@thenexusofprivacy@infosec.exchange cover
@thenexusofprivacy@infosec.exchange avatar

thenexusofprivacy

@thenexusofprivacy@infosec.exchange

A newsletter about #privacy, #technology, #policy, #strategy, and #justice.

Currently at @nexusofprivacy, but looking for a new home and so checking out infosec.exchange

This profile is from a federated server and may be incomplete. View on remote instance

clacke , to Random stuff
@clacke@libranet.de avatar

On Saturday, the Fediverse is celebrating it's 16th anniversary!

How are you celebrating?

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

@clacke great thread. It would be great to know more about the word fediverse was getting used in 2012, the The Federated SNS (Fediverse) Historical Timeline likes to a Twitter archive that doesn't show usage really picking up until early 2013. But then again that's usage on Twitter ... what about actually on the (proto-)fediverse?

thenexusofprivacy , to Random stuff
@thenexusofprivacy@infosec.exchange avatar

Some thoughts from @aendra on running a Bluesky moderation service that blocks screenshots -- including some htoughts on the fediverse as well.

https://www.aendra.com/some-thoughts-on-running-a-moderation-service-that-blocks-screenshots/

I'm a big fan of the XBlock screenshot labeler. If you subscribe to the default settings are to hid the images of the screeshots it detects and put the the equivalent of a content warning on the posts (although the text is still visible by default). [You also have the option to completely hide any post with a detected screenshot, but I sometimes do want to see the screenshots so I stuck with the default.]. The automatic detection is pretty good, although not perfect, and has different CWs for screenshots from Twitter, Insta, Tumblr, Bluesky, etc, so you can have finer control if you want.

Why do I like it so much? So many screenshots are "outrage posts" dunking on something ridiculous somebody's said on Twitter (or wherever), and I'd just as soon not see them! Of course, there are often useful screenshots as well; but I don't mind an extra click.

To me this is a great example of Bluesky's "composable moderation": a user-written service that people can take advatnage of if they want. Services like this don't replace platform level moderation, and if the platform moderation is bad that's a problem. But there are a lot of things that are acceptable at the platform level that many people would rather not see. It's similar to filters on Mastodon, which I also find very useful, but a lot more powerful.

thenexusofprivacy , to Fediverse News
@thenexusofprivacy@infosec.exchange avatar

Fork it! It's time for a Mastodon hard fork

https://privacy.thenexus.today/mastodon-hard-fork-2

A Mastodon hard fork that focuses on safety, community, accessibility, and working well with others has a great opportunity to improve safety in the fediverse, the dynamics of the Mastodon ecosystem, and fediverse software development in general. !

Potentially interested in getting involved? See the polls in the replies!

Contents

Part 1

  • A missing fork in the landscape
  • Okay, but why a hard fork?
  • There's a big elephant in the federated room (and I don't mean Mastodon)
  • An opportunity for broad participation and a cultural reset

Part 2

  • Safety is an especially good area to focus on
  • There are also a lot of other areas for improvement

Part 3

  • It's not as easy as it sounds ...
  • But it's not like it defies the laws of physics!
  • What about funding?
  • Make sure most of the funding goes to Black, Indigenous, Muslim, trans, queer, and disabled people

Part 4

  • It's not an either-or situation
  • A lot of open questions - and a lot of potential upside
  • Stay tuned!

There's a lot to discuss here, so this is a looong post. If there are some sections that interest you more than others feel free to skip around.

https://privacy.thenexus.today/mastodon-hard-fork-2

@fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

Fork it! It's time for a Mastodon hard fork proposes a new fork of Mastodon that focuses on safety, community, accessibility, working well with others -- and takes a community-driven and inclusive approach

If a project like that goes forward, would you consider helping?

Please pick all that apply! And, if you've got suggestions for other areas, please leave them in the replies

thenexusofprivacy , to Random stuff
@thenexusofprivacy@infosec.exchange avatar

@jasmin just wanted to say that I really appreciated your analysis of the Truth Social code -- and thanks also @eb for liberating it.

It's kind of sad that they've got some valuable moderation functionality that Mastodon doesn't. The ability to block a link seems useful, and so does marking a post as sensiitve (although obviously just like any other moderation functionality these can be used for censorship as well). Not sure about changing privacy level, my first reaction is that moderators making a private post public seems like a privacy violation; moderators making a public post private is fine from a privacy perspective buit I'm not sure about what use cases this is helpful for.

