• Avoiding broken links in posts

    From Spike@21:1/5 to All on Sun Jan 5 15:52:45 2025
    In order to avoid situations in which urls in posts become broken, it would
    be helpful to put such links between the characters < and > as in the
    example below:

    <https://mil.in.ua/en/news/the-defense-intelligence-of-ukraine-eliminated-the-chief-of-staff-of-the-storm-ossetia-battalion/>

    Another method might be to use the services of a url-shortening web site
    such as tinyurl.com (other such sites are available).

    The above link becomes <https://tinyurl.com/4h8yjwev> which might stand a better chance of not becoming mangled.

    Note that prepending ‘preview’ (without the quotes) to the tinyurl link (to give preview.tinyurl.com/whateverwasthereoriginally) will return the
    original link:

    https://preview.tinyurl.com/4h8yjwev

    …gives the link original quoted.

    HTH

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Spike on Mon Jan 6 09:09:45 2025
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, it would be helpful to put such links between the characters < and > as in the
    example below:

    Chevrons by themselves are no guarantee, the sender needs a client that
    doesn't insert line-breaks in the wrong places ...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Andy Burns on Mon Jan 6 09:23:27 2025
    Andy Burns <usenet@andyburns.uk> wrote:
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, it would >> be helpful to put such links between the characters < and > as in the
    example below:

    Chevrons by themselves are no guarantee, the sender needs a client that doesn't insert line-breaks in the wrong places ...

    There’s no magic bullet here when it comes to unwanted line breaks in URLs, and I did note that putting chevrons around them could help in this regard, implying that it wasn’t a 100% solution. That’s why I also suggested using tinyurl.com as a shorter link is less likely to get broken.

    My view is that chevrons are a good idea, and some posters already include
    the url and tinyurl in their articles, which helps greatly with the
    problem.

    Readers can always use the preview.tinyurl.com/whatever facility to check
    the actual link that was shortened, if the OP hasn’t already included it.

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Martin Harran on Mon Jan 6 10:07:05 2025
    Martin Harran wrote:

    People telling me that I need to change my client, which works
    perfectly well in every other regard, gets tiresome to say the least.

    I wasn't telling anyone to change client, merely explaining that some
    clients are better with URLs than others.

    When I post a URL that might break, I invariably include a shortened
    URL. If I consider something worth spending time on to post, then I
    think it is also worth the extra few seconds it takes to create that shortened URL and make it easy for potential readers to find.

    I generally dislike link shorteners, though I do try to make URLs
    shorter without fundamentally altering them (e.g. cut the tracking links
    out of them)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 10:17:38 2025
    In message <lu1kusFdg97U3@mid.individual.net>, at 09:09:45 on Mon, 6 Jan
    2025, Andy Burns <usenet@andyburns.uk> remarked:
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, it would >> be helpful to put such links between the characters < and > as in the
    example below:

    Chevrons by themselves are no guarantee, the sender needs a client that >doesn't insert line-breaks in the wrong places ...

    Strictly speaking, the recipient needs a client which ignores white
    space in urls, which is what the rfcs specify. But it does no harm for
    senders to try not to insert avoidable white space.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 10:19:04 2025
    In message <lu1lofFdt2lU1@mid.individual.net>, at 09:23:27 on Mon, 6 Jan
    2025, Spike <aero.spike@mail.com> remarked:

    That’s why I also suggested using tinyurl.com as a shorter link is
    less likely to get broken.

    Of course, by using any url-shortener, you are revealing your browsing
    history to a third party. Which you may or may not find acceptable.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 10:21:32 2025
    In message <62annj1r3cmhvh3b752n61atc47b4a6flk@4ax.com>, at 09:58:37 on
    Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, it would >>> be helpful to put such links between the characters < and > as in the
    example below:

    Chevrons by themselves are no guarantee, the sender needs a client that >>doesn't insert line-breaks in the wrong places ...

    People telling me that I need to change my client, which works
    perfectly well in every other regard, gets tiresome to say the least.

