There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

engadget.com

moobythegoldensock , to technology in Reddit is testing verification labels for brands

Good for them?

aquarisces , to technology in Reddit is testing verification labels for brands

That’s cool, I think a lot of us here would label Reddit as verifiably stupid.

MargotRobbie , to technology in Reddit is testing verification labels for brands
@MargotRobbie@lemmy.world avatar

I guess there will just be a bunch of verified accounts running around doing “organic” marketing for their latest projects now.

Boy, I am sure glad nobody has ever done that on Lemmy before.

DoctorTYVM ,

Weren’t they already doing that? I swear, you read some posts and it’s like a PR team is trying to get a story buried. Like after a Leo DiCaprios dating history got air time you started seeing him in more memes the next days, and TILs about how he was a good actor

spacedancer ,

They were/are. They’re just making it official now.

everythingsucks ,

Just saw a post by Bloomberg and u/Bloomberg has a little green checkmark by their name.

MargotRobbie ,
@MargotRobbie@lemmy.world avatar

TILs about how he was a good actor

Academy Award sigh winning character actor.

iegod ,

I mean he’s quite memable and he’s a great actor so not sure why both things can’t happen…

DoctorTYVM ,

They can. It’s just that it happens suspiciously often after there’s a surge in his negative images

BettyWhiteInHD ,
@BettyWhiteInHD@lemmy.world avatar

deleted_by_author

  • Loading...
  • kittyjynx ,
    @kittyjynx@lemmy.world avatar

    It seems like a lot of people strip the agency from the women he has flings with. If he is not abusive or manipulative then who cares, they come out the other side with some great stories and experiences that they wouldn’t have if they instead had a fling with a random classmate at college.

    BrrooklynMan ,
    @BrrooklynMan@lemmy.world avatar

    yeah. they’re called “ads”

    Darkassassin07 , to technology in Reddit is testing verification labels for brands
    @Darkassassin07@lemmy.ca avatar

    ‘we have verified that no brands want to be here, and thus haven’t labeled anything’

    gravitas_deficiency , to technology in Reddit is testing verification labels for brands

    Silence, brand.

    TomMasz , to technology in Reddit is testing verification labels for brands
    @TomMasz@kbin.social avatar

    Further proof that Reddit is committed to copying every stupid decision that the Muskrat makes.

    Ranessin ,
    @Ranessin@feddit.de avatar

    Spez loves Musk after all, can’t take his head out of his ass.

    WarmSoda ,

    Come on, that’s just mean. He obviously doesn’t have his head up Musks ass. His teeth would never be able to fit in there.

    macisr , to technology in Reddit is testing verification labels for brands

    Every fucking social media company wants to be the same thing. It’s boring as shit.

    malloc ,

    It’s all in prep for the pump and dump when it IPOs.

    panda_paddle , to technology in AMD unveils its first laptop processor with 3D V-Cache

    Can’t wait to read the Userbenchmark review telling me why this chip is actually garbage and how only idiots buy AMD.

    notepass ,

    "When using all 16 cores at a TDP of 5 watts, it is actually a lot slower then the core i3-1969UwU, making it pretty useless for battery operation. Consider buying an intel CPU.

    FinalRemix ,

    I’m an idiot that’s only ever had problems with Intel. Weirdly, same with AMD/ATI graphics. Only AMD CPU/APUs and GeForce GPUs for this idiot, here.

    GustavoM , to retrogaming in The NES at 40: Seven ways it changed the gaming world forever
    @GustavoM@lemmy.world avatar

    We need games to be more “gaming” and less “cinematographic, ultrarealistic movie”.

    UnaSolaEstrellaLibre , to technology in Reddit is testing verification labels for brands

    Remember when reddit was people oriented?

    malloc ,

    So 2013-2014? Lol

    CrypticFawn , to technology in Reddit is testing verification labels for brands
    @CrypticFawn@lemmy.dbzer0.com avatar

    Gods I’m glad I left that shithole.

    Psythik ,
    @Psythik@monyet.cc avatar

    Who needs reddit? Now I go to Imgur for memes, and Lemmy for news.

    The only thing reddit is still better at is finding an answer to a very specific question (adding site:reddit.com to your Google searches works wonders), but that’ll improve with time as more and more people get tired of Spez’s bullshit and migrate here. Can’t wait to see the death of reddit. Was a member since the beginning and it’s sad to see it go the way of Digg.

    lazycouchpotato , to technology in Reddit is testing verification labels for brands
    @lazycouchpotato@lemmy.world avatar

    I don’t see anything immediately wrong with verification. There are cases where people reach out to companies for support, and having them be verified helps. Tech enthusiasts like us might be less susceptible to phishing/scams, but regular folks aren’t.