Here's the link for anybody who hasn't seen the writeup! https://jasminchen.dev/2024/analysing-the-source-code-of-truth-social/

And here's the background about how the source code got liberated: https://boehs.org/node/truth-social

(and hat tip to @fediversereport for the links)

thenexusofprivacy , to Random stuff
@thenexusofprivacy@infosec.exchange avatar

It's time for a hard fork of Mastodon (DRAFT)

https://privacy.thenexus.today/mastodon-hard-fork-draft/

This is a work in progress, so feedback very welcome! And, please check out the poll in the reply

Contents:

  • Intro
  • There's a lot of low-hanging fruit
  • Safety is an especially good area to focus on
  • It's not as easy as it sounds ...
  • But it's not like it defies the laws of physics!
  • What about funding?
  • Make sure there are funded leadership and project roles for Black, Indigenous, Muslim, trans, queer, and disabled people as well as others who have been marginalized in Mastodon's development history
  • Let a thousand forks bloom!
  • Clever conclusion! tbd

As the tbd in that last bullet implies, the conclusion isn't written yet. Like I said it really is a work in progress!

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar
thenexusofprivacy , to News from fediverse
@thenexusofprivacy@infosec.exchange avatar

Eight tips about consent for fediverse developers

https://privacy.thenexus.today/consent-for-fediverse-developers/

There's a difference in opinion in the on whether it's important to get consent to use somebody's public posts for a purpose they didn't originally intend it for. Some think this is just fine, or that it's enough to assume consent and give people the ability to "opt out" and withdraw consent. Others think that these uses should require informed, affirmative, "opt in" consent.

The good news is that this means there's a huge opportunity for fediverse developers here. From a strategy perspective, focusing on opt-in can be a powerful way to add unique value to an underserved audience.

Less positively, though, that's not how everybody approaches it. So there's a long history of developers writing or proposing fediverse search engines, scrapers, bridges and other services that use people's public posts without opt-in consent ... and suddenly being in the middle of a firestorm of criticism and feedback.

So if you're a developer working on a fediverse app or service and want to get it right – or just don't want to be the center of the next firestorm – here are a few suggestions.

  • Consent matters, even for public posts
  • Get broad feedback before launching – and listen to it
  • Honor existing opt-in and opt-out mechanisms
  • Include an additional opt-in mechanism for your service if it's not just a search engine or profile discovery (or something very close to them)
  • Make sure to communicate that you're taking an opt-in approach and honoring existing mechanisms
  • DON'T say the things that developers who ignore consent typically say
  • Be extra careful if you're a cis guy
  • Look at opt-in as an opportunity for a potential competitive advantage

@fediversenews @fedidevs

jerry , to Random stuff
@jerry@infosec.exchange avatar

Just took a look at fedidb.org. In terms of active users, Infosec.exchange the 5th most active mastodon instance, Infosec.town and fedia.social are the first and second most busy iceshrimp servers, and Fedia.io is the number one most busy mbin server.
That is pretty awesome!

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

@jerry congrats, and kudos to you for all the hard work!

thenexusofprivacy , to Random stuff
@thenexusofprivacy@infosec.exchange avatar

Big changes to the Oliphant blocklists, via @oliphant

https://oliphant.social/@oliphant/112157792053102057

Summary:

  • A revised Tier0 list (based on @Seirdy's Tier0 list, @gardenfence and the @iftas DNI list)
  • Other lists going away
  • git archives of blocklists from .social and other sites Oliphant used to use also going away

And interesting:

"You should still be able to use the Tier 0 Oliphant list and get a respectable list of blocks, though you'll notice certain more contentious entries like qoto and threads won't be on that list anymore"

Looks like at least one corner of the fedvierse is welcoming our new surveillance capitalism overlords!

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

@oliphant You provided a widely-used blocklist that included threads.net. Now, you provide a replacement blocklist filling the same role that doesn't include threads.net. That certainly seems welcoming to me!

If you don't want the Oliphant blocklists to be so welcoming to threads.net, there are other alternatives to maintaining that old list. For example you could provide two lists, Tier0 and Tier0-with-threads. Or you could even do two, Tier0 and Threads-blocklist. I'm sure there are other possibilities as well.

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

That's certainly true ... but the creation and distribution of the Oliphant blocklists does fall to Oliphant alone.

@thisismissem @oliphant

homegrown , to Random stuff
@homegrown@social.growyourown.services avatar

Hey Mastodon admins 👋

The "Authorized Fetch" (aka "Secure Mode") option makes your instance blocks more effective and better protects your users.