    When I post a URL that might break, I invariably include a shortened
    URL. If I consider something worth spending time on to post, then I
    think it is also worth the extra few seconds it takes to create that >shortened URL and make it easy for potential readers to find.

    It appears that another trick to make long urls more acceptable to
    broken reader-clients is to insert a space in front of the leading
    chevron.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Roland Perry on Mon Jan 6 10:42:23 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <lu1lofFdt2lU1@mid.individual.net>, at 09:23:27 on Mon, 6 Jan 2025, Spike <aero.spike@mail.com> remarked:

    That’s why I also suggested using tinyurl.com as a shorter link is
    less likely to get broken.

    Of course, by using any url-shortener, you are revealing your browsing history to a third party. Which you may or may not find acceptable.

    When following links I use Startpage in private mode, and delete the web information after each session. There isn’t much browsing history to
    reveal.

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 11:17:35 2025
    In message <lu1qcfFejv0U1@mid.individual.net>, at 10:42:23 on Mon, 6 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lu1lofFdt2lU1@mid.individual.net>, at 09:23:27 on Mon, 6 Jan
    2025, Spike <aero.spike@mail.com> remarked:

    That’s why I also suggested using tinyurl.com as a shorter link is
    less likely to get broken.

    Of course, by using any url-shortener, you are revealing your browsing
    history to a third party. Which you may or may not find acceptable.

    When following links I use Startpage in private mode, and delete the web >information after each session. There isn’t much browsing history to >reveal.

    Only that your PC accessed that page, and nothing you can do locally
    will erase that.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pamela@21:1/5 to Spike on Mon Jan 6 11:21:25 2025
    On 15:52 5 Jan 2025, Spike said:

    In order to avoid situations in which urls in posts become broken, it
    would be helpful to put such links between the characters < and > as
    in the example below:

    <https://mil.in.ua/en/news/the-defense-intelligence-of-ukraine-eliminat ed-the-chief-of-staff-of-the-storm-ossetia-battalion/>

    Another method might be to use the services of a url-shortening web
    site such as tinyurl.com (other such sites are available).

    The above link becomes <https://tinyurl.com/4h8yjwev> which might
    stand a better chance of not becoming mangled.

    Note that prepending ‘preview’ (without the quotes) to the tinyurl
    link (to give preview.tinyurl.com/whateverwasthereoriginally) will
    return the original link:

    https://preview.tinyurl.com/4h8yjwev

    …gives the link original quoted.

    HTH

    As we're discussing usability of messages, my newsreader doesn't handle
    UTF-8 which means I get strange characters appearing in the message
    text. For example, your message is in UTF-8 and I see these characters.

    Sometimes this problem will also appear in the Subject.

    UTF-7 would make these messages more legible.

    There's a separate UTF-8 issue regarding gathering stats mentioned in
    Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Pamela on Mon Jan 6 12:09:28 2025
    Pamela wrote:

    my newsreader doesn't handle UTF-8

    Is 30 years too soon?

    which means I get strange characters appearing in the message
    text. For example, your message is in UTF-8 and I see these characters.

    Sometimes this problem will also appear in the Subject.

    Any header field, really

    UTF-7 would make these messages more legible.

    Except UTF-7 is obsolete and you'll get complaints of e.g. pound symbols turning into +AKM-

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Andy Burns on Mon Jan 6 12:14:57 2025
    On Mon, 6 Jan 2025 10:07:05 +0000, Andy Burns <usenet@andyburns.uk> wrote:

    Martin Harran wrote:

    People telling me that I need to change my client, which works
    perfectly well in every other regard, gets tiresome to say the least.

    I wasn't telling anyone to change client, merely explaining that some
    clients are better with URLs than others.

    Yes, indeed. I do think that if someone is using a client which breaks links
    on transmission then it would be worthwhile investigating a different
    client, or, failing that, to accompany the long link with a short one. But
    none of us can stop a link being broken by a receiving client, or by a
    client which breaks it on inclusion in quoted text.

