upvote
> BTW, the J6 protesters were all tracked and identified by their cell phone data.

Many of the insurrectionists were also caught on camera in congress after they broke down the doors and stormed the building. Some even took selfies in the offices of various senators and house reps.

reply
And now they're being let off and called "heroes" by the United States Government.
reply
It's all part of this administration's strategy to set the stage for next time. By pardoning violent criminals, they make it clear that they endorse political violence. Now, when he incites a mob to interrupt the elections next time he loses - in 2026 or 2028 - everyone in the next mob will know that their actions will be pardoned.
reply
We keep failing to learn over and over that "Cloud is just someone else's computer." If you wouldn't send a particular bit of data to some random person's computer, then don't send it to a cloud service, either. This includes Gmail, iCloud, AWS, Facebook, WhatsApp, iMessage, everything.

If it's not your computer, it's not your data.

reply
Why would they need to subpoena Google if they track and store everything?
reply
But we don't want totalitarianism. It is like assuming every person on a train is an undercover spy, so you don't say anything bad about the government ever.
reply
So much of this was backed up by Snowden, not just in the machinations of each of the CODENAMEX operations but also in the attitude that the TLAs felt entitled to implement them in the first place.

There’s been some pushback since then, but nothing to give any confidence that CODENAMEY, CODENAMEZ, and many others have have sprung up.

reply
deleted
reply
This is (mostly, but not entirely) true - but it's also a completely useless statement. It doesn't help anyone change their behavior with regards to seeking privacy day to day, and it doesn't help anyone know what to do to change the state of affairs. It's smug and defeatist, and seems to imply that there's nothing that can be done to change it.

There are many things everyday people can do to insulate themselves from these choices. Encrypted DNS, VPNs, avoiding cloud services, educating friends on why Gmail is really Fedmail, etc. It's not so over-and-done with as you seem to make it out to be.

reply
The Jan 6 insurrectionists in my county were turned in by their neighbors after bragging about it. Cell phone data was used to convict them.
reply
Meanwhile it took them 4+ years to find the barely functional autistic pipe bomber in his parents basement. And IIRC, a large part of the FBI at one point assigned to it.
reply
Protestors huh? That’s quite the revisionist take on recent history.
reply
[dead]
reply
Some of them were identified by DNA left in the shit they took on Pelosi’s desk.
reply