It has previously had a reputation for being incompatible with non-Masto servers and older Masto servers. However, I'm not sure it deserves that reputation any more?

I switched on Authorized Fetch last year and asked for feedback via a different instance. Only one person had problems, and their instance was on homebrew software.

🧵 1/2

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

useful, thanks very much @ilja!

thenexusofprivacy , to Random stuff
@thenexusofprivacy@infosec.exchange avatar

How to block Threads on Mastodon -- with screenshots! (UPDATED AGAIN)

https://privacy.thenexus.today/how-to-block-threads-on-mastodon/

Now with two options and a discussion of privacy tradeoffs!

Should the Fediverse welcome its new surveillance-capitalism overlords? Opinions differ! If you're one of the fediverse influencers who sees Threads arrival it as "historic" and "a glimpse of the future" ... well, you might want to skip this post.

But if you're one of the many many people on the fediverse who doesn't want to deal with Threads, read on!

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

I released an updated version of the post, using a different approach.

https://privacy.thenexus.today/how-to-block-threads-on-mastodon/

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

Here's another update tor "How to Block Threads on Mastodon", now with two different options and a discussion of privacy tradeoffs!

https://privacy.thenexus.today/how-to-block-threads-on-mastodon/

Thanks @LaurensHof and @renchap for the discussion of what information is (and isn't) shared with Threads when you visit a profile.

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

infosec.exchange is also federating, and @jerry also set up infosec.space for people who want an account on an instance that does't federate.

As somebody who's lften critical of Meta on the prvacy side I find it very ironic that they're making federatin opt-in at the user whereas on Mastodon it's opt-out 😂

@seb
@spmatich

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

:100a: PixelFed did add an opt-in for individual users ... Mastodon, not so much. Sigh.

@jerry @seb @spmatich

evan , to Random stuff
@evan@cosocial.ca avatar

Where were you on the day that @zuck joined the Fediverse?

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

Yeah, this is a situation where the fediverse's reliance on instance-level blocking means that instances and people that want to federate don't have good tools. With Threads' tolerance for hate groups (etc), account-level blocking's seems like it's going to be pretty vital. Can instances upload lists of individual blocks? How easy would it be to adapt infrastructure like FediBlockHole and FediCheck to handle individual blocklists?

@thisismissem @evan

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

that seems suboptimal. @thisismissem @evan

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

On the one hand that makes sense, on the other hand that means that every fediverse instance has to wait for Libs of Tik Tok to federate there before blocking them which seems ... suboptimial. @tchambers you often say "we have the tools" but it seems like this is a situation where we not only don't have the tool but it'll be hard to build.

@thisismissem @evan

hacks4pancakes , to Random stuff
@hacks4pancakes@infosec.exchange avatar

Every year I’m so absolutely hyped about the @pancakescon lineup but this year, dang. I’m so hyped. https://pancakescon.com/2024-conference-information/

Thanks yall for making my dream a reality.

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar
devnull , to Random stuff
@devnull@crag.social avatar

@thenexusofprivacy it's additional work to implement an allow-list for federation, although not much more than instituting a deny-list. What's easier is accepting content from everywhere, but I can definitely see how indiscriminately accepting content from just anywhere is a recipe for potential abuse.

I'd like NodeBB to support both, although it might not be available during alpha phase.

cc @jdp23

https://infosec.exchange/@thenexusofprivacy/111971972738150772

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

Well one clear lesson is that you absolutely need either an allowlist or a denylist. It's like the old maps that say "here there be dragons" except it's "here there be nazis, terfs, csam, and more".

I was just looking at the GoToSocial code and they have a very nicely symmetrical implementation of domain blocks and allows - https://docs.gotosocial.org/en/latest/admin/federation_modes/ describes how they work in blocklist mode and allowlist mode.
But I think one of the things that makes allow-list more challenging in practice for anything but "i only want to federate with this know list of instances" is that you have to build some kind of mechanism on top of that.

Of course mechanisms are also needed on top of blocklist mode, As long as most instances aren't bad actors (which has historically been the case today) and you don't mind a little abuse, doing it in reactive mode works okay ... and there's now infrastructure for importing and updating a list of "known bad actors". I could certainly imagine getting a similar list of "known good actors" but for historical reasons the current infrastructure doesn't really support that, or at least has never been used in that way. And what about when new instances start up? So actually making it work at scale is still something of an open problem.

