All twitter spaces are recorded! Your Live Audio Is_Already Recorded - Why_Privacy_Toggles_Fail

All twitter spaces are recorded! Your Live Audio Is_Already Recorded - Why_Privacy_Toggles_Fail

The core debate regarding "Your_Live_Audio_Is_Already_Recorded__Why_Privacy_Toggles_Fail" is thoroughly explored by the speakers, particularly the host, @ADanielHill (Alberto), and the technical expert, T (or DT), highlighting a stark contrast between user perception of platform privacy and the technical reality of data retention and access.

This debate touches upon platform design cynicism, technical capabilities for data access, and the potential malicious use of collected audio data.

The debate is sparked by Alberto's discomfort with the visible "recording reminder" and his attempts to switch it off, which repeatedly clashes with T's technical assertion that the data is being captured regardless of the displayed toggle.

@ADanielHill (Alberto Daniel Hill) expresses a preference for the absence of the visible recording indicator, equating its removal with a feeling of being able to speak freely:

  • Alberto states, "I don't like to see that recording reminder. I feel more comfortable" when it is off.
  • He jokingly declares: "Oh, the space is no longer recorded. Okay, now we can talk. Yeah. How's business?".
  • When the recording status is successfully toggled off after some technical glitches, he exclaims, "Now this this space is no longer recorded. Now we can talk about anything but all the spaces are recorded".

The technical speaker, T (or DT), instantly and consistently overrides Alberto's perception, using the phrase that serves as the basis for the debate title:

  • T states immediately, "all spaces are recorded anyways".
  • Alberto even notes that T has been "stealing my line about all spaces are recorded", indicating this is a frequent, established point of discussion among them.
  • T justifies this technical reality by stating that the platform's primary goal is not communication but commercialization: "Twitter is not about us communicating. It's about them selling ads".

T provides specific details demonstrating why privacy toggles fail and why the recordings are accessible, confirming that the data is not only being collected but can be retrieved by those with technical know-how:

  • T explains how to access the recordings by performing a "trick with the horse and get the ID".
  • T boasts having access to the recordings of "233,000 spaces right now".
  • When Alberto asks if T has the recordings, T clarifies, "I don't have them. They're on X's server, but I can access them".
  • The group observes that toggling the recording on and off causes platform instability, suggesting the function is a flawed overlay on a constantly running system: "I think whenever recording's turned on and off, I think it f** the space a little bit"**.

The collected audio data is discussed not just as a privacy violation but as a security vulnerability that can be exploited, especially through advanced machine learning:

  • Speakers discuss the potential for using unsupervised machine learning and GPTs (Generative Pre-trained Transformers) to analyze the audio for "the various emotional tones and various types of aggression".
  • They hypothesize about correlating voice samples with medical records to "predict if we will have a heart rate failure or if we have some other medical issues".
  • One speaker even jokes that by clicking a link to claim an "eight days clean" coin, the platform would "get your medical record along with your bank account".
  • The technical speaker T suggests that these massive audio data sets are valuable for training AIs to have more "personality" than the current "bland" GTP voices.

The Dynamics of the Recording Debate1. The Host's Desire for Privacy (Perception)2. The Technical Expert's Assertion (Reality)3. Technical Vulnerability and Data Access4. The Risk of Data Misuse (Security Profile)

Avsnitt(864)

Por qué los gobiernos ocultan los hackeos

Por qué los gobiernos ocultan los hackeos

El "secretismo" gubernamental en ciberseguridad, también conocido como el "Protocolo del Silencio", es una estrategia institucional sistémica en la que las entidades estatales ocultan, minimizan o con...

14 Apr 19min

Digital Silence: Threat Intelligence vs. State Response in the #StopWAR Incident

Digital Silence: Threat Intelligence vs. State Response in the #StopWAR Incident

The hacktivist attack by NullSec Philippines is currently considered a "classic low-impact hacktivist defacement" that is "embarrassing but not catastrophic" for Uruguay's public sector. The immediate...

13 Apr 8min

 Un Hackeo que Nadie Notó

Un Hackeo que Nadie Notó

NUEVO VIDEO: Un Hackeo que Nadie NotóEl grupo hacktivista "NullSec Philippines" logró vulnerar el sitio web del Ministerio de Ambiente de Uruguay y un sistema de declaraciones juradas, dejando archivo...

13 Apr 1min

Ciberataque al Ministerio de Ambiente de Uruguay

Ciberataque al Ministerio de Ambiente de Uruguay

Descripción del Episodio:Descubre los detalles del reciente ciberataque contra el gobierno de Uruguay. En este episodio, analizamos cómo el grupo "NullSec Philippines" logró vulnerar el sitio web del ...

13 Apr 1min

The Manual Override: Logic, Trauma, and the Digital Knight

The Manual Override: Logic, Trauma, and the Digital Knight

The Manual Override: Logic, Trauma, and the Digital KnightEpisode Description:When trillion-dollar algorithms fail, and the machine dictates that your reality doesn't exist, how do you force a manual ...

13 Apr 5min

The Analog Backdoor: How a Mother Hacked the Justice System

The Analog Backdoor: How a Mother Hacked the Justice System

The Analog Backdoor: How a Mother Hacked the Justice SystemEpisode Description:In a world dominated by state-sponsored cyber warfare, trillion-dollar algorithms, and massive geopolitical cover-ups, th...

13 Apr 4min

The Narrative Hijack: The Alberto Hill Story

The Narrative Hijack: The Alberto Hill Story

2. Radical Transparency as a WeaponThe Digital Dissident does not hide; he broadcasts. Hill uses "radical transparency" to counter the secrecy and incompetence of the state.Public Documentation: He do...

8 Apr 6min

The Taxonomy of Tinder Terrors

The Taxonomy of Tinder Terrors

These sources consist of several first-person narratives and detailed transcripts exploring the perils and unsettling realities of modern online dating. The accounts describe various disturbing or biz...

8 Apr 5min

Populärt inom True Crime

infor-ratta
podme-dokumentar
rattegangspodden
aftonbladet-krim
podme-crime
fallen-jag-aldrig-glommer
en-mork-historia
svenska-mordhistorier
svenska-fall
spoktimmen
mordpodden
forhorsrummet
krimrummet
p3-krim
seriemordarpodden
rss-krimstad
rss-valdet-krim
fangelsepodden
massmordarpodden
alskade-psykopat