Egregoros

Signal feed

Timeline

Post

Remote status

Context

3
[CW]

Content warning

long rant about privacy and related AI cringe

Show
age verification partners like Persona (the one Discord, roblox, reddit is using) directly send all information you submit to them to the US Gov (including various registries, and FinCEN) & tie your financial records to everything you do online.

they also do AI estimation of how anti-social (read: potentially badly politicized) you are based on your selfie and other unknown variables.

every person in the Persona (read: combined OpenAI/Palantir/USgov/US tax authorities) database has the following things attached and always-accessible. Some may not be available, but this is the average list:

personal identity:
- full name (including in native script)
- date of birth, place of birth
- nationality, sex, height

address:
- street, city, state, postal code, country

government document:
- document type and number
- issuing authority
- issue and expiration dates
- visa status
- vehicle class/endorsements/restrictions

media:
- FRONT PHOTO of ID document
- BACK PHOTO of ID document
- SELFIE PHOTO
- VIDEO of identity capture

metadata:
- entity confidence score
- all verification check results with pass/fail reasons
- capture method used
- timestamps (created, submitted, completed, redacted)

the US gov (probably western ones others too, but no proofs so i wont imply it) can tag you for tax evasion/(il)legal immigration and grab your live data through discord in one second, just needs one official worker to flag your name.

if you write crypto addresses, credit/other identity data (including fake identity), business names and registries and locations look ups, any financial related data; all this is checked in less than microseconds and combined together. your discord and other sites like roblox and reddit, and all others that have used these palantir and palantir-adjacent serviceimportant to note that supposedly discord NO LONGER uses palantir but one would have to be a complete retard to believe this statement i just made. There is an attempted list of every politician you know IRL, list of your family members, friends lists, and extended relations connections.

amongst other things, your Palantir selfie is (AI?) checked for the following:
Does the selfie match government ID photos?
is the image spoofed/photoshopped?
do you look like a known celebrity?
do you look suspicious?
is this selfie photo a duplicate?
is the background of the selfie a duplicate?
estimated age and does estimated age match documents?
is your face covered?
eye glasses?
is the pose the same again?

theres also about 240 other checks, from various western (canada) and not-so-western (brazil, india) country ID and financial/tax database and business registry comparisons to various photoshop detections

all this collected data is supposedly deleted after it becomes 3 + years old (haha yeah sure)

i cant believe the (grand)sons of nazi germany war criminals who escaped justice and (grand)sons of nazi party founders and extremely morbid slave mine operators would lead a total and all encompassing intelligence gathering and analyzing service

crazy innit
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@lebronjames75 this is like when snowden released the documents and all that surveillance apparatus stuff came out except not like that at all and they're just doing it out in the open and they don't even care about optics anymore
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@meso for me the suprising thing is that it turns out that they already have the technology to analyze the entire database of people (and related) (several times a?) month. i actually had a long argument lasting for days last year with some family members trying to figure out if the EU data privacy thing (the big thing last summer) which implies the EU wants to do exactly this, could be possible (the consensus in the end was that even if they try really hard, there isnt the technological capability to make these complex webbed databases involving repeat analysis and scanning of every single person's profile

turns out it exists atleast now

to quote some fellow countrymen (head of constutional protection) at home: The state legalizes and attempts to legalize what its already doing after it starts doing it, it's way easier this way to make legislation because it needs way less corrections then.
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@lebronjames75 @meso
>there isnt the technological capability to make these complex webbed databases involving repeat analysis and scanning of every single person's profile

This has been possible for decades. NSA's XKeyscore is just one of the many examples of such technology.

Replies

15
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@phnt @meso i oughta be more specific: automated GOOD scanning of all text messages sent and compiling somewhat accurate profiles accurate enough to be flagged and alerted without a billion false alerts like happened with ye' olde style word-filter detections

its a full several steps larger in scale and efficiency than previously XKeyscore was, which required a lot more of human oversight and personnell just to filter out bullshit alerts
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@mangeurdenuage @meso @moth_ball @phnt

i'll tell you the goods, as im sure you are aware of all the bads. its half serious, and half shitposty but the thoughts here are important

while writing and thinking about it, this fedi reply window and also firefox's UI started gently flashing, eerie spooky!