@devnull @jdp23

dansup , to Random stuff
@dansup@mastodon.social avatar

In case you were wondering, @pixelfed Autospam is quite efficient!

Less than 3 MB of disk used after 9 months of running on pixelfed.social!

💅 https://pixelfed.blog/p/2023/feature/autospam-and-naive-bayes-the-grandfather-of-spam-filters-still-making-waves

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

@dansup Hopefully the rest of the fediverse would follow @pixelfed 's lead on this!

How did Autospam hold up against the current wave?

jerry , to Random stuff
@jerry@infosec.exchange avatar

Somewhere, Monday is awaiting my arrival.

video/mp4

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

@jerry remember, it's always Monday somewhere in the solar system!

maegul , to Random stuff
@maegul@hachyderm.io avatar

So for those curious about how is going, their numbers are approaching numbers now.

3M users, 124M posts
(as of recently, see https://bsky.app/profile/jaz.bsky.social/post/3kijxsrsfk32t)

Masto:

7.1M users, 807M posts
(https://fedidb.org/software/mastodon)

This is with masto hovering around these numbers all of 2023 and bsky hitting 2M users less than 2 mnths ago, all while behind invite codes.

There will probably be a point when bsky is “bigger” than masto and I’m guessing some will use it as a reason to dump on masto.

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

@maegul have there been any active user numbers on bsky? Mastodon's historical retention is < 15% so there are < 1M MAU today (not counting the broadly-defederaed "bad fedi" instances). Bluesky started invite-only which makes it easier to have a higher retention rate and it's newer so it wouldn't surprise me if it's bigger than Mastodon already or at least fairly close.

To me it's not so much a reason to dump on or the , as an indication that the opportunity that Mastodon didn't take advantage of is still there. Bluesky hasn't addressed their moderation problems and so it's going to be very bumpy when they open it up, and also they haven't really started to federate and there are likely to be bumps there as well. They've got some good things as well, there's a lot the fediverse can learn from BlackSky, and it's not an either-or thing. https://privacy.thenexus.today/work-together-with-metas-fediverses-and-bluesky/ talks about some ways the fediverse and the Bluesky/ATProto world can work together.

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

Yes @aendra is great, i assume you saw https://www.aendra.com/posts/my-top-bluesky-feature-requests-for-2024 -- the point about how "some part of me feels strongly that the "federate by default, public by default" nature of the Fediverse is a huge driver of these issues is" is completely on target. And functionality aside, I agree that Mastodon today acts like they don't want journalists around. Of course some of it's also that the more positive aspects of not wanting transphobic journalists around -- which has been an issue for newsie.social and journa.host -- and the question is how to keep that withough the exclusionary attitudes to other journalists.

@maegul @mackuba

thenexusofprivacy ,
@thenexusofprivacy@infosec.exchange avatar

Great discussions, thanks for the perspectives @aendra. I very much agree about Blueksy being a better fit for a public broadcast microblogging platform and the fediverse being more a place of networked communities.

A couple of the other posts in "Strategies for the free fediverses" (the regions of the fediverses that defederate Threads) and talked about that model -- Emphasize networked communities and Support concentric federations of instances and communities. It's tricky because there's actually a school of thought in the fediverse that aspires to the big flat model, so that's kept mainline Mastodon in particular from prioritizing functionality that would be very helpful for the network-of-networks. A lot of the influential people who don't particularly care for the local communities are supporting federation with Threads so we'll see how it works out.

Agreed that it's not clear journalism-centric instances accomplish at this point. Verification is one of those areas where the fediverse thinks its in better shape than it is (and it's a hard problem in general).

@maegul

thenexusofprivacy , to Fediverse News
@thenexusofprivacy@infosec.exchange avatar

Strategies for the free fediverses

https://privacy.thenexus.today/strategies-for-the-free-fediverses/

The fediverse is evolving into different regions

  • "Meta's fediverses", federating with Meta to allow communications, potentially using services from Meta such as automated moderation or ad targeting, and potentially harvesting data on Meta's behalf.

  • "free fediverses" that reject Meta – and surveillance capitalism more generally

The free fediverses have a lot of advantages over Meta and Meta's fediverses, some of which will be very hard to counter, and clearly have enough critical mass that they'll be just fine.

