this post was submitted on 15 Aug 2025
1140 points (98.9% liked)

unix_surrealism

2825 readers
112 users here now

one should not chase the electric dream

irc: #unix_surrealism on irc.libera.chat

This community is for sharing original content related to computers, content, surrealism and wizardry.

Now that you're a surrealist, become a Techno-Mage:

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] lmmarsano@lemmynsfw.com 0 points 2 days ago (2 children)

steal your data

How does this theft work? Do they break into my computer or accounts & take it unauthorized? Is it my data?

[–] WhyJiffie@sh.itjust.works 2 points 2 days ago* (last edited 2 days ago)

afaik if you accept to log in to a microsoft account when you install windows 10 or 11, it'll set up your documents, photos and some other directories for sync to your onedrive account.

but if something's running on your computer outside of a browser or VM, it has access to all your files anyway.

[–] photonic_sorcerer@lemmy.dbzer0.com 2 points 2 days ago (1 children)

It's mostly passive tracking of network traffic. You data could be further compromised depending on the operating system you use and the threat model under which you operate.

[–] lmmarsano@lemmynsfw.com 1 points 2 days ago

It’s mostly passive tracking of network traffic.

That data seems as much the recipient's data as the sender's or of any system capable to observe transport. If I see someone go down the street & stop somewhere, is that traffic observation really their data? The internet protocol wasn't built for privacy of that layer of activity.

data could be further compromised depending on

A protocol disclosing data as designed is compromised? Are we talking about (1) actually compromised systems permitting unauthorized access to data or (2) services working as designed & getting data per usage agreement?

Legal definition

Theft is the taking of another person’s personal property with the intent of depriving that person of the use of their property.

If we're talking about (2), then how is that theft?