adb shell cmd activity start --user 0 -a android.intent.action.VIEW -n com.google.android.gms/com.google.android.personalsafety.settings.BleTagSettingsActivity -f 0 com.google.android.gms
adb shell input keyevent KEYCODE_HOMEThat should press the "Home" button.
adb shell input keyevent KEYCODE_CAMERAThat should press the "Camera" button.
adb shell input keyevent KEYCODE_BACKThat should press the "Back" button.
adb shell input keyevent KEYCODE_HEADSETHOOKThat should press the "Headset" button.
adb shell input keyevent KEYCODE_MOVE_ENDNotice that's the same "full scroll" to the bottom, every time.
adb shell input keyevent KEYCODE_HOME
adb shell cmd activity start --user 0 -a android.intent.action.VIEW -n com.google.android.gms/com.google.android.personalsafety.settings.BleTagSettingsActivity -f 0 com.google.android.gms
adb shell input tap 600 775
adb shell input keyevent KEYCODE_MOVE_END
adb shell input tap 125 1320
adb shell input keyevent KEYCODE_HOME
adb shell input keyevent KEYCODE_HOMEThat should press the "Home" button.
adb shell input keyevent KEYCODE_CAMERAThat should press the "Camera" button.
adb shell input keyevent KEYCODE_BACKThat should press the "Back" button.
adb shell input keyevent KEYCODE_HEADSETHOOKThat should press the "Headset" button.
adb shell input keyevent KEYCODE_MOVE_ENDNotice that's the same "full scroll" to the bottom, every time.
adb shell input keyevent KEYCODE_HOME
adb shell cmd activity start --user 0 -a android.intent.action.VIEW -n com.google.android.gms/com.google.android.personalsafety.settings.BleTagSettingsActivity -f 0 com.google.android.gms
adb shell input tap 600 775
adb shell input keyevent KEYCODE_MOVE_END
adb shell input tap 125 1320
adb shell input keyevent KEYCODE_HOME
Here is how to create one-tap shortcuts to Android unknown trackers: <https://i.postimg.cc/597JNDVR/unknowntracker01.jpg>
Here is how to create one-tap shortcuts to Android unknown trackers:
<https://i.postimg.cc/597JNDVR/unknowntracker01.jpg>
Have you (or PostImage) recently changed the compression level on your screenshots? They look really low quality when zoomed in now ...
That is, over Wi-Fi, every phone on the LAN is operated via scrcpy
freeware to mirror the phone and clipboard from Android to Windows)...
Sorry for the hiccup. I had NOT meant to post this article twice.
Sometimes, with Wolfgang Weygand's Eternal September (ES), it says it
failed, but in reality, it's just delayed by ten minutes or so. Sigh.
I'm using Herbert's alt.msdos.batch timezone randomizer which seems to
cause the SSL in TOR & VPN encryption to have issues when the timezone randomly switches out from under it. It only happens with Ray Banana's Eternal September NNTP server though, but I can't use Ivo Gondolfo's bofh server with this set of newsgroups as paga's filters are Draconian compared to Wolfgang's much more lax ES filters.
PS: If someone can explain HOW the heck SSL _knows_ your "real"
timezone, please explain it to me as I don't know how they do it.
I'm pretty sure Andy understands as he and those like Stan, Paul, & Herbert are way smarter than I am, but for those who don't know this fact,
if you put photo #1 from your camera on Facebook, and then you put Photo #2 in your political discussion group... "they" (they who run that software), can uniquely associate _every single picture_ you ever posted to the
Internet to that same camera - simply by fingerprinting the pixel flaws.
Yes. Every single photo.
Which, let's agree, you might not want "them" doing, right?
How do you stop them from knowing every photo ever posted to the Internet? Me?
I run a series of image-obfuscation steps to make that image fingerprinting harder, just as I do with my browser by changing randomly the string
and timezone and the Windows installed fonts & other fingerprinting data.
Inevitably, those pixel-flaw obfuscation efforts also lower image quality. Although what you're noticing is probably the switch to 75% JPG quality.
On 10/22/23 06:41, Wally J wrote:
PS: If someone can explain HOW the heck SSL _knows_ your "real"
timezone, please explain it to me as I don't know how they do it.
My guess is IP fingerprinting, but I'll look it up.
Andy Burns wrote:
Have you (or PostImage) recently changed the compression level on your
screenshots? They look really low quality when zoomed in now ...
Yes. I'm surprised you noticed.
Here are the images without that compression (but with FFT obfuscation).
<https://i.postimg.cc/mgzvw0mv/unknowntracker01x.jpg>
Are those better?
I don't test the postimages as 'they' would (over time) be able to
track me from just those tests (as I'd always be the first downloader),
so I only look at the postimages sporadically (& always on random VPN).
