Prepper Forum

557 readers
1 users here now

Discsussions about prepping and preparedness, including disasters, prepping communities, sustainability, situational awareness, supplies, skills, gear. This is a forum about knowledge sharing.

founded 1 year ago
MODERATORS
76
 
 

For the privacy-minded out there.

cross-posted from: https://beehaw.org/post/789646

An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act.

This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve:

  • Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone.

  • Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location).

  • Signal: date and time of account creation and date of last connection.

  • Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing.

  • Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date.

  • Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination).

  • WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users.

  • WhatsApp: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups.

  • Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting.

TL;DR Signal is the messaging system that provides the least information to investigators.

77
 
 

"Firstly, discover the power of Polar Pure, iodine crystals that transform standard water bottles into potent purifiers. I demonstrate how easy it is to use this compact solution effectively.

Next, I demonstrate the trusty and time-tested technique of boiling water. With a reliable portable camping stove fueled by iso-butane, you'll learn how to purify water to perfection, ensuring it's safe for consumption.

Finally, get ready to be amazed by the cutting-edge technology of the Grayl portable water bottle. Not only does it serve as a convenient container, but it also acts as a top-tier purification filter. Experience the convenience of filling up the outer container with unpurified water, pushing the inner container into the sleeve, and witnessing the filtration process. The result? Instantly drinkable water, free from bacteria, viruses, and even particulates."

78
 
 

"This communication exercise was A LOT of fun, and I learned a ton. It took us 12 hours, 3 attempts and 3 iterations through our place plan, but ultimately JS8 saved the day. It was roughly 1500 miles, using the RF-1944 military antenna. This was attempted from Land Between the Lakes, a part and campground here in Kentucky. Look out for the AAR later this week where we talked about the behind the scenes, and everything we learned.

If anyone would like a copy of the communication plan, you can find it over at https://themodernham.com/downloads/

Shout out to Gaston, TheTechPrepper for motivating me to get out there and try this out. If you haven't tried to communicate off grid with a specific individual, now is the time to practice. You will run into issues you would have never though of. "

79
 
 

“By itself, GPT-3 is not a high-risk system,” said OpenAI in a previously unpublished seven-page document that it sent to E.U. Commission and Council officials in September 2022, titled OpenAI White Paper on the European Union’s Artificial Intelligence Act. “But [it] possesses capabilities that can potentially be employed in high risk use cases.”

80
 
 

"Finally after MANY months of waiting, I have the room for the Harvest Right Large freeze dryer completed. I have installed and run the tests! I have the EU model (220v-240v) model as that is what is needed in the Philippines. I run this on a robust UPS that can handle 30amp."

81
 
 

"There's a lot more to communications than just pushing the button and talking, just like there's a lot more to shooting than just pulling the trigger. ...if your comms fail during SHTF you can bet it'll be because of something stupid like someone accidentally hit the the lock button on their radio and they don't have a clue what's wrong or how to fix it."

82
 
 

Not exactly new but still useful in establishing P.A.C.E. principle in communicating within our family, communities, and the world at large.

83
 
 

Legnthy article. Kind of reminds me of "The Matrix" with how AI --or more accurately AI companies-- are using human resources to power "AI".

"Much of the public response to language models like OpenAI’s ChatGPT has focused on all the jobs they appear poised to automate. But behind even the most impressive AI system are people — huge numbers of people labeling data to train it and clarifying data when it gets confused. Only the companies that can afford to buy this data can compete, and those that get it are highly motivated to keep it secret. The result is that, with few exceptions, little is known about the information shaping these systems’ behavior, and even less is known about the people doing the shaping.

...

The current AI boom — the convincingly human-sounding chatbots, the artwork that can be generated from simple prompts, and the multibillion-dollar valuations of the companies behind these technologies — began with an unprecedented feat of tedious and repetitive labor."

84
 
 

The fascinating stories and secrets behind hit Japanese products, plus parts and machines that boast the top share of niche markets. In the first half: the story behind canned bread developed by a Japanese bakery in 1996 which doesn't go stale easily and has a long shelf-life. In the second half: a machine that makes dorayaki, a Japanese sweet with red bean paste sandwiched by pancakes. We introduce this unique machine that's also being used to make other sandwich pancakes around the world.

85
 
 

Technology is changing the world faster than policymakers can devise new ways to cope with it. As a result, societies are becoming polarized, inequality is rising and authoritarian regimes and corporations are doctoring reality and undermining democracy.

#AI #ArtificialIntelligence #Technology

86
 
 

A team of university researchers has devised a new side-channel attack named 'Freaky Leaky SMS,' which relies on the timing of SMS delivery reports to deduce a recipient's location.

SMS delivery reports are handled by the SMSC (short message service center) of the mobile network to inform when a message has been delivered, accepted, failed, is undeliverable, has expired, or has been rejected.

While there are routing, network node propagation, and processing delays in this process, mobile networks' fixed nature and specific physical characteristics result in predictable times when standard signal pathways are followed.

#digital #communications #privacy