    However, after everything Reddit has done recently, there’s no stopping them from turning this into a status symbol thing like “the website formerly known as Twitter”. They could tweak their algorithm to boost comments of “verified” accounts, degrading the quality of conversation there.

    shapesandstuff , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

    So when I first learned about TOR almost 10 years ago in uni, it was said to be compromised to a significant extent by secret services holding entry and exit nodes.

    Is that not true anymore?

    worfamerryman ,

    I’ve hear something similar. I think I read that the US Air Force has a bunch of nodes or something.

    Additionally I don’t really understand what I would use it for if I already have a vpn and how it might put me a risk of legal trouble if I’m using it and someone routes something bad through me while I’m using it…

    I’m not even sure how to talk about it.

    I am decently technical, I just don’t know this tech.

    NateSwift ,

    Disclaimer that I haven’t used Tor in a while, do your own research, etc

    The US navy designed and open sourced the Tor network. If all the traffic meant to be anonymous was coming from the US navy it doesn’t work well as an anonymizer. There’s been various claims that they have backdoors over the years, but to my knowledge none have held water.

    Unless you’re running an exit node (which requires different software than the Tor browser) other people’s traffic isn’t getting routed through you so you’re fine legally.

    VPNs are not very good at protecting you from the websites or services you connect to. They’re best used to hide where you’re connecting to from your ISP. Modern fingerprinting using things like browsing habits, installed software, web browser size, cookies, etc is barely effected by VPNs and the Tor browser takes care of an minimizes lots of those tools.

    The biggest issue for day to day use for me is how slow it is. Because your traffic is being routed through 3-5 nodes before getting to its destination overall speed and latency suffer a lot

    worfamerryman ,

    Thanks for summarizing this for me. I think I could just use a vpn and librewolf to accomplish what you are talking about with the tor browser.

    Librewolf wipes everything once it’s closer and it pretty basic if you use the default settings.

    Are people using it to casually browse Lemmy and stuff?

    DestroyMegacorps ,

    Theres also the mullvad browser which is just tor browser without the tor part

    ReversalHatchery ,

    I use librewolf, but for me the first thing to change was to do not delete things on exit. I’m looking for a better firefox, not a lighter tor browser

    kent_eh ,

    The biggest issue for day to day use for me is how slow it is. Because your traffic is being routed through 3-5 nodes before getting to its destination overall speed and latency suffer a lot

    That’s why I never continued to use it after the times I experimented with Tor.

    sudo ,

    Modern fingerprinting using things like browsing habits, installed software, web browser size, cookies, etc is barely effected by VPNs and the Tor browser takes care of an minimizes lots of those tools.

    But can’t you just spoof most of that if you really want to? If you’re putting in the effort to be concerned with anonymity.

    dwindling7373 ,

    Aren’t bridges meant to prevent that?

    shapesandstuff ,

    Iirc holding both the entry and exit of a routed connection, you can in theory match traffic going through, which would let you connect a user to the server/site they are connecting to. It might still be encrypted at that point, idk the details anymore.

    itchy_lizard ,

    No, bridges are meant to bypass censorship

    seasonone OP ,

    Most of the nodes are hosted by Tor Foundation itself

    magmaus3 ,
    @magmaus3@szmer.info avatar

    [citation needed]

    shapesandstuff ,

    Is there any way to check that?

    seasonone OP ,

    Yup. You can check a lot of stat about a node on tor website. metrics.torproject.org

    sugar_in_your_tea ,

    If true, I’m not happy about that. I want lots of different owners so it’s harder to compromise the network by compromising a single entity.

    cambionn ,
    @cambionn@feddit.nl avatar

    I also heared that bit about the secret service owning nodes a few years ago. It was trough a teacher that’s also really in the stuff outside of teaching, and has a network of non-teaching proffesionals in the field.

    It’s something to keep in mind, at the very least. Tor already has some weaknesses anyways. You shouldn’t trust it blindly just because it’s Tor. If anything, I think it more has a false rep for how strong it is over struggling with a stigma.

    shapesandstuff ,

    It was pretty much the same context for me, yeah.