anyway
such a intelligence gathering system police state is pretty much inevitable with current Technology.
imagine a society where the police state has the same opportunities as they had in the 1700s (in terms of intelligence available), which is the privacyschizos (like me) ideal to strive towards
and at the same time every bad boy has the entirety of today's slop available for use

half of our world is useable online and the other half is vulnerable online; at home the statistics for "intelligent" criminals is nightmarish. I dont know about the equivalent statistics anywhere else, but you can extrapolate it to what i assume to be a VERY good estimate to reality

(there's roughly 1 million estonians, so extrapolate unknowningly reality to your own worlds)
All of this is for Estonia: In 2025, 3685 (~3%) citizens fell victim to a scam, totalling over 29 million€ euros of damages. This only counts the reported-to-police scams. (In 2024 it was 16 million€, so nearly doubled!). "Intelligent" or digital crime is so lucrative and profitable, there's an infinite amount of new schemes to think of to scam people. The days of Nigerian Prince scam emails are so far, now we have local people involved in the digital mafia, generally orchestrated from countries like ukraine, russia, india, the balkans, etc (indians are actually the worst at doing this, [un]suprisingly). The schemes are believable and multilevel, the schemes are related to daily local news and environments, the schemes are extremely well trained, and always involved a speaker from the area. Due to the speed of setting up a new call/scam center, it is now actually a net negative, worthless action to shut down a full call scamcenter. Only the local-area scam workers who work as the money-mule (very profitable btw!) have a minor effect, as there will be a temporary lull in localized knowledge and the specific "sales" scam type scam, until a new moneymule is hired by scam centers.

without these extreme police state privacy nightmares, the ability to capture these moneymules is taken away. scam centers arent stoppable anyway at the source, the counter to that is good population awareness. With this shitty apparatus, 3% of the population falls victim to high-profile scams (not talking 50-100€ sized scamdeals because those usually dont even get reported). Without, i strongly assume it would be about double that.

without the police state el terrible, people like Sam Bankman Frid would still be free, as the ability to capture him wouldnt exist. people part of the ruling party -garchy circle will still be free probably, irrelevant to the police state surveillence program's ability. Realistically, <80IQ retards and bums would be the only people commonly caught without a super-surveillance machine.

so, i propose the [Inevitable] Police State Theory
P = NT + AI
N is the N that the nesquick bunny throws into the pool
T is technology available to the N
AI at the end is from einstein's formula

so my (achievable) privacy ideal has become a police state that is ever so slightly behind the curve in comparison to the evil doers, yet not far enough that it would enable the bad boys to gain a upper hand over the (police) state so much that they could overthrow local or national forces with the value they have gathered via theft.

tldr: Me: "Um, Actually, here's why a 2.71% yearly population scamvictim rate is GOOD for you!"
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@lebronjames75 @meso @moth_ball @phnt
>scam centers arent stoppable anyway at the source
The only reason they are able to do so is because they partly have information from the people they are trying to scam.
The source of that information are backdoor computers be it desktop, laptop or mobile phones and servers/SaaSS sub contractors the GOVs love so much.
The solution is simple af, it has been simple for the past 40+years, just follow the FSF guidelines.
Previous Friday, I solved most of someone's problems by just factory default their phone. Disabling google services and installing only free/libre software, even the launcher and default software, and most of her problems disappeared.
Ideally a custom rom without all that crap at all would be preferable.


>so my (achievable) privacy ideal has become a police state that is ever so slightly behind the curve in comparison to the evil doers,
Or ideally just ban proprietary computing. Most of the ""evil"" is able to exist because they can hide and force their functions inside any computer.
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@mangeurdenuage @meso @moth_ball @phnt you can put the lid back on the box, but all that info is out there already. it doesnt matter if the same data has appeared in 13 or 21 different leaks. it is quite too late to do anything about the already out information to keep it hidden. also, that approach vector is helpful, but its an antiquated approach by now for scammers. Social Media is much more than enough, you can combine that with public business registries and phonebooks, and that's all you need and its the primary direction to use.

social media, and a phone number, is all that is needed. From there, all other data is social engineerable. Phone call voice recording of person A to make fake AI generated voices to person B. People posting on social media that they are actively on vacation is a gold mine for "help me mother, i have lost my wallet and phone to theft in italy, can you send me money? im calling from friends phone". Cold calling random telephonebook numbers until elderly answer, for the classic scams. Recent nationwide events and fabricating calls, emails, and having people visit you IRL pretending to be X Y or Z (officials), all the info for these actions is generally social engineered from the initial phone call. cold-sending fake invoices to thousands of companies pretending to be other real companies, from fake email addresses that are very similar to the real ones (this works, in values of 5 and 6 figure numbers! for example, fake a power company invoice for a largescale factory operation and send it 3 or 4 days before the usual date)

to think if every software would follow FSF guidelines, that it would have even a measurable impact on the scam problem, then your knowledge and beliefs on how scams work today is extremely dangerously outdated. Even if everything you did outside of social media was 500% giga ultra encrypted, it would not really do anything at all. The vector of approach for good scams is humans, not the technology.

