{
    "version": "https:\/\/jsonfeed.org\/version\/1.1",
    "title": "Privacy",
    "_rss_description": "Home page · Travel · На русском",
    "_rss_language": "en",
    "_itunes_email": "",
    "_itunes_categories_xml": "",
    "_itunes_image": "",
    "_itunes_explicit": "",
    "home_page_url": "https:\/\/robert.uber.space\/blog\/tags\/privacy\/",
    "feed_url": "https:\/\/robert.uber.space\/blog\/tags\/privacy\/json\/",
    "icon": "https:\/\/robert.uber.space\/blog\/pictures\/userpic\/userpic@2x.jpg?1739870896",
    "authors": [
        {
            "name": "Robert",
            "url": "https:\/\/robert.uber.space\/blog\/",
            "avatar": "https:\/\/robert.uber.space\/blog\/pictures\/userpic\/userpic@2x.jpg?1739870896"
        }
    ],
    "items": [
        {
            "id": "1448",
            "url": "https:\/\/robert.uber.space\/blog\/all\/freedurov\/",
            "title": "Free Pavel Durov",
            "content_html": "<p>I have my doubts about Telegram’s privacy, and thus prefer using <a href=\"https:\/\/simplex.chat\/contact#\/?v=1-4&smp=smp%3A%2F%2FPtsqghzQKU83kYTlQ1VKg996dW4Cw4x_bvpKmiv8uns%3D%40smp18.simplex.im%2Fs1Xf_PP6c0eqqsRiVtAWHmqoDOmP_2IT%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAQnaIgJ3YBozefStaPP1h1_5xjQAOfdVx9N8D-Gy7qmQ%253D%26srv%3Dlyqpnwbs2zqfr45jqkncwpywpbtq7jrhxnib5qddtr6npjyezuwd3nqd.onion\">SimpleX<\/a> instead.<\/p>\n<p>But I will never tolerate the arrest of a man for avoiding collaboration with intelligence services. The EU and the so-called “free world” are becoming ever more dystopian...<\/p>\n<p>Pavel Durov must be freed immediately.<\/p>\n",
            "summary": "Pavel Durov must be freed immediately",
            "date_published": "2024-08-24T23:11:52+02:00",
            "date_modified": "2024-11-28T16:07:54+02:00",
            "tags": [
                "Europe",
                "France",
                "freedom",
                "privacy"
            ],
            "_date_published_rfc2822": "Sat, 24 Aug 2024 23:11:52 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1448",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "1419",
            "url": "https:\/\/robert.uber.space\/blog\/all\/cybersecurity\/",
            "title": "Technological measures for cybersecurity",
            "content_html": "<p>There are various kinds of cybersecurity measures: organisational, legal, technological, and physical. All of them are useful, but the technological ones are the most resilient.<\/p>\n<h2>Policies and platforms are short-lived by nature<\/h2>\n<p>Legislation and policies are short-lived and unreliable, they are easy to bypass and modify. Just as platforms, they are created and maintained in a centralised manner by people who cannot be held to account. Protocols, on the other hand, are far more reliable, because they work in any jurisdiction and under any management. If a protocol’s creator dies or loses control, it keeps on working regardless. SimpleX, RSS, Monero, and the internet itself are all open protocols that do not belong to any company.<\/p>\n<p>There can be any formal rule, but only the technologically enforced one will be followed. To falsify a contract on a Proof-of-Work blockchain, one needs to take over 51% of the network, and not just a single notary office. Good cryptocurrencies have monetary policies that are deeply thought through, so people don’t have to worry about central banks making the “right choice”. Decentralised domain protocols allow for true domain ownership, so people don’t have to worry about the benevolence of the Internet Corporation for Assigned Names and Numbers (ICANN).<\/p>\n<p>As for data protection, it’s possible, of course, to open a company in one country and have it belong to two legal entities in two other countries, dividing data between different jurisdictions. Yet legislation can always change, while technologies will keep on working regardless. Such a legal move can only be an addition to technological measures, not their replacement.<\/p>\n<p>The European GDPR allows citizens to withdraw consent to their data being processed, as well as to exercise “the right to be forgotten” and thereby remove all data about themselves from the public eye. But as the Streisand effect proves, a person who states the desire to hide will thereafter only become more visible. Services that truly want to streamline data deletion allow it to be done with a simple click — no emails and phone calls required.<\/p>\n<p>“Security through obscurity” leads to lack of responsibility and accountability. Good defence works even if the enemy knows how it works.