Here's a set of strategies for the free fediverses to provide a viable alternative to surveillance capitalism. They build on the strengths of today's fediverse at its best – including natural advantages the free fediverses have that Threads and Meta's fediverses will having a very hard time countering – but also are hopefully candid about weaknesses that need to be addressed. It's a long list, so I'll be spreading out over multiple posts; this post currently goes into detail on the first two.

  • Opposition to Meta and surveillance capitalism is an appealing position. Highlight it!

  • Focus on consent (including consent-based federation), privacy, and safety

  • Emphasize "networked communities"

  • Support concentric federations of instances and communities

  • Consider "transitively defederating" Meta's fediverses (as well as defederating Threads)

  • Consider working with people and instances in Meta's fediverses (and Bluesky, Dreamwidth, and other social networks) whose goals and values align with the free fediverses'

  • Build a sustainable ecosystem

  • Prepare for Meta's (and their allies') attempts to paint the free fediverses in a bad light

  • Reduce the dependency on Mastodon

  • Prioritize accessibility, which is a huge opportunity

  • Commit to anti-fascist, anti-racist, anti-colonial, and pro-LGBTQIA2S+ principles, policies, practices, and norms for the free fediverses

  • Organize!

@fediverse @fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

The free fediverses should focus on consent (including consent-based federation), privacy, and safety

https://privacy.thenexus.today/free-fediverses-and-consent/

(Part 2 of "Strategies for the free fediverses")

@fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

The free fediverses should emphasize networked communities

https://privacy.thenexus.today/the-free-fediverses-should-emphasize-networked-communities/

Here's how @lrhodes describes the Networked Communities view:

"instances are valuable for the relations and interactions they facilitate locally AND for their ability to connect you to other parts of the network."

By contrast, @evanprodromou notes that "Big Fedi" advocates typically see instances as typically see the instance as "mostly a dumb pipe." But The Networked Communities view aligns much better with the free fediverses' values – as does the "Social Archipelago" view @noracodes sketches in The Fediverse is Already Dead. Not only that, it's good strategy!

@fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

The free fediverses should support concentric federations of instances

Part 4 of Strategies for the Free Fediverses

https://privacy.thenexus.today/the-free-fediverses-should-support-concentric-federations-of-instances/

Here's how @zkat describes caracoles: "you essentially ask to join concentric federations of instances ... with smaller caracoles able to vote to federate with entire other caracoles."

And @ophiocephalic's "fedifams" are a similar idea: "Communities could align into fedifams based on whatever conditions of identity, philosophy or interest are relevant to them. Instances allied into fedifams could share resources and mutually support each other in many way"

The idea's a natural match for community-focused, anti-surveillance capitalism free fediverses, fits in well with the Networked Communities model discussed in part 3, and helps address scalability of consent-based federation discussed in Part 2.

https://privacy.thenexus.today/the-free-fediverses-should-support-concentric-federations-of-instances/

@fediversenews @fediverse

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

The free fediverses should make it easier to move between (and create) instances

Part 5 of Strategies for the Free Fediverse

https://privacy.thenexus.today/make-it-easier-to-move-to-instances-in-the-free-fediverses/

There's likely to be a lot of moving between instances as people and instances sort themselves out into the free fediverses and Meta's fediverses -- and today, moving accounts on the fediverse today. There are lots of straightforward ways to improve it, many of which don't even require improvements to the software. And there are also opportunities to make creating, customizing, and connecting instances easier.

@fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

The free fediverses should work together with people and instances in Meta's fediverses and on Bluesky whose goals and values align with the free fediverse

https://privacy.thenexus.today/work-together-with-metas-fediverses-and-bluesky/

Part 6 of Strategies for the free fediverses

Many of the Meta advocates I've talked to share the free fediverses' long-term goal of building a sustainable alternative to surveillance capitalism -- and the same is true for people on Bluesky. So there are likely to be situations where some of the people and instances in Meta's fediverses and Bluesky wind up as situational allies to the free fediverses.

A few areas where collaboration could be very useful:

  • A key principle of organizing is meeting people where they are.

  • Moderation on decentralized networks is a shared challenge.

  • Bringing concepts similar to Bluesky's custom feeds to the fediverses, and more generally focusing on human-focused and liberatory (as opposed to oppressive) uses of algorithms in decentralized social networks designed from the margins.

  • Meta's fediverses, Bluesky, and the free fediverses are all vulnerable to disinformation.

https://privacy.thenexus.today/work-together-with-metas-fediverses-and-bluesky/

@fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

Thanks for the lengthy response @tallship I'm using the plural of "fediverses" to emphasize the evolution to regions. The split between instances that federate with Meta (Meta's fediverss) and ones that don't but instead reject surveillance capitalism (the free fediverses) isn't the only one.

