• 2 Posts
  • 13 Comments
Joined 2 months ago
cake
Cake day: January 7th, 2026

help-circle




  • From left to right, top to bottom: 2 fixed box cameras (most likely 2 generations of ALPRs: an older (larger/yellowed: which they won’t bother removing, and instead keep for redundancy), and a newer (more capable) model), a ‘Pan Tilt Zoom (PTZ)’, and what appears to be a radar sensor (for detecting objects: possibly serving as a redundancy, during challenging weather conditions). I suspect the radar sensor got installed first (just for perimeter intrusion detection), they added the old ALPR next (to detect patterns in registered license plates); and the rest as an upgrade (including an increased field of view: through the PTZ’s movable head).


  • The biggest privacy loophole in WhatsApp is cloud backups. By default, unencrypted updates to the backup, flow through WhatsApp servers in a readable format, to be encrypted on the server-side by the cloud providers (Google or Apple). Even if specifically opting into E2EE backups, the cloud provider still receives the contents in readable format (as it does the encryption of the backup). Even if you personally don’t have this “feature” enabled, the other end might; and your interactions are also included in their backups. On a stock device there’s an entire myriad of other potential vectors; too many to list here.





  • E2EE isn’t really relevant, when the “ends” have the functionality, to share data with Meta directly: as “reports”, “customer support”, “assistance” (Meta AI); where a UI element is the separation.

    Edit: it turns out cloud backups aren’t E2E encrypted by default… meaning: any backup data, which passes through Meta’s servers, to the cloud providers (like iCloud or Google Account), is unobscured to Meta; unless E2EE is explicitly enabled. And even then, WhatsApp’s privacy policy states: “if you use a data backup service integrated with our Services (like iCloud or Google Account), they will receive information you share with them, such as your WhatsApp messages.” So the encryption happens on the server side, meaning: Apple and Google still have full access to the content. It doesn’t matter if you, personally, refuse to use the “feature”: if the other end does, your interactions will be included in their backups.

    Cross-posting my comment from the cross-posted post






  • PierceTheBubble@lemmy.mltoPrivacy@lemmy.mlDoorbell anxiety
    link
    fedilink
    arrow-up
    13
    ·
    edit-2
    2 months ago

    I don’t turn my face towards houses while I’m walking if I notice a doorbell camera

    I do that haha… In all seriousness, I’ve recently quit my job as mailman, in part because of this. Year after year I saw the number of doorbell cameras increase, and so grew my discomfort of my job requiring me to expose myself, to these privacy-hostile situations. The worst case scenarios were semi-detached houses: since the doors to the paired addresses are right beside another. Between the entries there’s often (decorative) separation, requiring some acrobatics to shortcut to the next address. If the second address would have a doorbell camera, while requiring me to sidestep between the obstructions, I could either: A) face the door and have my face right up to the camera, or B) turn my back to it and spin back into position. I did the latter, and I HATED having to adapt my seemingly simple job to this extend, just to protect my dignity.

    The Netherlands technically requires a sign which indicates camera surveillance, besides having to direct cameras in such a way that they cannot capture the public sphere. But have a guess at how much enforcement there is in this regard…