    When I post a URL that might break, I invariably include a shortened
    URL. If I consider something worth spending time on to post, then I
    think it is also worth the extra few seconds it takes to create that
    shortened URL and make it easy for potential readers to find.

    I generally dislike link shorteners, though I do try to make URLs
    shorter without fundamentally altering them (e.g. cut the tracking links
    out of them)

    A lot of newspaper websites have a unique ID embedded in an otherwise longer SEO-friendly URL, and you can usually strip it all the way back to just the
    ID, or just the ID and a few additional characters. For example, this:

    https://www.eveshamjournal.co.uk/news/24835118.a44-evesham-fladbury-closed-due-flooding/

    can be shortened to this:

    https://www.eveshamjournal.co.uk/news/24835118.a

    and that particular CMS is common to a lot of local newspaper websites.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Pamela on Mon Jan 6 11:56:29 2025
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 15:52 5 Jan 2025, Spike said:

    In order to avoid situations in which urls in posts become broken, it
    would be helpful to put such links between the characters < and > as
    in the example below:

    <https://mil.in.ua/en/news/the-defense-intelligence-of-ukraine-eliminat
    ed-the-chief-of-staff-of-the-storm-ossetia-battalion/>

    Another method might be to use the services of a url-shortening web
    site such as tinyurl.com (other such sites are available).

    The above link becomes <https://tinyurl.com/4h8yjwev> which might
    stand a better chance of not becoming mangled.

    Note that prepending ‘preview’ (without the quotes) to the tinyurl
    link (to give preview.tinyurl.com/whateverwasthereoriginally) will
    return the original link:

    https://preview.tinyurl.com/4h8yjwev

    …gives the link original quoted.

    HTH

    As we're discussing usability of messages, my newsreader doesn't handle
    UTF-8 which means I get strange characters appearing in the message
    text. For example, your message is in UTF-8 and I see these characters.

    Sometimes this problem will also appear in the Subject.

    UTF-7 would make these messages more legible.

    There's a separate UTF-8 issue regarding gathering stats mentioned in
    Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down Goodge’s post?

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Mark Goodge on Mon Jan 6 12:29:15 2025
    Mark Goodge wrote:

    A lot of newspaper websites have a unique ID embedded in an otherwise longer SEO-friendly URL

    The Guardian used to own gu.com to shorten their own article URLs, but
    it went way.

    screwfix product links such as

    https://www.screwfix.com/p/scrubb-shot-super-concentrate-bathroom-cleaner-500ml/981ve

    can be reduced to

    https://screwfix.com/p/981ve

    amazon product links such as

    https://www.amazon.co.uk/Maybelline-Extension-Salon-Like-Long-Lasting-Buildable/dp/B0BQ65RZ5L?ref_=ast_sto_dp&th=1

    reduce to

    https://amazon.co.uk/dp/B0BQ65RZ5L

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Spike on Mon Jan 6 11:57:41 2025
    On 6 Jan 2025 at 09:23:27 GMT, "Spike" <aero.spike@mail.com> wrote:

    Andy Burns <usenet@andyburns.uk> wrote:
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, it would >>> be helpful to put such links between the characters <and > as in the
    example below:

    Chevrons by themselves are no guarantee, the sender needs a client that
    doesn't insert line-breaks in the wrong places ...

    There’s no magic bullet here when it comes to unwanted line breaks in URLs, and I did note that putting chevrons around them could help in this regard, implying that it wasn’t a 100% solution. That’s why I also suggested using
    tinyurl.com as a shorter link is less likely to get broken.

    My view is that chevrons are a good idea, and some posters already include the url and tinyurl in their articles, which helps greatly with the
    problem.

    Readers can always use the preview.tinyurl.com/whatever facility to check
    the actual link that was shortened, if the OP hasn’t already included it.

    The moderators have previously asked that if a redirection link is used that the original link is also included to save moderation time.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Andy Burns on Mon Jan 6 13:11:14 2025
    On 6 Jan 2025 at 12:09:28 GMT, "Andy Burns" <usenet@andyburns.uk> wrote:

    Pamela wrote:

    my newsreader doesn't handle UTF-8

    Is 30 years too soon?

    which means I get strange characters appearing in the message
    text. For example, your message is in UTF-8 and I see these characters.