<\/p>\n<h2>The zero-trust approach works best<\/h2>\n<p>When a system is transparent and comprehensible, there is no need to rely on others’ oaths: violations are seen, while vulnerabilities are easy to fix. Transparent and comprehensible software is open-source, its builds are reproducible. If it connects to the web, it has an <a href=\"https:\/\/obdev.at\/iap\/index.html\">Internet Access Policy<\/a>.<\/p>\n<p>Reliable devices have open schematics and, when possible, are physically transparent to make it easy to notice foreign components. The microphone and camera are turned off electrically, not via software.<\/p>\n<p>If some code isn’t being used, it needs to be removed. The simpler the software, the fewer the bugs & vulnerabilities, and the higher the likelihood of detailed external audits.<\/p>\n<p>Technologies should be built in ways that make surveillance impossible, with data being processed only after the user’s conscious consent. It’s preferable for all new technologies to be backwards-compatible: this makes their adoption easier. Optional privacy is no privacy at all, as it divides people into normies and “those with something to hide” — that’s why Monero rules and Zcash drools.<\/p>\n<p>The zero-trust model is a good way to enhance security. In an organisation, this means embedding multi-level access control: each person can only access the data needed for the time needed. Accepting that anything can leak leads to minimising data collection and storage; accounts are not created without good reason.<\/p>\n<p>Zero-trust can also be implemented on a local level via sandboxing. This means isolating browsers, ecosystems, and devices: using one for the personal, another for work, and a third for the alter ego. Access to one account or device will thus never be enough to paint a full picture of someone’s life.<\/p>\n<h2>Tips to enhance privacy and security<\/h2>\n<p>As many interactions as possible should happen anonymously or at least pseudonymously. To make identification more difficult, one can reduce the amount of static data by constantly changing IP addresses with a VPN, randomising MAC addresses, <a href=\"https:\/\/youtu.be\/Vt4Jl4t43ug\">preferring IPv4 to IPv6<\/a>, spreading disinformation about identity. It’s harder to identify a person whose name isn’t tied to a device.<\/p>\n<p>Browser-level protection is not enough: it’s not the only program communicating with the internet. Also, the more a browser is configured, such as with installed plugins, the easier it is to identify the person through metadata. Restrictions, such as those related to scripts, should be set on the system or router level.<\/p>\n<p>Authentication should consist of multiple factors: what a person knows and what a person has. Emails and SMS messages should not be obligatory factors because of their low privacy. There also should not be any shared secrets: many people are unable to follow instructions and keep passwords in a safe place.<\/p>\n<p>As much as possible should happen locally: the cloud is just someone else’s computer, while trusted third parties are security holes. However, if an interaction requires the internet, a web app is safer than a local app: a closed browser tab guarantees absence of background communications.<\/p>\n<p>Almost everything should be encrypted, but it’s important to remember that malware (and on-device AI) can gather data before encryption and after decryption.<\/p>\n<p>It’s best to avoid passing SSDs onto others: the only way to truly ensure the absence of previously “deleted” data is to smash the disk.<\/p>\n<p>To completely exclude remote attacks, a device should not have Wi-Fi, Bluetooth, microphones, and cameras; any connections should happen physically. Such devices are typically kept in hard-to-reach places. If such a device were to be accessed, it should notify about this, both on the software and hardware levels. The most advanced devices use deniable encryption, fooling potential extorters into believing that the little data they manage to retrieve is all there is.<\/p>\n<h2>Final thoughts<\/h2>\n<p>Certain kinds of digital threats can be prevented only with transparent technological measures.<\/p>\n<p>However, a system can never be fully secure — this would make it inoperable. Tradeoffs are unavoidable; security measures should be chosen based on threat model, threat probability, objective limitations, long-term goals, and budget.<\/p>\n<p>As of today, network effects continue to sway people towards centralised messaging apps, many sites needlessly require registration, hardly any devices have open schematics, and decentralised domain protocols are still uncommon. There is great room for improvement — let’s get to it.<\/p>\n",
            "summary": "Technological cybersecurity measures are the most resilient",
            "date_published": "2024-07-29T10:11:19+02:00",
            "date_modified": "2025-08-27T14:20:53+02:00",
            "tags": [
                "decentralisation",
                "Europe",
                "legislation",
                "privacy",
                "programming",
                "software",
                "solutions",
                "strategy",
                "tech",
                "websteads"
            ],
            "_date_published_rfc2822": "Mon, 29 Jul 2024 10:11:19 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1419",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "1391",
            "url": "https:\/\/robert.uber.space\/blog\/all\/chatcontrol-2024\/",
            "title": "A new attempt at chatcontrol",
            "content_html": "<p>Now that the elections are over, Eurocrats’ hands are no longer tied by accountability. They will be trying to pass <a href=\"https:\/\/robertblinov.net\/blog\/tags\/chatcontrol\/\">chatcontrol<\/a> legislation on Thursday June 20.<\/p>\n<p>Unacceptable! Defend freedom by making your voice heard.<\/p>\n",
            "summary": "Eurocrats will be trying to pass chatcontrol legislation on Thursday June 20th",
            "date_published": "2024-06-19T15:43:17+02:00",
            "date_modified": "2025-03-05T17:47:56+02:00",
            "tags": [
                "chatcontrol",
                "Europe",
                "freedom",
                "legislation",
                "privacy"
            ],
            "_date_published_rfc2822": "Wed, 19 Jun 2024 15:43:17 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1391",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "1270",
            "url": "https:\/\/robert.uber.space\/blog\/all\/qwac\/",
            "title": "It QWACs like a duck",
            "content_html": "<p>It looks like <a href=\"https:\/\/robertblinov.net\/blog\/tags\/chatcontrol\/\">chatcontrol<\/a> was <a href=\"https:\/\/www.patrick-breyer.de\/en\/historic-agreement-on-child-sexual-abuse-proposal-csar-european-parliament-wants-to-remove-chat-control-and-safeguard-secure-encryption\/\">called off<\/a>.<\/p>\n<p>But the EU still lusts for new surveillance powers (duh). It now wants to force browsers to use state-issued QWACs — lower-security web certificates which will potentially allow it to fully monitor web traffic.<\/p>\n<p>I reckon that good open-source browsers will not put government above user. But <a href=\"https:\/\/www.eid.as\/#article45\">article 45 of the eIDAS regulation<\/a> should be stopped regardless.<\/p>\n",
            "summary": "The EU still lusts for new surveillance powers",
            "date_published": "2023-11-06T12:35:56+02:00",
            "date_modified": "2025-08-27T14:23:29+02:00",
            "tags": [
                "chatcontrol",
                "Europe",
                "privacy",
                "software"
            ],
            "_date_published_rfc2822": "Mon, 06 Nov 2023 12:35:56 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1270",
            "_e2_data": {
                "is_favourite": true,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "1249",
            "url": "https:\/\/robert.uber.space\/blog\/all\/ukraine-eu\/",
            "title": "Ukraine should not enter the EU",
            "content_html": "<p>At least for now. Other European countries will have to pay dearly to accomodate and reconstruct the poorest member state.<\/p>\n<p>But we have other priorities: cutting red tape, slashing government spending & taxes, stopping the digital euro, deregulating firearms, and abolishing family courts.<\/p>\n",
            "summary": "At least for now",
            "date_published": "2023-10-04T09:07:23+02:00",
            "date_modified": "2024-09-27T09:50:56+02:00",
            "tags": [
                "Europe",
                "privacy",
                "Ukraine",
                "wealthlore"
            ],
            "_date_published_rfc2822": "Wed, 04 Oct 2023 09:07:23 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1249",
            "_e2_data": {
                "is_favourite": true,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "1203",
            "url": "https:\/\/robert.uber.space\/blog\/all\/tech-talk\/",
            "title": "Tech of freedom and of slavery",
            "content_html": "<div class=\"e2-text-picture\">\n<img src=\"https:\/\/robert.uber.space\/blog\/pictures\/sep-9-talk.png.jpg\" width=\"2560\" height=\"1440\" alt=\"\" \/>\n<\/div>\n<p>I will be giving a talk about the state of modern technology <a href=\"https:\/\/www.lasorgentesanremo.it\/prossimi-eventi\/le-tecnologie-di-liberta-e-di-schiavitu\">at Villa La Brise<\/a> in Sanremo.<\/p>\n<p>Saturday 9 September, 17:30.<\/p>\n<!-- lecture --><!-- Wi-Fi --><!-- SIM cards --><!-- contact list --><!-- AI --><!-- artificial intelligence --><!-- decentralisation --><!-- decentralization --><!-- Sorgente -->",
            "summary": "I will be giving a talk about the state of modern technology at Villa La Brise in Sanremo",
            "date_published": "2023-08-22T16:15:27+02:00",
            "date_modified": "2024-11-28T16:10:02+02:00",
            "tags": [
                "decentralisation",
                "freedom",
                "Italy",
                "my events",
                "privacy",
                "Remes",
                "tech",
                "undertakings"
            ],
            "image": "https:\/\/robert.uber.space\/blog\/pictures\/sep-9-talk.png.jpg",
            "_date_published_rfc2822": "Tue, 22 Aug 2023 16:15:27 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1203",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": [
                    "https:\/\/robert.uber.space\/blog\/pictures\/sep-9-talk.png.jpg"
                ]
            }
        },
        {
            "id": "1198",
            "url": "https:\/\/robert.uber.space\/blog\/all\/cryptography-florence\/",
            "title": "Cryptography masterclass in Florence",
            "content_html": "<div class=\"e2-text-picture\">\n<img src=\"https:\/\/robert.uber.space\/blog\/pictures\/criptografia-1-set.jpeg\" width=\"1280\" height=\"1280\" alt=\"\" \/>\n<\/div>\n<p>I will be hosting a cryptography masterclass <a href=\"https:\/\/festivaldellanuovaumanita.com\">at the New Humanity Festival<\/a> in Florence.<\/p>\n<p>Friday 1 September, 15:00, Enzo Pazzagli Park.<\/p>\n",
            "summary": "I will be hosting a cryptography masterclass at the New Humanity Festival in Florence",
            "date_published": "2023-08-18T08:01:13+02:00",
            "date_modified": "2024-10-20T08:06:00+02:00",
            "tags": [
                "Florence",
                "Italy",
                "my events",
                "privacy",
                "undertakings"
            ],
            "image": "https:\/\/robert.uber.space\/blog\/pictures\/criptografia-1-set.jpeg",
            "_date_published_rfc2822": "Fri, 18 Aug 2023 08:01:13 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1198",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": [
                    "https:\/\/robert.uber.space\/blog\/pictures\/criptografia-1-set.jpeg"
                ]
            }
        },
        {
            "id": "1044",
            "url": "https:\/\/robert.uber.space\/blog\/all\/currencies\/",
            "title": "Privacy-respecting currencies",
            "content_html": "<p>All privacy-respecting currencies have tradeoffs:<\/p>\n<div class=\"e2-text-picture\">\n<img src=\"https:\/\/robert.uber.space\/blog\/pictures\/privacy-respecting-currencies.png\" width=\"1400\" height=\"1400\" alt=\"\" \/>\n<\/div>\n<p>Perhaps <a href=\"https:\/\/goldback.com\">Goldbacks<\/a> are the way?<\/p>\n",
            "summary": "All privacy-respecting currencies have tradeoffs",
            "date_published": "2023-06-04T14:11:48+02:00",
            "date_modified": "2024-10-20T07:58:40+02:00",
            "tags": [
                "Monero",
                "privacy",
                "wealthlore"
            ],
            "image": "https:\/\/robert.uber.space\/blog\/pictures\/privacy-respecting-currencies.png",
            "_date_published_rfc2822": "Sun, 04 Jun 2023 14:11:48 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "1044",
            "_e2_data": {
                "is_favourite": true,
                "links_required": [],
                "og_images": [
                    "https:\/\/robert.uber.space\/blog\/pictures\/privacy-respecting-currencies.png"
                ]
            }
        },
        {
            "id": "874",
            "url": "https:\/\/robert.uber.space\/blog\/all\/cyber-censorship\/",
            "title": "Fight back against cyber-censorship",
            "content_html": "<p>Woke publishers and video platforms are making retroäctive changes to great classics. Fight back by storing valuable content offline.<\/p>\n<p>KYC finance limits people from transacting freely. Fight back by using cash and Monero.<\/p>\n<p>Purposefully-built filter-bubbles limit important information from reaching normies. Fight back by personally explaining the threatening agendas to as many as possible.<\/p>\n<p>Happy World Day Against Cyber-Censorship!<\/p>\n",
            "summary": "Happy World Day Against Cyber-Censorship!",
            "date_published": "2023-03-12T21:50:20+02:00",
            "date_modified": "2024-10-21T08:56:01+02:00",
            "tags": [
                "cancel-culture",
                "Monero",
                "privacy",
                "the web"
            ],
            "_date_published_rfc2822": "Sun, 12 Mar 2023 21:50:20 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "874",
            "_e2_data": {
                "is_favourite": true,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "766",
            "url": "https:\/\/robert.uber.space\/blog\/all\/2017-mbp-linux-no-audio\/",
            "title": "No audio on 2017 MacBook Pro running Linux",
            "content_html": "<p>Set on avoiding <a href=\"https:\/\/robertblinov.net\/blog\/all\/unhappy-with-apple\/\">Apple telemetry<\/a>, I wiped my 2017 Touch-Bar-free 13″ MacBook Pro and installed Artix Linux on it.<\/p>\n<p>The notebook performed well on macOS, yet Linux managed to give it a boost: it never heated up and thus its fans never ran, while the battery lasted longer and charged faster.<\/p>\n<p>However, there was a catch: no audio. I spent weeks scouring for a solution and applying found patches, all to no avail. I then began to program a solution myself, only to realise that it was not a worthwhile task.<\/p>\n<p>macOS returns, for now.<\/p>\n",
            "summary": "Set on avoiding Apple telemetry, I installed Linux on my MacBook Pro",
            "date_published": "2022-12-17T22:48:11+02:00",
            "date_modified": "2024-09-23T11:59:37+02:00",
            "tags": [
                "Apple",
                "privacy",
                "software"
            ],
            "_date_published_rfc2822": "Sat, 17 Dec 2022 22:48:11 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "766",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "724",
            "url": "https:\/\/robert.uber.space\/blog\/all\/legislation-resistant\/",
            "title": "Legislation-resistant technologies",
            "content_html": "<p>The Eurosoviet Von der Leyen regime today presented <a href=\"https:\/\/ec.europa.eu\/home-affairs\/system\/files\/2022-05\/Proposal%20for%20a%20Regulation%20laying%20down%20rules%20to%20prevent%20and%20combat%20child%20sexual%20abuse_en.pdf\">a draft law<\/a> on mandatory chatcontrol. The absolute surveillance it calls for is an attack on free society.<\/p>\n<p>Technologies should be built in ways that make such laws impossible to enforce. Optional privacy is no privacy at all, as it divides people into normies and “those with something to hide” — that’s why Monero rules and Zcash drools. Decentralisation and transparency are paramount.<\/p>\n<p class=\"loud\">Avoid Big Tech, be smart, and destroy tyrannies!<\/p>\n",
            "summary": "Technologies should be built in ways that make tyrannical laws impossible to enforce",
            "date_published": "2022-05-11T21:13:16+02:00",
            "date_modified": "2025-08-27T14:43:04+02:00",
            "tags": [
                "chatcontrol",
                "decentralisation",
                "Europe",
                "freedom",
                "legislation",
                "might",
                "Monero",
                "privacy",
                "tech"
            ],
            "_date_published_rfc2822": "Wed, 11 May 2022 21:13:16 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "724",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "694",
            "url": "https:\/\/robert.uber.space\/blog\/all\/chatcontrol-call\/",
            "title": "Called the EU about chatcontrol",
            "content_html": "<p><a href=\"https:\/\/www.patrick-breyer.de\/en\/posts\/messaging-and-chat-control\/\">Chatcontrol<\/a> is unacceptable. That is why I left <a href=\"https:\/\/robertblinov.net\/blog\/all\/1984-eu\">EU<\/a> Home Affairs Commissioner, Ylva Johansson, a strongly-worded message:<\/p>\n<div class=\"e2-text-audio\">\n<div class=\"e2-text-super-wrapper e2-jouele-wrapper\"><a class=\"jouele\" data-space-control=\"true\" data-length=\"187\" href=\"https:\/\/robert.uber.space\/blog\/audio\/chatcontrol.mp3\">February 8, 2022<\/a><\/div>\n<\/div>\n<div class=\"e2-text-video\">\n<video src=\"https:\/\/robert.uber.space\/blog\/video\/chatcontrol.mov#t=0.001\" width=\"1080\" height=\"720\" controls alt=\"\" \/>\n\n<\/div>\n<p>Here’s the transcript:<\/p>\n<blockquote>\n<p>Hello Ms. Johansson, I would like to talk to you about the new chatcontrol legislation and how it is absolutely disastrous for everyone in the EU and generally in the world.<\/p>\n<\/blockquote>\n<blockquote>\n<p>The European Union wants to “temporarily” mandate spying on personal conversations in order to “protect children”. By doing this, it is effectively banning end-to-end messaging encryption, allowing potential thieves and murderers to read our conversations. Criminals will always disobey the law, so this [proposal] won’t help. If you begin scanning messages that go through servers held by companies, crime networks will set up their own private servers. Crime is fought through education, freedom to work in ethical industries, and a tough approach to who can immigrate to a country. There is no such thing as a backdoor which can only be used for good, just as is there is no such thing as a temporary mandate. If a state of emergency gives a government extra powers, the government will never want to let go of them, and will keep extending the emergency forever, just as it has done with the Covid epidemic.<\/p>\n<\/blockquote>\n<blockquote>\n<p>You will be held accountable for your actions. Please, Ms. Johansson, don’t enact this law! Don’t encourage your people to enact this law! This is absolutely horrible, this will destroy the creativity of people: they will [become] afraid. Even if the people trust the government now, what if there’s a government that’s completely the opposite, what will they do with this ability? They will persecute people for different beliefs! You have to be careful about any law enacted now even if it’s for supposed good (this law cannot do any good, but nevertheless), imagine if the complete opposite — if a tyrannical dictator — used this law. This law is absolutely horrific and as a concerned citizen I really do not this law to be passed.<\/p>\n<\/blockquote>\n<p>I left Executive Vice President for a Europe of the Digital Age, Margrethe Vestager, a similar message.<\/p>\n<p>I also called EU Commission President, Ursula von der Leyen, who hung up seconds after responding, twice. Not something unusual from a corrupt New World Order tyrant who wishes for a universal digital ID (read: <a href=\"https:\/\/robertblinov.net\/blog\/all\/1984-green-passes\/\">social score<\/a>) and signs secret deals with pharmaceutical companies.<\/p>\n",
            "summary": "Chatcontrol is unacceptable. That is why I began calling EU officials",
            "date_published": "2022-02-08T20:07:43+02:00",
            "date_modified": "2025-08-27T14:43:42+02:00",
            "tags": [
                "chatcontrol",
                "Europe",
                "freedom",
                "legislation",
                "migration",
                "privacy"
            ],
            "_date_published_rfc2822": "Tue, 08 Feb 2022 20:07:43 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "694",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [
                    "jquery\/jquery.js",
                    "jouele\/jouele.css",
                    "jouele\/jouele.js"
                ],
                "og_images": []
            }
        },
        {
            "id": "682",
            "url": "https:\/\/robert.uber.space\/blog\/all\/unhappy-with-apple\/",
            "title": "Unhappy with Apple",
            "content_html": "<p>Over the past two years I’ve grown quite unhappy with Apple. The beauty and iconicity of its products are not enough for me to continue supporting the company.<\/p>\n<p>Apple is often applauded for its humane interface design and attention to detail. It often does deserve this praise: one-touch headphone setup and Live Text really are fantastic features that <i>just work<\/i>. But Apple designs its products this well only when it is financially beneficial. The MacBook’s power brick is deliberately unrepairable: not only does it have no screws, but it is also tied to its power controller by serial number, forcing people to buy a new one if it breaks. The devices that do have screws require uncommon drivers. The charging cable, meanwhile, is meant to last one year and to then biodegrade, “to protect the environment”. What a clown world: a biodegradable cable that only lasts a year cannot be better for the environment than a non-biodegradable one that lasts a lifetime. I will not believe anything that Apple says about the environment until it makes its devices repair-friendly.<\/p>\n<p>Apple products are also almost completely closed-source, which makes it significantly harder to find vulnerabilities and preïnstalled spyware.<\/p>\n<p>Privacy? That’s not iPhone. Apple respects privacy <a href=\"https:\/\/apple.com\/legal\/privacy\/en-ww\/\">only marginally more<\/a> than Facebook and Google do. It collects metadata in the background, creates a social graph, communicates with cell networks even in airplane mode, makes a plot of surrounding Wi-Fi networks, offers no easily removable battery, and requires signing up to download software on iOS. The latter is a problem that goes beyond privacy, as <a href=\"https:\/\/robertblinov.net\/blog\/all\/tech-companies-ban-trump-and-co\/\">Apple can ban individuals<\/a> from downloading and updating apps.<\/p>\n<p>As a cherry on top, Apple devices are manufactured by slaves in China. Oh, and it also <a href=\"https:\/\/infowars.com\/posts\/apple-releases-pregnant-man-emoji-to-brainwash-the-public\/\">wants us to believe<\/a> that men can become pregnant.<\/p>\n<p>I will continue using my iPhone XR and MacBook Pro until they break or stop receiving vital software updates — this way I am not harming the environment nor supporting the company. I will, however, soon delete my Apple ID completely, as I have already done with my accounts at Google and other privacy-invading and humanity-disrespecting companies.<\/p>\n",
            "summary": "Over the past two years I’ve grown quite unhappy with Apple. The beauty and iconicity of its products is not enough for me to continue supporting the company",
            "date_published": "2022-01-31T23:36:48+02:00",
            "date_modified": "2025-08-27T14:44:34+02:00",
            "tags": [
                "Apple",
                "design",
                "environment",
                "privacy",
                "software",
                "tech"
            ],
            "_date_published_rfc2822": "Mon, 31 Jan 2022 23:36:48 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "682",
            "_e2_data": {
                "is_favourite": true,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "568",
            "url": "https:\/\/robert.uber.space\/blog\/all\/1984-tech\/",
            "title": "1984: technology",
            "content_html": "<p>Every Intel and AMD chip since 2008 <a href=\"https:\/\/briankoberlein.com\/tech\/trojan-horse\/\">has a backdoor<\/a> that allows hardware manufacturers (and presumably the NSA) to manage files and network connections remotely, without the device’s owner even knowing. Purism <a href=\"https:\/\/puri.sm\/learn\/intel-me\/\">has disabled it<\/a>, Apple has not.<\/p>\n<p>Indeed, Apple is not as privacy-focussed as it pretends to be. Along with embracing that backdoor, it <a href=\"https:\/\/sneak.berlin\/20201112\/your-computer-isnt-yours\/\">sends app usage metadata to its servers<\/a>. Its <a href=\"https:\/\/apple.com\/child-safety\/\">image scanning<\/a> is yet another dangerous development: bugs in the algorithm could lead to people being wrongfully detained.<\/p>\n<p>5G may be fast but it can pinpoint our location <a href=\"http:\/\/iteroni.com\/watch?v=Mk5hZcIKAFY\">to the metre<\/a>.<\/p>\n<p>Tor <a href=\"https:\/\/surveillancevalley.com\/blog\/government-backed-privacy-tools-are-not-going-to-protect-us-from-president-trump\">is an American federal weapons contractor<\/a>. Judging by Europol <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/international-sting-against-dark-web-vendors-leads-to-179-arrests\">acknowledging that it has a way<\/a> to deanonymise people using the network, using Tor is the same as wearing a black cloak in a room in which everyone else wears white.<\/p>\n<p>The bank ING is integrating personal health records into its website. This could be a way to turn people into slaves by forcing them to surrender their bodies to Big Pharma, just to keep what was always rightfully theirs.<\/p>\n<p>I am writing this series of posts not to convey gloom and defeat, but to highlight how much manipulation, corruption, and secret surveillance there is around us.<\/p>\n<p>We should act, and do so now. Switch to open-source software — its transparency makes vulnerabilities easier to find. For those developing it, self-host <a href=\"https:\/\/unixdigest.com\/articles\/important-open-source-projects-should-not-use-github.html\">instead of relying on GitHub and the like<\/a>. Boycotting banks, Big Tech, and the many organisations that want to decide what’s “best” for us is painful at first, but has to be done to stop cyber-tyranny.<\/p>\n",
            "summary": "Cyber-tyranny by manipulation, corruption, and secret surveillance",
            "date_published": "2021-08-16T18:50:43+02:00",
            "date_modified": "2025-08-27T14:46:29+02:00",
            "tags": [
                "1984",
                "Apple",
                "Great Reset",
                "privacy",
                "software",
                "tech"
            ],
            "_date_published_rfc2822": "Mon, 16 Aug 2021 18:50:43 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "568",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "567",
            "url": "https:\/\/robert.uber.space\/blog\/all\/green-passes\/",
            "title": "1984: green passes",
            "content_html": "<p>There’s nothing inherently bad about green passes: they are a useful tool for limiting viral spread during an outbreak.<\/p>\n<p>But <i>mandating<\/i> green passes is ethically acceptable only when the alternative is a stay-at-home order. This means that green passes may become obligatory only during a surge that threatens to overwhelm hospitals, and only for entering certain crowded areas. Of course, private businesses should be able to set any additional rules they like.<\/p>\n<p>Anybody who wants to “save people from themselves” is endorsing enslavement. Restrictions should always be the minimum necessary to protect hospitals from overwhelm.<\/p>\n<p>The European Green Pass was created by the EU government. Embracing it is dangerous, as is relying on the government for anything. A government that can give you everything you want is a government that can take away everything you have. Should green passes be required to access all public places, nasty leaders will be able to isolate dissidents and protesters, limit access to courts, constantly track whereabouts, force people to take a jab every month, and perhaps even automate the process of repression by adding social credit scores.<\/p>\n<p class=\"loud\">It’s always harder to regain freedom than to have it taken away.<\/p>\n",
            "summary": "There’s nothing inherently bad about green passes. But problems arise when they are mandated",
            "date_published": "2021-07-23T10:26:13+02:00",
            "date_modified": "2024-11-28T16:10:31+02:00",
            "tags": [
                "1984",
                "Covid",
                "ethics",
                "Europe",
                "freedom",
                "Great Reset",
                "Italy",
                "privacy"
            ],
            "_date_published_rfc2822": "Fri, 23 Jul 2021 10:26:13 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "567",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "563",
            "url": "https:\/\/robert.uber.space\/blog\/all\/1984-eu\/",
            "title": "1984 in the European Union",
            "content_html": "<p><b>If we’re not yet living in 1984, then we’re closer than ever.<\/b><\/p>\n<p>The European Union <a href=\"https:\/\/web.archive.org\/web\/20210729214359\/https:\/\/www.patrick-breyer.de\/en\/posts\/message-screening\/\">wants to “temporarily” mandate<\/a> spying on personal conversations in order to “protect” children. By doing this, it is effectively banning end-to-end messaging encryption, allowing potential thieves and murderers to read our conversations. If the EU doesn’t backtrack on this, I expect principled communication companies like <a href=\"https:\/\/posteo.de\">Posteo<\/a> to move to freër lands and give this law the finger.<\/p>\n<p>But the EU is not done yet. Under the pretext of <a href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/IP_21_3690\" class=\"nu\">“<u>beating financial crime<\/u>”<\/a> it wants to ban pseudonymous cryptocurrency wallets. Since the EU already has a database of gun owners, muggers will be able to find out which unarmed individual to hold hostage for money. The EU must backtrack on this if it wants its economy to grow and its citizens to live a peaceful life.<\/p>\n<p>Stopping the introduction of these regulations isn’t enough — they are a sign of a wider problem. <b>The EU is too powerful and needs to be reformed.<\/b><\/p>\n",
            "summary": "If we’re not yet living in 1984, then we’re closer than ever",
            "date_published": "2021-07-21T20:38:25+02:00",
            "date_modified": "2025-08-27T14:45:49+02:00",
            "tags": [
                "1984",
                "chatcontrol",
                "Europe",
                "privacy",
                "wealthlore"
            ],
            "_date_published_rfc2822": "Wed, 21 Jul 2021 20:38:25 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "563",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        },
        {
            "id": "287",
            "url": "https:\/\/robert.uber.space\/blog\/all\/call-recording\/",
            "title": "Opt-out from call recording",
            "content_html": "<p>I called Swiss Air today. Instead of the usual “we record your call to improve our services” I was asked about whether I want my call recorded.<\/p>\n<p>This is what good customer service is all about.<\/p>\n",
            "summary": "I called Swiss Air today. Instead of the usual “we record your call to improve our services” I was asked about whether I want my call recorded",
            "date_published": "2020-08-03T21:43:15+02:00",
            "date_modified": "2024-10-21T09:07:57+02:00",
            "tags": [
                "care",
                "privacy"
            ],
            "_date_published_rfc2822": "Mon, 03 Aug 2020 21:43:15 +0200",
            "_rss_guid_is_permalink": "false",
            "_rss_guid": "287",
            "_e2_data": {
                "is_favourite": false,
                "links_required": [],
                "og_images": []
            }
        }
    ],
    "_e2_version": 4199,
    "_e2_ua_string": "Aegea 11.5 (v4199)"
}