• Cloudless ☼@feddit.uk
    link
    fedilink
    English
    arrow-up
    45
    ·
    1 year ago

    They don’t try to explain. They just say “I have nothing to hide”.

    It is as if they don’t mind having a CCTV installed in the house that is accessible by who knows.

    • Vuraniute@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      31
      ·
      1 year ago

      “I have nothing to hide” Yes you do. Yes you do. Here’s my email: [email protected] Send me all your login combinations for every single account you have. If you feel creeped out, then why are you not creeped out at how these corporations spy on you?

      • tuff_wizard@aussie.zone
        link
        fedilink
        English
        arrow-up
        16
        ·
        1 year ago

        Hey i sent all my passwords and stuff but some guy called The Post Master just keeps replying?

        This probably wouldn’t happen if you just would use windows…

      • AnonTwo@kbin.social
        link
        fedilink
        arrow-up
        2
        arrow-down
        7
        ·
        1 year ago

        Cause you care.

        Corporation doesn’t give a shit about the information, and selling login information would be a massive scandal for them.

        Like this analogy is asinine. It could be applied to a bunch of software that would have everything to lose being caught doing it.

        • merlin@open-source.social
          link
          fedilink
          arrow-up
          8
          ·
          1 year ago

          They don’t need to sell that information to be untrustworthy, they just need to lose it.

          This is how people steal your identity or buy stuff with your credit card even though you only gave that information to big corporations. It has happened a lot and is still happening.

          As someone who has worked on large databases I can confidently say that every single piece of information the company had on all of it’s customers was available at my fingertips in clear text except for the passwords which I could have cracked in the thousands per second if they had less than 9 characters, which a lot of passwords did because the requirement was at least 8.

          The only way the company can prevent me from doing malicious things with your data is if they only hire people with a moral compass and paying them enough. And the first one isn’t exactly easy.

          There is not a lot you can do as a consumer to not get taken advantage of except minimizing the amount of data a company has on you because they don’t care enough and you will care once the police comes knocking on your door because of a crime someone did with your identity.

          • AnonTwo@kbin.social
            link
            fedilink
            arrow-up
            2
            ·
            1 year ago

            They don’t need to sell that information to be untrustworthy, they just need to lose it.

            That…already happens though.

            https://haveibeenpwned.com/

            You can look up a vast majority of places that you have likely lost your login information from.

            Like my point here is you’d have to drop a lot more than just windows to be safe from this.

            Yeah, you have to trust places that have login information. And you can’t quite avoid that unless you stop using the internet. Best you can do is minimize the damage with stronger passwords and not sharing passwords across sites.

            But my point is this analogy is trying to make something heavy out of something that we’ve already had to deal with since the dawn of the internet.

            • merlin@open-source.social
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              Certainly you can’t be safe from this, you can just try to minimize the possibility of it happening by reducing the data you share to a minimum.

              Yeah I guess the analogy is not entirely fitting. Thinking about how corporations use my data still creeps me out though haha.

    • nothacking@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      1 year ago

      Hey, could you unlock your phone and hand me it so I can scroll through all your texts? No? Then you do have something to hide.

      If that doesn’t work, try search history.

  • finkrat@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    1
    ·
    1 year ago

    Microsoft-ies understanding they’re being spied on but not moving because games

  • PeterPoopshit@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    1 year ago

    The advice of “You have nothing to fear if you have nothing to hide, so simply don’t break the law” is not a 100% effective strategy. It’s especially not good advice when jurisdictions are enforcing oppressive laws. Fuck big tech.

    • itsJoelleScott@lemmy.world
      cake
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      Strangely enough, because I’m finding it to be more stable than Windows.

      My work laptop has the Bluetooth or Internet service just cut out without any explanation. The first reboot doesn’t fix it, but for some reason the second does 🤷‍♀️

  • heimchen@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I know someone who did not know there were other phone companies than Apple, I guess there are enought that don’t even know Windows exists, because it is the only thing they know and thus that spying on them is possible.

    • zbecker@mastodon.zbecker.cc
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      @mojo @Vuraniute

      They justify their telemetry as it helps them to decide, “the best places to allocate dev time to improve the platform.”

      IMO, this info almost never necessary to help improve the platform. Usually if a feature isn’t well used, it will get less dev time, ignoring the fact that it mght be less used because it isn’t well implemented. The converse could also happen, they allocate dev time to a feature that isn’t well used to try and make it more used, which might ignore the fact that it is quite frankly a useless feature.

  • marcos@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    I’ve got many explanations for how they requiring permission to send MS anything from the contents of my disks and memory is a pretty healthy thing, doesn’t mean they can read my data, and that I’m just paranoid.

  • s_s@lemmy.one
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 year ago

    In ancient battle two lines would come togther and scream at each other, then they would clash. The press could get kinda bad, but they were usually pretty neutral until one side lost its cool and ran away, and that’s when the fucking slaughtering starts.

    Microsofties are defeated before the fight ever begins. They are used to just flopping down and watching their blood pour out.