It's pretty much only Paul and I who care enough to provide others
with annotated screenshots (since they're clearly a bitch to make)
Bear in mind that I post thousands of images to the Internet on a
variety of forums, and hence I'm aware of Fourier transforms & how they're used by TLAs to identify the exact camera that snaps any photo
I'm pretty sure Andy understands as he and those like Stan, Paul, & Herbert are way smarter than I am, but for those who don't know this fact,
if you put photo #1 from your camera on Facebook, and then you put Photo #2 in your political discussion group... "they" (they who run that software), can uniquely associate _every single picture_ you ever posted to the
Internet to that same camera - simply by fingerprinting the pixel flaws.
Inevitably, those pixel-flaw obfuscation efforts also lower image quality. >> Although what you're noticing is probably the switch to 75% JPG quality.
Huh, neat. Can you provide stuff for further reading? I tried to Google
it, but couldn't find much.
I don't test the postimages as 'they' would (over time) be able to
track me from just those tests (as I'd always be the first downloader),
so I only look at the postimages sporadically (& always on random VPN).
If "they" could track you via download logs, can't they also track you
via upload logs?
It's pretty much only Paul and I who care enough to provide others
with annotated screenshots (since they're clearly a bitch to make)
Yeah, I generally just save screenshots, very rarely with a bit of highlighting.
Bear in mind that I post thousands of images to the Internet on a
variety of forums, and hence I'm aware of Fourier transforms & how they're >> used by TLAs to identify the exact camera that snaps any photo
Is there a camera involved?
I thought we were discussing screen captures, rather than photos of screens.
I'm pretty sure Andy understands as he and those like Stan, Paul, & Herbert >> are way smarter than I am, but for those who don't know this fact,
if you put photo #1 from your camera on Facebook, and then you put Photo #2 >> in your political discussion group... "they" (they who run that software), >> can uniquely associate _every single picture_ you ever posted to the
Internet to that same camera - simply by fingerprinting the pixel flaws.
I would expect that sort of thing is possible, but might have assumed it would take "several" photos, no just two to make the connection, and I wouldn't expect it to be feasible across all photos, but reserved for
the sort of folk who appear on most-wanted lists.
It's not just you that has that issue with ES. I've had that happen
multiple times, and there's a thread in e-s.support about it. Hopefully
a fix will come soon.
PS: If someone can explain HOW the heck SSL _knows_ your "real"
timezone, please explain it to me as I don't know how they do it.
My guess is IP fingerprinting, but I'll look it up.
candycanearter07 <no@thanks.net> wrote
Inevitably, those pixel-flaw obfuscation efforts also lower image quality. >>> Although what you're noticing is probably the switch to 75% JPG quality.
Huh, neat. Can you provide stuff for further reading? I tried to Google
it, but couldn't find much.
Anyone can find it on r.p.d because that's where I asked over the years,
but nothing of value came out of asking those "image experts", who weren't.
<https://groups.google.com/g/rec.photo.digital/search?q=fingerprinting>
Truth be told, it was mostly the Apple morons like nospam who turned each query into a childish morass of their kindergarten tin-foil hat retorts.
Bear in mind what Snowden taught us, which is that privacy is a right that you have to protect, just like freedom is a right you have to strive for.
Anyway, those so-called photo experts are not photo experts in this realm.
I gave up trying to find something there who knew more than I did already.
And that's sad, because I do NOT know much about thwarting fingerprinting. Other than reading a couple of the papers on the subject.
From those papers, I learned a few tricks of the trade to obfuscate repeatable image flaws, but I have no idea if those tricks really work.
Luckily, I'm hiding from the likes of Rod Speed (who had asked people to murder me, for which I contacted the FBI) and not a well-funded adversary.
On 10/22/23 13:47, Wally J wrote:
candycanearter07 <no@thanks.net> wrote
Inevitably, those pixel-flaw obfuscation efforts also lower image
quality.
Although what you're noticing is probably the switch to 75% JPG
quality.
Huh, neat. Can you provide stuff for further reading? I tried to Google
it, but couldn't find much.
Anyone can find it on r.p.d because that's where I asked over the years,
but nothing of value came out of asking those "image experts", who
weren't.
<https://groups.google.com/g/rec.photo.digital/search?q=fingerprinting> >>
Truth be told, it was mostly the Apple morons like nospam who turned each
query into a childish morass of their kindergarten tin-foil hat retorts.
Bear in mind what Snowden taught us, which is that privacy is a right
that
you have to protect, just like freedom is a right you have to strive for.
Anyway, those so-called photo experts are not photo experts in this
realm.
I gave up trying to find something there who knew more than I did
already.
And that's sad, because I do NOT know much about thwarting
fingerprinting.
Other than reading a couple of the papers on the subject.
From those papers, I learned a few tricks of the trade to obfuscate
repeatable image flaws, but I have no idea if those tricks really work.
Thanks a bunch, I'm currently studying Stenography.
Luckily, I'm hiding from the likes of Rod Speed (who had asked people to
murder me, for which I contacted the FBI) and not a well-funded
adversary.
Yikes, what happened?
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 297 |
Nodes: | 16 (2 / 14) |
Uptime: | 06:09:32 |
Calls: | 6,666 |
Files: | 12,213 |
Messages: | 5,336,023 |