credit" itemtype="WebPage" itemprop="citation">}}{{<cited-work name="Adding WCAG Conformance Logos" url="https://www.w3.org/WAI/standards-guidelines/wcag/conformance-logos/" extraName="headline">}} by the <abbr itemscope="" itemtype="https://schema.org/Organization" itemprop="publisher" title="Web Accessibility Initiative">WAI</abbr>{{</mention-work>}}.
- I cropped the "I ❤ Validator" badge from {{<mention-work role="doc-credit" itemtype="Article" itemprop="citation">}}{{<cited-work name="W3C launches Validator Donation and Sponsorship Campaign" url="https://www.w3.org/news/2008/w3c-launches-validator-donation-and-sponsorship-campaign/" extraName="headline">}} by the <abbr itemscope="" itemtype="https://schema.org/Organization" itemprop="publisher" title="World Wide Web Consortium">W3C</abbr>{{</mention-work>}}.
- The El Goonish Shive badge is from [an old archived version of its website](https://web.archive.org/web/20071223104609/http://www.egscomics.com:80/banners.html).
- Tildeverse badge made by {{<indieweb-person itemprop="mentions" name="DJ Chase" url="https://dj-chase.com/">}}.

View file

@ -0,0 +1,26 @@
---
title: "Coercion and Windows Recall"
date: 2024-05-22T04:45:44-04:00
replyURI: "https://hachyderm.io/@evacide/112481894385686328"
replyTitle: "Ive got some news for Microsoft about how domestic abuse works."
replyType: "SocialMediaPosting"
replyAuthor: "evacide"
replyAuthorURI: "https://hachyderm.io/@evacide/112481894385686328"
syndicatedCopies:
- title: 'The Fediverse'
url: 'https://pleroma.envs.net/objects/931a72b0-09e9-42c8-b727-7b7a029b791c'
- title: 'jstpst'
url: 'https://www.jstpst.net/f/technology/10008/coercion-and-windows-recall-cw-vague-references-to-domestic'
---
The best ways to improve opsec against coercion are to:
- Limit what can be taken (reduce what's stored on a device).
- Fake what you do have: use duress passwords or secondary devices.
- Last resort: use a hardware key that's deliberately easy to lose or break, so there's potentially no key to give up in a rubber-hose attack.
There's overlap between the three. A duress password temporarily limits what's stored on a device, and losing a decryption key is more or less the same as instantly wiping encrypted data to reduce what you have to offer. All come down to having less data to give when coerced into giving what you have. Operating systems should also obey this principle by storing as little offline data as possible, and providing duress safeguards for what must be stored.
Windows Recall captures an amount of offline telemetry comparable to parental-control apps [often used to control human trafficking victims](https://www.forbes.com/sites/thomasbrewster/2023/04/06/sex-traffickers-use-parenting-apps-like-life360-to-spy-on-victims/): the data encompass _everything_ potential victims do on their machines, without any duress protections. Presenting such a feature as opt-out seems like it's almost designed to hurt victims.
The decision-makers behind features like Recall, or invasive child-monitoring spyware, have likely never experienced this type of abuse. Or perhaps they are the abusive party at home.