    Sometimes this problem will also appear in the Subject.

    Any header field, really

    UTF-7 would make these messages more legible.

    Except UTF-7 is obsolete and you'll get complaints of e.g. pound symbols turning into +AKM-

    I don't think Usenet ever required servers to cope with anything else?

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 12:55:50 2025
    In message <6466128773.4fdb282d@uninhabited.net>, at 11:57:41 on Mon, 6
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:

    Readers can always use the preview.tinyurl.com/whatever facility to check
    the actual link that was shortened, if the OP hasn’t already included it.

    The moderators have previously asked that if a redirection link is used that >the original link is also included to save moderation time.

    I also do not wish to appear in the stats of someone looking at a
    potentially dodgy site, because of the way redirection sites could be
    selling that aspect of my browsing history to anyone interested.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Roger Hayter on Mon Jan 6 13:40:54 2025
    On 2025-01-06, Roger Hayter <roger@hayter.org> wrote:
    On 6 Jan 2025 at 12:09:28 GMT, "Andy Burns" <usenet@andyburns.uk> wrote:
    Pamela wrote:
    my newsreader doesn't handle UTF-8

    Is 30 years too soon?

    which means I get strange characters appearing in the message
    text. For example, your message is in UTF-8 and I see these characters.

    Sometimes this problem will also appear in the Subject.

    Any header field, really

    UTF-7 would make these messages more legible.

    Except UTF-7 is obsolete and you'll get complaints of e.g. pound symbols
    turning into +AKM-

    I don't think Usenet ever required servers to cope with anything else?

    For over 15 years Usenet has been required to be 8-bit clean (RFC 5537)
    and support MIME encodings and character set information (RFC 5536).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 13:33:55 2025
    In message <jclnnjt21ump0ojs0h62rua5ctfk9bm1n2@4ax.com>, at 13:08:33 on
    Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Mon, 6 Jan 2025 10:21:32 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <62annj1r3cmhvh3b752n61atc47b4a6flk@4ax.com>, at 09:58:37 on >>Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, >>>>>it would be helpful to put such links between the characters < and
    as in the example below:

    Chevrons by themselves are no guarantee, the sender needs a client that >>>>doesn't insert line-breaks in the wrong places ...

    People telling me that I need to change my client, which works
    perfectly well in every other regard, gets tiresome to say the least.

    When I post a URL that might break, I invariably include a shortened
    URL. If I consider something worth spending time on to post, then I
    think it is also worth the extra few seconds it takes to create that >>>shortened URL and make it easy for potential readers to find.

    It appears that another trick to make long urls more acceptable to
    broken reader-clients is to insert a space in front of the leading
    chevron.

    I don't regard my reader-clients as broken, I regard the sites who
    produce such long links as broken.

    If you have a reader-client which ignores the relevant and very easy to understand rfcs, then I call that "broken".
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 6 16:40:37 2025
    In message <k8onnjp71urg0di0dm3pmr3hmv2aip1rdu@4ax.com>, at 14:02:10 on
    Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Mon, 6 Jan 2025 13:33:55 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <jclnnjt21ump0ojs0h62rua5ctfk9bm1n2@4ax.com>, at 13:08:33 on >>Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Mon, 6 Jan 2025 10:21:32 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <62annj1r3cmhvh3b752n61atc47b4a6flk@4ax.com>, at 09:58:37 on >>>>Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked: >>>>>>Spike wrote:

    In order to avoid situations in which urls in posts become broken, >>>>>>>it would be helpful to put such links between the characters < and >>>>>>>> as in the example below:

    Chevrons by themselves are no guarantee, the sender needs a client that >>>>>>doesn't insert line-breaks in the wrong places ...

    People telling me that I need to change my client, which works >>>>>perfectly well in every other regard, gets tiresome to say the least. >>>>>
    When I post a URL that might break, I invariably include a shortened >>>>>URL. If I consider something worth spending time on to post, then I >>>>>think it is also worth the extra few seconds it takes to create that >>>>>shortened URL and make it easy for potential readers to find.

