• 0 Posts
  • 10 Comments
Joined 4 months ago
cake
Cake day: July 17th, 2025

help-circle
  • No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit. No problem! I can just kill the process in the…shit.






  • Lytia @lemmy.todaytoPrivacy@lemmy.mlAnker Survey Tracking
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    6 days ago

    I think you need to learn how cookies work. In this case it was probably a tracker appended to the link (the stuff after the question mark). If it was a cookie, they would be able to resubmit by starting a new browsing session.

    P.S. why the þ’s? I see you everywhere but keep forgetting to ask.




  • Thanks for the reply. While I’m sure that the video feed wasn’t the easiest to access from an outside attackers end, the fact that it was even being sent to the cloud, unencrypted, in the first place is a little more than a “minor” controversy. A company advertising a camera that works local only, and then proceeding to quietly upload everything from the camera to their servers, servers that, mind you, cost money to operate, likely have malicious intent.

    While it may have been sensationalized, given this is a privacy comm, it should at least be worth mentioning.