deceiver

joined 11 months ago
[–] deceiver 25 points 4 days ago

most men don’t even make $100k per year

[–] deceiver 1 points 5 days ago

zero chance of this happening

[–] deceiver 33 points 5 days ago (1 children)

Pathological Demand Avoidance

[–] deceiver 48 points 1 week ago (1 children)

you’re not wrong, and it’s not really a conspiracy, it’s fairly well-documented at this point

there’s a whole industry of companies called ‘exploit brokers’ and surveillance vendors that sell smartphone compromise capabilities to governments. the most famous is NSO Group, an Israeli firm whose product Pegasus was used by governments worldwide to silently compromise iPhones and Android devices, including targeting journalists, activists, and political opponents. Amnesty International and Citizen Lab have forensically confirmed infections on real devices. this isn’t speculation; it’s documented in court filings and peer-reviewed technical research

the way it works is through what are called zero-days: software vulnerabilities that even the phone manufacturers don’t know about yet. these can be worth millions of dollars on the open market. governments and their contractors hoard them, sometimes for years, to maintain access capabilities. Apple and Google are constantly patching these when they discover them, which is why you see urgent security updates

so the ‘we can’t break into it’ statements from agencies like the FBI are more nuanced than they appear. what they often mean is they can’t break into it cheaply, at scale, without vendor cooperation, not that it’s impossible. they’re usually pushing for backdoors built into the software so they don’t have to rely on expensive zero-days or third-party vendors like Cellebrite

the problem is that any backdoor you build for the “good guys” is also a vulnerability that adversaries can find and exploit. security researchers largely agree you can’t have a backdoor only the right people can use, it doesn’t work that way technically

so your instinct is right. the public debate is somewhat theater. the real capabilities exist, they’re just expensive, targeted, and something governments don’t want to fully disclose because it would reveal sources and methods

[–] deceiver 6 points 1 week ago (1 children)

it absolutely can! there’s Bypass Paywalls Clean developed by magnolia1234. the reason you don’t see them shared often is that they’re repeatedly taken down from official extension stores like the Chrome Web Store and Firefox Add-ons, and platforms like GitHub, due to legal and political pressure from publishers, which pushes them to increasingly obscure and/or questionable hosting platforms that most normal users wouldn’t touch - case in point, Bypass Paywalls Clean itself is currently hosted on GitFlic, a Russian code hosting platform, as it’s been pushed outside the reach of Western legal frameworks

[–] deceiver 2 points 1 week ago (2 children)

soft paywalls are enforced by JavaScript running in your browser - the server sends the full article content regardless, and then the JavaScript checks if you’re a subscriber and hides or blocks it if not. when archive.today or a self-hosted tool like ArchiveBox fetches the page, it gets the full content directly from the server before any of that JavaScript enforcement runs. the server doesn’t know or care whether you’re a subscriber, it just responds to the request

[–] deceiver 7 points 1 week ago (3 children)

the archiving mechanism itself is what bypasses paywalls. it archives by fetching pages server-side before client-side JavaScript enforces paywalls

[–] deceiver 13 points 1 week ago (5 children)
[–] deceiver 8 points 1 week ago (5 children)

no, archive.today (and similar services like the Wayback Machine) work by fetching the page directly through their own servers, essentially acting as a headless browser that renders the page and saves a snapshot. the archive service itself makes the HTTP request, executes JavaScript, and captures the resulting document object model - no subscriber involvement required

[–] deceiver 25 points 2 weeks ago (1 children)

no, Bitwarden isn’t “based off” anything

[–] deceiver 3 points 2 weeks ago (2 children)

where is the video? why was this upvoted?

[–] deceiver 1 points 3 weeks ago* (last edited 3 weeks ago)

an identity verification system that’s tied to Ukraine’s national government databases and uses taxpayer IDs, national ID numbers, and official digital signatures

view more: next ›