As to what Meta's up to, here's my thoughts. https://privacy.thenexus.today/embrace-extend-and-exploit/

@fediversenews

thenexusofprivacy OP ,
@thenexusofprivacy@infosec.exchange avatar

Instances in the free fediverses should consider "transitive defederation" from instances that federate with Meta

https://privacy.thenexus.today/consider-transitively-defederatiion/

Part 7 of Strategies for the free fediverses

Transitive defederation -- defederating from instances that federate with Threads as well as defederating from Threads -- isn't likely to be an all-or-nothing thing in the free fediverses. Tradeoffs are different for different people and instances. This is one of the strengths of the fediverse, so however much transitive defederation there winds up being, I see it as overall as a positive thing -- although also messy and complicated.

So the recommendation here is for instances to consider : discuss, and decide what to do. I've also got some thoughts on how to have the discussion -- and the strategic aspects.

https://privacy.thenexus.today/consider-transitively-defederatiion/

@fediversenews @fediverse

thenexusofprivacy , to Random stuff
@thenexusofprivacy@infosec.exchange avatar

A good article in Mother Jones on the short-term FISA reauthorization that got added to the NDAA at the last moment.

https://www.motherjones.com/politics/2023/12/one-of-the-most-controversial-us-spy-programs-just-got-quietly-renewed/

“It’s tragic,” says Elizabeth Goitein, senior director of the Brennan Center for Justice’s Liberty and National Security program. “Abuses and civil liberties violations are going to continue at a completely unacceptable rate,” she adds. “For every day, every week, every month that Section 702 continues without reform, that is what’s happening.”

jerry , to Random stuff
@jerry@infosec.exchange avatar

I wrote a thing about infosec.exchange and Threads: https://blog.infosec.exchange/2023/12/27/threads-and-infosec-exchange/

thenexusofprivacy , (edited )
@thenexusofprivacy@infosec.exchange avatar

@jerry it's a very reasonable plan, as always you do know what you're talking about. The only suggestion I'd make is to consider holding off on unlimiting threads until 30 days after they give all threads users access to federation to give some time to see how it'll shake out.

In terms of transitive blocking, it's not just punitive; it decreases the opportunities for indirect data flow to threads and indirect harassment from threads. It's still TBD how signifiacnt those threats will be, and how much transitive blocking will mitigate them, so I can certainly see why you're not doing that, but there are indeed real non-punitive reasons.

tchambers , (edited ) to Fediverse News
@tchambers@indieweb.social avatar

The moderation team of the server @hachyderm has published an insightful statement explaining their position on and federation.

Their rationale closely aligns with the approach we're taking at

cc: @fediversenews
https://community.hachyderm.io/blog/2023/12/23/threads-update/

ALT
  • Reply
  • Expand (23)
  • Collapse (23)
  • Loading...
  • thenexusofprivacy ,
    @thenexusofprivacy@infosec.exchange avatar

    Agreed. Some instances will decide to block Threads, that's a valid choice. Other instances will decide not to block Threads, also a valid choice, but that leaves the question as to whether people on that instance federate by default. Opt-in at the individual level offers more safety and privacy, and is in keeping with the fediverse's values of consent (which, while intermittent and somewhat aspirational, is still a good value)

    @reflex @downey @fediversenews

    thenexusofprivacy , to Random stuff
    @thenexusofprivacy@infosec.exchange avatar

    Embrace, Extend, and Exploit: Meta's plan for ActivityPub, Mastodon and the fediverse

    https://privacy.thenexus.today/embrace-extend-and-exploit/

    1. Embrace , , , and the
    2. Extend ActivityPub, Mastodon, and the fediverse with a very-usable app that provides additional functionality (initially the ability to follow everybody you're following on Instagram, and to communicate with all users) that isn't available to the rest of the fediverse – as well over time providing additional services and introducing incompatibilities and non-standard improvements to the protocol
    3. Exploit ActivityPub, Mastodon, and the fediverse by utilizing them for profit – and also using them selfishly for Meta's own ends
    misc , to Random stuff
    @misc@mastodon.social avatar