every new type of defence is but another opportunity for scammers to approach from a new angle. 2FA for banks is social engineered tens-hundreds of times daily at home country. True, the situation is much better than in america with their social security number scams, but the situation at home is a trick on the mind; a feeling of safety from the 2FA to a human allows a new vector to hit harder and stronger, as the feeling of safety makes people slower to realize and react to a scammer scamming.

the best counter after the basics are in (2FA), is awareness of social engineering manipulation, not 3 4 5 factor authentification. to learn the methods, and tell them to yourself. to keep yourself up to date with evil. to keep your family and elderly up to date with the evil. give them the knowledge (and trial them with thoughts randomly) to realize: No! It's not the police sergeant calling my grandma right now, to "confirm" some personal details because I am in trouble with the law! It's not a bank teller attempting to stop a "fraudulent flagged transfer, quickly confirm your bank account Nr to me so i can make sure its locked up before the money is fraudulently stolen from you!"

its foolish to think banning proprietary computing will have a significant positive effect towards lowering scams. Most common and uncommon scams are not "hacks", they are simple remote desktop functions, calls, and personal visits. "proprietary computing" as a real and used threatvector is but a brainworm and nothing more, no more or less than non-proprietary computing in large scale use. if someone professional targets you specifically, as a target to destroy, they'll get you with (proprietary) hacks, people, etc. if someone targets you from a random list as a target to scam (actual real threat to you and your family and friends on the average day), youll be probed by cold calls, cold emails, and if they fail, a flag is added "failed 1 day" to your name and the next name is attempted in the list and you are forgotten.
[CW]

Content warning

re: long rant about privacy and related AI cringe

Show
@lebronjames75 @meso @moth_ball @phnt
>it is quite too late to do anything about the already out information to keep it hidden
That's only if you consider information never changes. Which it does.
That's only if you consider if laws never changes. Which they do.
But it does on information that does not change.

>then your knowledge and beliefs on how scams work today is extremely dangerously outdated.
No. It's just different from people to people.
Like for example an ongoing scam in my country is that people can pay via adding to the ISP invoice.
You can pay almost anything with this, parking, donations, streaming services, apps etc...
People install X malware on their computer phone or Y malware on somebodie's computer phone takes control of it and just add fees to ISP invoice system.
It's entirely possible to avoid this bullshit, people just have to deactivate that option on the ISP's website who activates it by default :pika:

But again the entry point was again proprietary bullshit and not the immoral paiement system that nobody knows about and that is activated by default.

> it would not really do anything at all
I disagree. It heavily mitigates. And it allows me to actually do do advertisement as people who have malware on their phone and contact me/get my number, I get scam calls from that.
From that point doo several things. I first warn the user. Then I warn France's authority on the subject the 33700.

>every new type of defence is but another opportunity for scammers to approach from a new angle
For direct social interraction yes. For computer security also yes but highly dimishes as it requires high entry barrier.

> 2FA for banks is social engineered tens-hundreds of times daily at home country.
I know, that's why I keep telling people to not install the malware app, and keep it simple with otp.

>a feeling of safety from the 2FA to a human allows a new vector to hit harder and stronge
I know. Technically a single secrete/unknown/non public long string of data like this
}®ë½útrMîR\,ÇØ.~ÜP¬å^ýto9:õð[{üÁ*-'/$ö¨^\è~#¥!êàºÂ¶<,UÝÙtÔìÍÎUÑó
Is enought for any security system to ID you. But since things were simplified for people with email, which is public, a second string of data is necessary to authenticate.
Big brains in the EU still think that biometric data is impossible to copy/falsify, meanwhile as I already said, all the fingerprint, voice, face etc... all biometric data that you can use with the current devices are already leaked.
On proper digital hygiene combined with proper software, aka free/libre software (and also non backdoored protocols) will heavily mitigate the issues.

