I’m getting a bit sick of large corporations a) demanding excess data as a condition of doing business with me, b) allowing it to be stolen, and c) giving zero fucks about it.

What are some things that us netizens can do to make our displeasure known.

Extra points for funny ideas.

  • @[email protected]
    link
    fedilink
    8
    edit-2
    5 hours ago

    Edit: whoops, I missed the “il” part in “not illegal”. Anyway you should definitely not do the following. Allegedly doing the following would be arson, and society frowns upon such things.

    Easy:

    1. Identify company
    2. Wait until it’s a weekend night. We’re not after the wage slaves after all.
    3. Mix polystyrene and gasoline. Remember that gasoline can melt some plastics, so if using a plastic container for mixing do a test first. You do not want napalm all over the place.
    4. Fill the gooey substance in glass bottles.
    5. Cap the bottles. (see #7)
    6. Drive to the company.
    7. Open bottles and put wicks in them. (important not to do this earlier. Driving with open gasoline containers in your car will make you drowsy and is a fire hazard)
    8. If you haven’t already got gloves on, put them on and wipe down the bottles - you may have to leave some at some point.
    9. Have accomplices trigger fire alarms all over the local fire department’s district. Either automatic fire alarms will be discarded for a bit or the marshall will be tied up investigating.
    10. Light a wick, throw the bottle at the company, try to get it to break a window.
    11. If you’re out of bottles or you see blue lights cheese it. Otherwise go back a step and repeat it.
  • @[email protected]
    link
    fedilink
    English
    55 hours ago

    If a company is publicly traded, then all leaked individuals are given 50.1% controlling stock in the company, split among the victims with new stocks created for them, with unclaimed stocks held in a trust controlled by anyone that did respond to claim stocks. They can sell the stocks, or drive the company into the ground out of spite. Maybe even both.

    Companies not publicly traded have 3 months to make all code used, trademarked material, and patents open source in perpetuity, and 1 year to convert their corporate structure into a non-profit.

    Regardless of the size of the company, the CEO, CTO, and board must eat their weight in fried bugs. They get to pick the type of bug from a list of 5 options, and any seasoning they want. Live streams of the bug eating will be monetized and the proceeds given to orphans, under the title of “It’s not a bug, its a feature.”

  • @helmet91
    link
    77 hours ago

    Don’t use their services.

  • @BrotherL0v3
    link
    2411 hours ago

    Not exactly what you’re looking for, but Ad-Nauseum is a nice way to inject a ton of garbage into the data corps collect.

  • @[email protected]
    link
    fedilink
    1712 hours ago

    Make your data useless or wrong.

    More passively, there’s probably an oddly large amount of John Does born on January 1, 2000 ;)

    More offensively, anti-image-gen data poisoning such as Nightshade exists. It’s well-defended against IIRC so hopefully someone can Cunningham’s Law correct me. And this is also more solo of a movement (as opposed to gaining mass support for something)

  • slazer2au
    link
    English
    7516 hours ago

    Use EICAR test strings as your password.

    If they store your password in plain text the AV will lock the user database.

    If your password gets leaked and they are using bad password security, when your password is cracked the AV will isolate the file.

    • @shrodes
      link
      English
      6015 hours ago

      Bold of you to assume a corporation storing passwords in plain text would be using AV

    • qaz
      link
      English
      3415 hours ago

      According to EICAR’s specification the antivirus detects the test file only if it starts with the 68-byte test string and is not more than 128 bytes long. As a result, antiviruses are not expected to raise an alarm on some other document containing the test string.

      This won’t work, assuming the database file is more than 128 bytes long

      • Talaraine
        link
        fedilink
        814 hours ago

        I think the important distinction would be ‘file’ or ‘record’. Passwords aren’t really a file in a database iirc and records in a database have a storage limit

      • @Krudler
        link
        English
        014 hours ago

        deleted by creator

    • @Krudler
      link
      English
      1714 hours ago

      Ah… “advice” consisting of “I’ve heard of a thing”

  • @[email protected]
    link
    fedilink
    English
    3014 hours ago

    If you send back one of those reply mail envelopes it costs them money. Stuff those envelopes with junk and send them back.

    • FlashMobOfOne
      link
      712 hours ago

      I don’t get many of them anymore, but when I do, I mail them back with a little slip of paper inside that says “poop”.

      • @kalkulat
        link
        24 hours ago

        I tried the brick once long ago. 1) No way to verif it works (not just PO’s the P.O. 2) That kind of shit may be why so many public POBoxes have been removed. 3) The was of paper (up to 3.5 oz?) -seems- to have worked.

      • @[email protected]
        link
        fedilink
        English
        812 hours ago

        First class letter mail is up to 3.5 oz and within a certain l thickness. Every ounce costs extra over the first oz (idk about commercial return mail pricing) just stuff it with flat cardboard from cereal boxes or fill out the information wrong and put in a competitors corporate address.

  • @cheese_greater
    link
    79
    edit-2
    10 hours ago

    More in the spirit of this, prefer and actively seek out alternatives that collect as little or even no data at all and test to make sure they run without internet access. If they give you a hard time or straight up dont work without an internet connection when they ought to be able to, chuck em

    Edit: also call them out in reviews. Why you collect data guys, dont you want my money?

    • Noxy
      link
      fedilink
      English
      1917 hours ago

      that only works when there are alternatives that work offline. which is not guaranteed.

    • @BluetreefrogOPM
      link
      English
      1216 hours ago

      This has been the go-to for decades and it’s not working. I feel like we need to be prepared to engage with the system, but make it clear we are not just passive consumers. Something that becomes viral maybe?..

  • @[email protected]
    link
    fedilink
    English
    5217 hours ago

    Pick a C*O. Set fire to them.

    Alternatively, if you want to go to the source, pick the single investor (dereferencing through any institutional investor) with the greatest worth, and set fire to them.

    In the case of managed investors, flip a coin to decide if you burninate an investor or someone with purchasing authority.

  • granolabar
    link
    fedilink
    4117 hours ago

    Deny engagement and profit. It a takes a mind set change but a lot of shit can go avoided.

    Streamimg can be replaced with Yarr

    Use products you have longer until they break or not longer don’t fit use case

    Start your shopping on the second market.

    Generally Corpo’s and government are centralized and get benefits of that system, working class is decentralized naturally so we need to lean into that.

    • @Norin
      link
      1216 hours ago

      Absolutely.

      Buy things used, repair and jailbreak what you can, and learn to make things for yourself.

      We can’t, at least as individuals, divest from every exploitative system. But, we can remove ourselves from more than we think.

      Often enough, you get a better experience out of the homemade and secondary market than whatever the new thing you’re being pushed can give.