this post was submitted on 12 Feb 2026
901 points (99.3% liked)

Technology

81078 readers
4289 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

A Super Bowl ad for Ring security cameras boasting how the company can scan neighborhoods for missing dogs has prompted some customers to remove or even destroy their cameras.

Online, videos of people removing or destroying their Ring cameras have gone viral. One video posted by Seattle-based artist Maggie Butler shows her pulling off her porch-facing camera and flipping it the middle finger.

Butler explained that she originally bought the camera to protect against package thefts, but decided the pet-tracking system raised too many concerns about government access to data.

"They aren't just tracking lost dogs, they're tracking you and your neighbors," Butler said in the video that has more than 3.2 million views.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] WhyJiffie@sh.itjust.works 2 points 13 hours ago (1 children)

yes, that would be ideal, but at any point in time we will have newcomers, for them it won't be obvious

[โ€“] spaghettiwestern@sh.itjust.works 0 points 12 hours ago* (last edited 10 hours ago)

Your prior comment was for newcomers?

"How is it encrypted, with what algorithm? was the alg implemented securely? who has the decryption keys? how were the keys generated? were they generated from a good enough entropy source? "

This was obviously written for people with quite a bit of knowledge. Most newcomers would have absolutely no idea what any of it means.