    Opsec always applies

    Gargari ,

    Try i2p

    shapesandstuff ,

    Interesting, ty

    krash ,

    Compare and use the right service for your needs: geti2p.net/en/comparison/tor

    itchy_lizard ,

    I don’t think a single credible source has shown this to be a vulnerability. You’re talking about an attack that would cost, what, millions of dollars to run per day?

    shapesandstuff ,

    Dunno if it’s all that expensive when there are hundreds of nodes on several individual malicious networks confirmed …medium.com/how-malicious-tor-relays-are-exploiti…

    itchy_lizard ,

    You’d need much more than hundreds of nodes.

    shapesandstuff ,

    The graph tracks exit probability and the article speaks about the matter, especially what you’re referencing. Check it out.

    ladel , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

    deleted_by_author

  • Loading...
  • eleitl ,

    I’ve been using it since the early days and ran relays and exits. It’s good for anonymity against your ISP, advertisers and lesser adversaries than being targeted by TLAs. Can be a bit slow. Make sure to use encryption to protect against bad exit nodes.

    bruzzard ,

    Quick question: How does one set up encryption while using the Tor browser for things like searches and regular browsing (research, etc)? Would be useful to know. Appreciate.

    eleitl ,

    You just use https. There are extensions like HTTPSEverywhere, but they potentially add bits to your fingerprint. DuckDuckGo also offers their search interface as a hidden service, perhaps worth bookmarking.

    FredericChopin_ ,

    I used to use it. I used it to buy Xanax and it was bad times but the tor and Darknet market aspect was fine.

    ladel , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

    deleted_by_author

  • Loading...
  • emberwit ,

    It’s a web browser. Slower than others and some pages won’t work but other than that, it does just that.

    Mummelpuffin ,
    @Mummelpuffin@beehaw.org avatar

    …I mean, it’s more like the web browser makes it easy to use the Tor network. The network is the slow part. Your requests are getting ping-ponged all over the world intentionally taking the long way around.

    ctr1 ,
    @ctr1@fl0w.cc avatar

    It’s great for anything low bandwidth that isn’t tied to your identity, and helps for peace of mind, despite its issues. You do run into captcha or DDOS protection issues occasionally, but the new tor circuit for this site button sometimes works. Also it uses letterboxing to prevent resolution-based fingerprinting, which isn’t very pretty, but leaving it at its default size (or locking the size using the WM) works well and is good for privacy.

    Audalin ,

    It’s great when you want to connect two devices behind NAT without relying on any specific third-party server or service. I ssh to my laptop from my phone with it when away from it.

    It’s also useful to circumvent censorship, though it depends on the country. Also, websites employing wide-range IP blocks, in my experience, more often than not still allow Tor.

    Lily33 ,

    How does Tor help ssh behind NAT?

    Audalin ,

    You run a Tor Hidden Service with sshd on one device. Knowing the .onion address, the correct port and having the corresponding private key on the other device (all of that not really subject to change), you can run the Tor daemon on it (for Android, you can use Termux) and connect with ssh, using torify nc %h %p as ProxyCommand.

    skullgiver , (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • interolivary ,
    @interolivary@beehaw.org avatar

    On the other hand, there’s no way to track you. Useful for looking up medical info in a way that search engines and such can’t relate back to you. Often I’ll keep browsing in it once I’ve opened it because it’s just basically Firefox.

    This is only true if you have the most “paranoid” security level selected, and at that point anything that relies on Javascript (or any of the other features that get blocked) will break. Enabling Javascript or the other blocked Web features will make it fairly trivial to track you especially the more you browse, so at that point you might as well just be using a regular VPN.

    Tor itself isn’t the problem in this equation, it’s the browser, and they tend to leak information like a sieve

    skullgiver , (edited )
    @skullgiver@popplesburger.hilciferous.nl avatar

    deleted_by_author

  • Loading...
  • interolivary ,
    @interolivary@beehaw.org avatar

    Sure, it all depends on how paranoid you are, my point was more that saying someone is untrackable if they use Tor has a lot of caveats.

    For the average pleb it’s probably fine, if all they’re doing is just trying to dodge regular trackers and not the authorities

    BigVault ,
    @BigVault@kbin.social avatar

    I use it to access any websites that I want to that Virgin Media block due to court orders issued by the UK high court.

    some_guy ,

    Virgin Media

    Damn. Looks like the UK is more restrictive than I’d thought.

    FirstMajesticComet ,
    @FirstMajesticComet@lemmy.blahaj.zone avatar

    I use it, it’s a bit slow and you sometimes get lots of captchas but overall I think it’s pretty good.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines