this post was submitted on 25 Dec 2024
284 points (98.3% liked)

Ask Lemmy

27277 readers
1311 users here now

A Fediverse community for open-ended, thought provoking questions


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.


6) No US Politics.
Please don't post about current US Politics. If you need to do this, try !politicaldiscussion@lemmy.world or !askusa@discuss.online


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 2 years ago
MODERATORS
 

I'm getting a bit sick of large corporations a) demanding excess data as a condition of doing business with me, b) allowing it to be stolen, and c) giving zero fucks about it.

What are some things that us netizens can do to make our displeasure known.

Extra points for funny ideas.

top 50 comments
sorted by: hot top controversial new old
[–] JoeKrogan@lemmy.world 23 points 1 day ago

Use bots to apply for the open positions to waste time. Reject them all for not enough pay.

Post public info of the CEO class

Piracy

Give fake data when using all services.

Start and join boycott groups.

Use their social media against them. Eg post their dirty laundry as a comment on their post.

Stop using as many services as possible. It might not be funny but, I mean, what if you went to a music store and bought used CDs instead of using Spotify? Do all of that you can.

[–] y0kai@lemmy.dbzer0.com 9 points 1 day ago

Start Self hosting. Keeping my data at home is how I'm sticking it to the man these days.

[–] MojoMcJojo@lemmy.world 8 points 1 day ago

Do not use actual names, birthdays, phone numbers, addresses, email addresses, etc. There's no reason they need to know that info and I love/hate seeing physical mail and email show up with my made up info. Doesn't work when paying for stuff though.

[–] OsrsNeedsF2P@lemmy.ml 7 points 1 day ago

Report bugs that don't actually exist. Keep reporting the same bug from different emails. Works especially well for apps.

[–] owenfromcanada@lemmy.world 145 points 2 days ago (1 children)
[–] WorldwideCommunity@lemm.ee 12 points 2 days ago (2 children)

Explanation for illiterates?

It’s an SQL injection joke.

Basically, when dealing with databases, you can use SQL to search or modify the data in that database. By default, you can do this by polling the database with an SQL query. But this introduces a vulnerability called SQL injection. Basically, imagine if instead of filling in a name in the “Name” field, you filled in an SQL query. If the database admins haven’t protected themselves against it, then the database will happily run that query; You have just injected an SQL query into their database. Maybe you’re a malicious attacker, looking to get a virus onto the system, or looking to extract the data.

Protecting the database from injection is done with something called sanitizing. Basically, you set up filters to disallow SQL, so it can’t touch your database. In this comic, the database admins didn’t do that, so they were unprotected.

The actual SQL uses the student’s middle name to search for any tables named “Students” and permanently delete it. The joke is that when the school admin staff enters his name into their database, it will delete any tables named “Students” and wreck their database.

[–] fool@programming.dev 40 points 2 days ago* (last edited 2 days ago) (2 children)
[–] keisatsu@infosec.pub 11 points 1 day ago

As a security consultant who tests web applications on the regular: LOL

[–] mnemonicmonkeys@sh.itjust.works 19 points 2 days ago (1 children)

Still, any programmer worth their salt should filter their inputs. One group at work refuses to do it and they always get away with it and it's infuriating

[–] PM_Your_Nudes_Please@lemmy.world 4 points 1 day ago (1 children)

One group at work refuses to do it

Sounds like a huge liability to the company.

and they always get away with it

Until they don’t. All it would take is one malicious actor (competing company, spurned employee, data thief, etc) wrecking/stealing their entire database with an injection attack.

load more comments (1 replies)
[–] hansolo@lemm.ee 23 points 1 day ago

If a company is publicly traded, then all leaked individuals are given 50.1% controlling stock in the company, split among the victims with new stocks created for them, with unclaimed stocks held in a trust controlled by anyone that did respond to claim stocks. They can sell the stocks, or drive the company into the ground out of spite. Maybe even both.

Companies not publicly traded have 3 months to make all code used, trademarked material, and patents open source in perpetuity, and 1 year to convert their corporate structure into a non-profit.

Regardless of the size of the company, the CEO, CTO, and board must eat their weight in fried bugs. They get to pick the type of bug from a list of 5 options, and any seasoning they want. Live streams of the bug eating will be monetized and the proceeds given to orphans, under the title of "It's not a bug, its a feature."

[–] yournamehere@lemm.ee 5 points 1 day ago

luigi had an idea

[–] slazer2au@lemmy.world 92 points 2 days ago (7 children)

Use EICAR test strings as your password.

If they store your password in plain text the AV will lock the user database.

If your password gets leaked and they are using bad password security, when your password is cracked the AV will isolate the file.

[–] shrodes@lemmy.world 70 points 2 days ago

Bold of you to assume a corporation storing passwords in plain text would be using AV

[–] HootinNHollerin@slrpnk.net 9 points 1 day ago* (last edited 1 day ago)

Being a non-programmer I had to look up what that is

[–] qaz@lemmy.world 39 points 2 days ago (2 children)

According to EICAR's specification the antivirus detects the test file only if it starts with the 68-byte test string and is not more than 128 bytes long. As a result, antiviruses are not expected to raise an alarm on some other document containing the test string.

This won't work, assuming the database file is more than 128 bytes long

load more comments (2 replies)
[–] Krudler@lemmy.world 19 points 2 days ago

Ah... "advice" consisting of "I've heard of a thing"

[–] QualifiedKitten@lemmy.world 2 points 1 day ago (1 children)

ELI5 please? I've read the other replies, but would love to understand a bit more.

EICAR test strings are strings of text that can be used to test an antivirus. Basically, you bury the file somewhere, and see if your AV picks it up. The joke being that if they’re storing your password in plaintext (a big no-no from a security standpoint) then their AV will clamp down on the database once you create your account and the test string is embedded.

It wouldn’t work in this instance, unfortunately; EICAR test strings are only meant to work when embedded in files that are shorter than 128 bytes. And every database is almost certainly larger than that.

load more comments (2 replies)
[–] BrotherL0v3@lemmy.world 47 points 2 days ago

Not exactly what you're looking for, but Ad-Nauseum is a nice way to inject a ton of garbage into the data corps collect.

[–] cheese_greater@lemmy.world 84 points 2 days ago* (last edited 2 days ago) (2 children)

More in the spirit of this, prefer and actively seek out alternatives that collect as little or even no data at all and test to make sure they run without internet access. If they give you a hard time or straight up dont work without an internet connection when they ought to be able to, chuck em

Edit: also call them out in reviews. Why you collect data guys, dont you want my money?

[–] Bluetreefrog@lemmy.world 17 points 2 days ago (1 children)

This has been the go-to for decades and it's not working. I feel like we need to be prepared to engage with the system, but make it clear we are not just passive consumers. Something that becomes viral maybe?....

load more comments (1 replies)
[–] noxypaws@pawb.social 18 points 2 days ago

that only works when there are alternatives that work offline. which is not guaranteed.

If anyone has one specifically for airlines, I'd love to hear it! Got plenty of time to read the comments with my cancelled flight

[–] BigDanishGuy@sh.itjust.works 15 points 1 day ago* (last edited 1 day ago) (2 children)

Edit: whoops, I missed the "il" part in "not illegal". Anyway you should definitely not do the following. Allegedly doing the following would be arson, and society frowns upon such things.

Easy:

  1. Identify company
  2. Wait until it's a weekend night. We're not after the wage slaves after all.
  3. Mix polystyrene and gasoline. Remember that gasoline can melt some plastics, so if using a plastic container for mixing do a test first. You do not want napalm all over the place.
  4. Fill the gooey substance in glass bottles.
  5. Cap the bottles. (see #7)
  6. Drive to the company.
  7. Open bottles and put wicks in them. (important not to do this earlier. Driving with open gasoline containers in your car will make you drowsy and is a fire hazard)
  8. If you haven't already got gloves on, put them on and wipe down the bottles - you may have to leave some at some point.
  9. Have accomplices trigger fire alarms all over the local fire department's district. Either automatic fire alarms will be discarded for a bit or the marshall will be tied up investigating.
  10. Light a wick, throw the bottle at the company, try to get it to break a window.
  11. If you're out of bottles or you see blue lights cheese it. Otherwise go back a step and repeat it.
load more comments (2 replies)
[–] helmet91@lemmy.world 18 points 2 days ago

Don't use their services.

[–] GrumpyDuckling@sh.itjust.works 41 points 2 days ago (4 children)

If you send back one of those reply mail envelopes it costs them money. Stuff those envelopes with junk and send them back.

[–] FlashMobOfOne@lemmy.world 17 points 2 days ago (1 children)

I don't get many of them anymore, but when I do, I mail them back with a little slip of paper inside that says "poop".

[–] Elaine@lemm.ee 2 points 1 day ago

This brings me so much joy.

load more comments (3 replies)
[–] granolabar@kbin.melroy.org 47 points 2 days ago (3 children)

Deny engagement and profit. It a takes a mind set change but a lot of shit can go avoided.

Streamimg can be replaced with Yarr

Use products you have longer until they break or not longer don't fit use case

Start your shopping on the second market.

Generally Corpo's and government are centralized and get benefits of that system, working class is decentralized naturally so we need to lean into that.

[–] Norin@lemmy.world 14 points 2 days ago

Absolutely.

Buy things used, repair and jailbreak what you can, and learn to make things for yourself.

We can’t, at least as individuals, divest from every exploitative system. But, we can remove ourselves from more than we think.

Often enough, you get a better experience out of the homemade and secondary market than whatever the new thing you’re being pushed can give.

load more comments (2 replies)
[–] uriel238@lemmy.blahaj.zone 15 points 2 days ago (2 children)

The fake name generator might be useful. There are also temporary email services for when a site account requires a confirmed email.

[–] donuts@lemmy.world 2 points 1 day ago

Sounds like it does the opposite of what OP wants:

I stopped counting after 2000+ vendors

load more comments (1 replies)
[–] fool@programming.dev 22 points 2 days ago

Make your data useless or wrong.

More passively, there's probably an oddly large amount of John Does born on January 1, 2000 ;)

More offensively, anti-image-gen data poisoning such as Nightshade exists. It's well-defended against IIRC so hopefully someone can Cunningham's Law correct me. And this is also more solo of a movement (as opposed to gaining mass support for something)

[–] stinerman@midwest.social 24 points 2 days ago

As others have said, the best instances of direct action are illegal.

[–] halloween_spookster@lemmy.world 33 points 2 days ago (1 children)

I'm skeptical that anything legal will work for very long because they will quickly work to make said legal action illegal.

load more comments (1 replies)
[–] j4k3@lemmy.world 36 points 2 days ago (2 children)

Send a copy of the receipt for your donation to the open source project that most closely aims to be their alternative. Explain why you're angry in 3 sentences and do so like you are condescendingly speaking to a five year old.

[–] Evil_Shrubbery@lemm.ee 13 points 2 days ago

Make the letter public, so other people know & get informed.

load more comments (1 replies)
[–] WhatSay@slrpnk.net 27 points 2 days ago (1 children)

Use AI to generate false info to feed into their database

[–] henfredemars@infosec.pub 22 points 2 days ago (1 children)

I love putting wrong AI slop in every optional field or space I can get away with for profiles and accounts that don't really matter.

[–] SubArcticTundra@lemmy.ml 17 points 2 days ago

If an extension exists for this I'll use it

[–] just_an_average_joe@lemmy.dbzer0.com 31 points 2 days ago (1 children)

Maybe pirate your media and donate the money to open source alternatives

load more comments (1 replies)
[–] bufalo1973@lemmy.ml 3 points 1 day ago* (last edited 1 day ago)

If someone stoles the data then the corp can't be trusted. Punishment: erase ALL records from ALL of their databases and forbid that corp to take data for at least one year. The time would depend on the severity of the leak. If the leak if catastrophic, 10 years minimum.

[–] GhiLA@sh.itjust.works 2 points 1 day ago* (last edited 1 day ago)

he doesn't rename low res episodes of the golden girls to "tax return[year].docx" and hide them in plain sight.

load more comments
view more: next ›