>to keep your family and elderly up to date with the evil.
They don't live in reality, that's the main problem as when you're trying to explain, without even going in the details, it's extremely hard as their pre conceived notions of computing and computing security is entirely false.
Just for example I've already spent 17 hours with someone doing pedagogical work, and only via proof via solver their problem they are starting to believe me.
It is feeling incredibly like what Yuri Bezmenov describes as "demoralization", no matter the amount of information you give they do not believe, they have to have their heads stomped in the mud to understand.


>its foolish to think banning proprietary computing will have a significant positive effect towards lowering scams.
I say the same to you thinking that it's irrelevant.
Proprietary computing is what enabled this in the first place.

>Most common and uncommon scams are not "hacks"
>they are simple remote desktop functions, calls, and personal visits
What's the definition of a hack again ? (rhetorical).
Do I need to use the OG definition of hacking from the 60s MIT ? or the CSI definition of hacking ?
Anyway I agree, they are simply remote call to home, which enables various security issues, unwanted functions that nobody asked for aka malware as it is intended for malicious purpose.

>but a brainworm
bruh
It's the source that enabled mass social engineering.

>or less than non-proprietary computing in large scale use
Again it could have happened with fully AGPLv3 software, but it is doubtful because of legalities as it would be obvious to point out in a case in court that a software behaved against the law and citizens.

>a flag is added "failed 1 day" to your name and the next name is attempted in the list and you are forgotten
I know. That's how I'm able to solve those issues over time.
@mangeurdenuage @meso @moth_ball @phnt ok, this was way easier to read after i slept now, instead of when i was giga sleepy

>ISP invoice payments
holy fuck how horrifying, credit cards exist, why would anyone do this nightmare, its like paying for things with the telecom (phone) invoice bill. i absolutely do not at all approve of this concept at all

for the definition of hack, "i am sleeping and bad digital-related things happen in the background commited by a malicious actor behind my back with 0 input of my own", i guess some also call hack if its a social hack and similar, but this should suffice for meaning

for the rest of the disagreements, i will continue to disagree, very intensely, as my anecdotal and localized [statistical] experiences shout an opposite situation at me. perhaps the situation is severely different on your side of the continent.

as for the trouble of raising awareness, i guess thats exclusively, ironically, training yourself to be better at social manipulation. reminds me of some insane insanities that when they happened for the first time for me, caught me mega offguard.

the following all goes completely off topic and instead goes to the topic of how to manipulate people successfully (im not the greatest at this but they are learning moments)

a irl friend made a website, and it had signing up as users and passwords, and i was testing it and found that usernames were case sensitive (like passwords usually are)

i had a day long argument with him saying "thats retarded for a forward facing public website for public use for random users" and his counter was "but its securer, like unix, unix is like this too!" and i said "the username is public, what difference does it make but allow people to confuse others by having the same username with different capitalization + confusing yourself when you accidentally capitalize your username occasionally and are told shit dont match up?" (i completely lost arguing for my side here and nothing was changed but us two becoming slightly less friends)

another one was trying to argue to my mother many a year ago, to be more clean when cooking, because cross contamination etc etc for years (both before and after my cooking era).
victory came after years when i aggressively guilt tripped and screamed threateningly that my mother had caused me great grievance, pain, suffering, etc. facts are fucking worthless so often to the common man when changing the ideascape that they operate in. facts only serve to create a foundation to force an emotional and personal manipulation to occur if there is even 5% of emotion involved in the topic.

another thing in the army training for military police was (this one might be relate with your soul and situations) that if you teach a soldier to do something, you either teach him the thing from 0 to 100, on three separate times on separate days, or its worse than not teaching them at all. which turned out to be correct again, again, again, and again, over the course of a year. i think maybe 1 in 20 people, this did not apply to in most topics. this type of teaching-training-theoretical-and-pracitcal-knowledge really helped me in civilian life later towards becoming a good team/workbrigade leader and i guess is a major reason why i have the job(s) i have now (yay). leadership/mentorship training (and related emotional manipulation tactics) are cool. using these techniques successfully against my family members is also pretty good for the overall family unit. a calculated, unignoreable pain/uncomfort strike to break a certain pattern and rebuild it into a stronger and more mutually beneficial pattern.