    What’s important here is we’re going to end up with significant chunks of the fedi in both camps, and we should plan accordingly. https://social.tchncs.de/@mialikescoffee/111606781070232406

    thenexusofprivacy ,
    @thenexusofprivacy@infosec.exchange avatar

    I asked a similar question a couple of days ago and it seems like the answer depends on whether Sue's server is running authorized fetch, -- and also on how Joe's server implements boosts and whether Threads verifies posts, per @Lady's post at https://glitch.cat.family/@Lady/111597669731975795

    @darius @misc

    thenexusofprivacy , to Random stuff
    @thenexusofprivacy@infosec.exchange avatar

    Compare and contrast: Fediseer, FIRES, and The Bad Space

    https://privacy.thenexus.today/fediseer-fires-and-the-bad-space/

    The Bad Space is only one of the projects exploring different ways of moving beyond the fediverse's current reliance on instance-level blocking and blocklists. It's especially interesting to compare and contrast The Bad Space with two somewhat-similar projects:

    • Fediseer is another instance catalog, including endorsements as well as negative judgments about instances.

    • FIRES (an acronym for Fediverse Intelligence Recommendations & Replication Endpoint Server) is infrastructure for moderation advisories and recommendations.

    Many thanks to @thisismissem and @Db0 for feedback on earlier versions of this post!

    (Part 4 of "Golden opportunities for the fediverse – and whatever comes next")

    jerry , to Random stuff
    @jerry@infosec.exchange avatar

    I continue to be squeezed by both sides of the threads situation. I am operating on the premise that people who think I’m a terrible person and this is a terrible instance for allowing any interaction with threads have left and/or blocked, those remaining seem to want to either have nothing to do with threads at all and are mainly concerned with their data, and those who want to seamlessly interact with threads. I have threads limited/silenced on Infosec.exchange, but that isn’t seamless, and it’s also not fully blocking. So, here’s my proposal:
    I remove the limit from threads, and run a job to domain block threads for each account. Any account who chooses can undo the block (or ask me to do it) and then they can seamlessly interact with threads, and those who want nothing to do with them get their way.

    Thoughts?

    thenexusofprivacy ,
    @thenexusofprivacy@infosec.exchange avatar

    @jerry Sorry I missed this when it came out ... if it's still something you're considering:

    If there's a desire to federate then I think the idea of running a job that domain blocks them from each account is a very good one -- it basically makes it opt-in.

    Is auth-fetch turned on here? If not, people should know that once Threads starts accepting inbound federation, even if they block Threads, their posts could still get to Threads if others boost them. [This would be true even if infosec.exchange blocked Threads -- people on other instances who have followers on Threads boosting our posts.]

    mastodonmigration , (edited ) to Random stuff
    @mastodonmigration@mastodon.online avatar

    IMPORTANT. Threads stated policy is to collect and exploit Fediverse user personal data without explicit consent.

    Now is a very good time to review Threads Terms of Use (https://help.instagram.com/769983657850450) and Supplemental Privacy Policy (https://help.instagram.com/515230437301944).

    Note just by following a Threads user or replying to a post, Meta claims they are entitled to your personal data.

    And what do they say they will do with your data? Provide you with "business services (including ads)."

    ALT
  • Reply
  • Expand (327)
  • Collapse (327)
  • Loading...
  • thenexusofprivacy ,
    @thenexusofprivacy@infosec.exchange avatar

    @Gargron Compare and contrast what Threads' privacy policy says they can do with this data to a privacy policy like @admin's and it's clear that Threads' privacy policy tries to give the company as much ability to use data without requesting additional consent (although EU DPC's may have something to say about it). Also, unlike every Mastodon server out there, Meta's business model relies on exploiting people's data -- and they have a long track record of using data without consent.

    So while it's true that every well-written social network pricacy policy does cover this kind of data, no it's not at all "absolutely the same thing".

    Also you suggested elsewhere that "Personal data usually carries a slightly different meaning than a public profile and posts you choose to broadcast to the open web." In the EU, GDPR is very explicit that personal data includes publicly available data such as this.

    @mastodonmigration @rexum

    thenexusofprivacy , to Fediverse News
    @thenexusofprivacy@infosec.exchange avatar

    Should the Fediverse welcome its new surveillance-capitalism overlords? Opinions differ! (UPDATED)

    https://privacy.thenexus.today/should-the-fediverse-welcome-surveillance-capitalism/

    With Meta's announcement today that is starting to test limited integration, it seemed like a good time to update this deep dive on the different perspectives on Threads and the -- including discussions of the

    @fediversenews

    thenexusofprivacy , (edited ) to Privacy
    @thenexusofprivacy@infosec.exchange avatar

    FISA Section 702 Reauthorization: House GOP leadership pulls dueling FISA bills amid backlash!

    https://www.cnn.com/2023/12/11/politics/house-gop-leadership-pulls-dueling-fisa-bills/index.html

    Instead, a four-month extension is attached to the NDAA -- unless it gets removed. Dozens of civil rights and racial justice groups oppose extending FISA in the NDAA.

