1 |
Frank Peters posted on Tue, 05 Aug 2014 16:36:57 -0400 as excerpted: |
2 |
|
3 |
> It wouldn't have to scan your local drives. It would only have to scan |
4 |
> the very few directories named "MY DOCUMENTS" and "MY VIDEOS" and "MY |
5 |
> EMAIL" which have conveniently been established by the omnipotent and |
6 |
> omniscient desktop environment. Within these universal and standardized |
7 |
> storage areas can be found everything that snooping software would need |
8 |
> to find. |
9 |
|
10 |
Hmm... Some people (me) don't use those standardized locations. I have |
11 |
a dedicated media partition -- large, still on spinning rust when most of |
12 |
the system in terms of filenames (but not size) is on SSD, and where it's |
13 |
mounted isn't standard and is unlikely to /be/ standard, simply because I |
14 |
have my own rather nonconformist ideas of where I want stuff located and |
15 |
how it should be organized. |
16 |
|
17 |
OTOH, consider ~/.thumbnails/. Somebody already mentioned that google |
18 |
case and the hashes they apparently scan for. ~/.thumbnails will |
19 |
normally have thumbnails for anything in the system visited by normal |
20 |
graphics programs, including both still images and video, and I think pdf |
21 |
too unless that's always generated dynamically as is the case with txt |
22 |
files, via various video-thumbnail addons. Those thumbnails are all |
23 |
going to be standardized to one of a few standard sizes, and can either |
24 |
be used effectively as (large) hashes directly, or smaller hashes of them |
25 |
could be generated... |
26 |
|
27 |
Tho some images programs (gwenview) have an option to wipe the thumbnails |
28 |
dir when they're shutdown, but given the time creating those thumbnails |
29 |
on any reasonably large collection takes, most people aren't going to |
30 |
want to enable wiping... |
31 |
|
32 |
Meanwhile, one of the things that has come out is that the NSA |
33 |
effectively already considers anyone running a Linux desktop a radical, |
34 |
likely on their watch-list already, just as is anyone running TOR, or |
35 |
even simply visiting the TOR site or an article linking to them. |
36 |
|
37 |
I guess I must be on their list several times over, what with the sigs I |
38 |
use, etc, the security/privacy-related articles I read, the OS I run, and |
39 |
the various lists I participate on... |
40 |
|
41 |
-- |
42 |
Duncan - List replies preferred. No HTML msgs. |
43 |
"Every nonfree program has a lord, a master -- |
44 |
and if you use the program, he is your master." Richard Stallman |