back on to the topic and i guess my closing words for the original topic

reading the latest reply of yours, i have come to the understanding of why you (have come to) see the PoV that you see and why its real for your position, i hope you come to a similar/same reversed understanding towards me
@lebronjames75 @meso @moth_ball @phnt
>holy fuck how horrifying, credit cards exist, why would anyone do this nightmare,
Pic related.
Get in the head of marketing/bankers.
The less people have to think on how to spend the more they spend.
In France credit cards cannot be used with the swipe/magnetic side band, you have to enter it and enter your pin.
Well that's incorrect, in the past decade the corrupt/French gov allowed banks to allow NFC payments with a credit card and thus people can pay up to 100eur without needing to even put their pin, just have a enough range and you steal shit tons of money :DDD

> and found that usernames were case sensitive (like passwords usually are)
>"but its securer, like unix, unix is like this too!"
The ID is public it doesn't matter, as I've stated previously.

>"the username is public, what difference does it make
Like I said.

>what difference does it make but allow people to confuse others by having the same username with different capitalization + confusing yourself when you accidentally capitalize your username occasionally and are told shit dont match up?
In this context I agree as it's not lowering the entry bar.
In other contexts, lowering the entry bar is a mistake.

>(i completely lost arguing for my side here and nothing was changed but us two becoming slightly less friends)
But, I'll add that this would not have happened if sane digital hygiene for normies would be a thing.
This would not be an issue at all if normies used a password manager/nitro-key.
They'd just copy paste and voila.
Again the domino effect that lead to this is tied to proprietary software. Because proprietary software continuously lowered the entry bar (streamlined like they say in gaming) so that more and more low IQ people could use computers.
So that a bigger user bases could exist.

> because cross contamination etc etc for years
Same issue, especially with rinsing dishes, most of the food she makes has an after taste of dish cleaner.
I get told "that's a waste of water" better to waste a bit of water than to pay medical bills.
Same for food, better to eat slightly less food quantities and eat rich nutrients dense ones instead. People don't understand how I can live with so little rations. they're just much denser nutrients wise but they don't get it. And that's notably because all of what the information around them are constantly spewing the opposite and/or what I've learned is absent from their information pool.
In the end it falls down to the level of trust people have with you. Which is a quantifiable statistic.

>victory came after years when i aggressively guilt tripped and screamed threateningly that my mother had caused me great grievance, pain, suffering,
Ever heard of NVC ? It has good results with people who actually want to speak with you. And I say that because as much it works with my mother I didn't realize in time that my father didn't want to communicate at all.

>facts are fucking worthless so often to the common man when changing the ideascape that they operate in
It's an issue of visualization.
Often I forget to remember people in my explanations that what I'm telling them is so they'll avoid recurring troubles in the future if they follow this. Also part of NVC. But I haven't practiced NVC in a long time.

> you either teach him the thing from 0 to 100, on three separate times on separate days, or its worse than not teaching them at all
Yes. But that's also their job. In my case the average it's not their job, that's their perspective. They just want shit to work like you described in the beginning with your friend insistence on sensitive case.
So they're already in a state where they don't want to learn. And you can thank the fangman for this.

>leadership/mentorship training (and related emotional manipulation tactics) are cool
My old man was a military man, these methods backfired him so much that he lost everything.

> i have come to the understanding of why you (have come to) see the PoV that you see and why its real for your position
It's my experience. Like you again and again and again, it's not hundreds of people I've services, it's thousands all over France (and some border countries) due to my father's enslaving me in his catering business but I didn't let go of computing (it'd remove myself if I ever stop this field).
Imagine doing 140h a week for a decade and in add stuffing computing repair/maintenance in that. Also add to that the migration from Microsoft™ certified™/Cisco™ brain to GNU/linux.

>i hope you come to a similar/same reversed understanding towards me
I understand it's your experience. I don't deny it. I'm pondering of the outcome long term wise of your method.
In my case the few people who listened to me still have the same computer for over a decade ago. They have not lost their data. And their data hasn't been stolen (aside the one the gov keeps leaking). So they have little trouble.
The others are still having the same trouble and keep loosing money to scammers who pretend they know shit about computing. They do know how to manipulate people tho like you suggested.
Nothing is perfect. Again it all comes to trust.
@mangeurdenuage @meso @moth_ball @phnt as far as i know, french military is quite different in teachings and structure (for example french MPs are nothing like estonian MPs in function or behaviour), despite being a NATO style military like we are. nonviolence (Nonviolent Communication) is a tool, just like violence. very important teaching was to know how to realize when which tools are correct to use;

i dont have anything else to comment on