    If you agree, call your Senators TODAY and with a simple ask: "DO NOT put 702 in the NDAA."

    @privacy

    thenexusofprivacy OP ,
    @thenexusofprivacy@infosec.exchange avatar

    @drwho Not necessarily. In the short term, the huge split in the Republican party means that the NDAA's already not a slam-dunk, so throwing gasoline on the fire with FISA activism could potentially have an impact. It also adds to pressure on Speaker Johnson, who's under a lot of fire from Republicans for how badly he's handled this mess.

    And even if they do the short-term reauth (which I agree is more likely than not), it's still very much an open question as to what happens next -- it could be anything from GSRA or PLEWSA (with significant reforms) to a straightforward longer-term reauth with minimal reforms as a "compromise" to the odious FFRA (which broadens the scope). So pressure now is also a preparation for the next battle.

    thenexusofprivacy , to Random stuff
    @thenexusofprivacy@infosec.exchange avatar

    Mastodon and today's fediverse are unsafe by design and unsafe by default – and instance blocking is a blunt but powerful safety tool

    Part 1 of "Golden opportunities for the fediverse – and whatever comes next"

    https://privacy.thenexus.today/unsafe-by-design-and-unsafe-by-default/

    Over the course of this multi-part series, I'll discuss Mastodon and the fediverse's long-standing problems with abuse and harassment; the strengths and weaknesses of current tools like instance blocking and blocklists; the approaches emerging tools like and take, along with potential problems; paths to improving the situation; and how the fediverse as a whole can seize the moment and build on the progress that's being made; . At the end I'll collect it all into a single post, with a revised introduction.

    This first installment has three sections:

    • Today's fediverse is unsafe by design and unsafe by default

    • Instance-level federation choices are a blunt but powerful safety tool

    • Instance-level federation decisions reflect norms, policies, and interpretations

    thenexusofprivacy OP ,
    @thenexusofprivacy@infosec.exchange avatar

    Compare and contrast: Fediseer, FIRES, and The Bad Space

    https://privacy.thenexus.today/fediseer-fires-and-the-bad-space/

    Part 4 of "Golden opportunities for the fediverse – and whatever comes next"

    The Bad Space is only one of the projects exploring different ways of moving beyond the fediverse's current reliance on instance-level blocking and blocklists. It's especially interesting to compare and contrast The Bad Space with two somewhat-similar projects:

    • Fediseer is another instance catalog, including endorsements as well as negative judgments about instances.
    • FIRES (an acronym for Fediverse Intelligence Recommendations & Replication Endpoint Server) is infrastructure for moderation advisories and recommendations.

    (I originally shared this post here but forgot to included it in this thread. Oops! So I'm cut-and-pasting and sharing again. There's some interesting dialog in the comments in the original post.)

    thenexusofprivacy OP ,
    @thenexusofprivacy@infosec.exchange avatar

    Steps to a safer fediverse

    https://privacy.thenexus.today/steps-towards-a-safer-fediverse/

    Part 5 of "Golden opportunities for the fediverse – and whatever comes next"

    The good news is that there are some straightforward opportunities for significant short-term safety improvements. If fediverse funders, developers, businesses, and "influencers" start prioritizing investing in safety, the fediverse can turn what's currently a big weakness into a huge strategic advantage.

    Contents:

    • It's about people, not just the software and the protocol

    • It's also about the software

    • And it's about the protocol, too

    • Threat modeling and privacy by design can play a big role here

    • Design from the margins – and fund it!

    @fediversenews

  • All
  • Subscribed
  • Moderated
  • Favorites
  • supersentai
  • WatchParties
  • Rutgers
  • jeremy
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • loren
  • steinbach
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • kamenrider
  • Mordhau
  • WarhammerFantasy
  • itdept
  • AgeRegression
  • mauerstrassenwetten
  • MidnightClan
  • space_engine
  • learnviet
  • bjj
  • Teensy
  • khanate
  • electropalaeography
  • neondivide
  • fandic
  • All magazines