    It appears that another trick to make long urls more acceptable to >>>>broken reader-clients is to insert a space in front of the leading >>>>chevron.

    I don't regard my reader-clients as broken, I regard the sites who >>>produce such long links as broken.

    If you have a reader-client which ignores the relevant and very easy to >>understand rfcs, then I call that "broken".

    I work on a different principle. If I want people to read stuff that I
    write, then I make reading it as easy as possible for as many people
    as possible.

    Of course. I do everything I can. But sometimes even that doesn't get
    past the most broken usenet clients.

    I won't use url shorteners because of the privacy aspects, and I know
    some people are concerned and so they'll religiously never click on them
    (apart perhaps from streetview's, which is a somewhat different kettle
    of worms, because it doesn't matter if you click on a long link or a
    shortened one, they'll still log it).
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Roger Hayter on Mon Jan 6 17:24:49 2025
    On 6 Jan 2025 11:57:41 GMT, Roger Hayter <roger@hayter.org> wrote:

    On 6 Jan 2025 at 09:23:27 GMT, "Spike" <aero.spike@mail.com> wrote:

    Andy Burns <usenet@andyburns.uk> wrote:
    Spike wrote:

    In order to avoid situations in which urls in posts become broken, it would
    be helpful to put such links between the characters <and > as in the
    example below:

    Chevrons by themselves are no guarantee, the sender needs a client that
    doesn't insert line-breaks in the wrong places ...

    Theres no magic bullet here when it comes to unwanted line breaks in URLs, >> and I did note that putting chevrons around them could help in this regard, >> implying that it wasnt a 100% solution. Thats why I also suggested using >> tinyurl.com as a shorter link is less likely to get broken.

    My view is that chevrons are a good idea, and some posters already include >> the url and tinyurl in their articles, which helps greatly with the
    problem.

    Readers can always use the preview.tinyurl.com/whatever facility to check
    the actual link that was shortened, if the OP hasnt already included it.

    The moderators have previously asked that if a redirection link is used that >the original link is also included to save moderation time.

    If I need to post a link that's longer than around 72 characters (the usual line length for text-only communication such as Usenet), then I almost
    always provide both the original and a shortened version. If I'm responding
    to a post by someone else who has posted a long URL but not a short version, then I'll often post a short version of their link for the benefit of anyone reading my reply and wanting to follow the link I'm quoting.

    I never post a short link alone, unless the short link itself clearly
    indicates the nature of the content (eg. goo.gl rather than google.com, and youtu.be rather than youtube.com).

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Tue Jan 7 05:21:09 2025
    In message <q95onjt0hhncbcqea1bbcgfcev3tpd7a6a@4ax.com>, at 17:41:09 on
    Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    I won't use url shorteners because of the privacy aspects, and I know
    some people are concerned and so they'll religiously never click on them

    I believe that choice should be theirs, not mine.

    Unfortunately, it's rarely an informed choice, so as a one-time
    advisor on Internet privacy issues, I don't tempt them to make
    the wrong decision.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Tue Jan 7 08:18:11 2025
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Tue, 7 Jan 2025 05:21:09 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <q95onjt0hhncbcqea1bbcgfcev3tpd7a6a@4ax.com>, at 17:41:09 on >>Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    I won't use url shorteners because of the privacy aspects, and I know >>>>some people are concerned and so they'll religiously never click on them >>>
    I believe that choice should be theirs, not mine.

    Unfortunately, it's rarely an informed choice, so as a one-time
    advisor on Internet privacy issues, I don't tempt them to make
    the wrong decision.

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened
    urls.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Roland Perry on Tue Jan 7 08:58:59 2025
    On 7 Jan 2025 at 08:18:11 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Tue, 7 Jan 2025 05:21:09 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <q95onjt0hhncbcqea1bbcgfcev3tpd7a6a@4ax.com>, at 17:41:09 on
    Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    I won't use url shorteners because of the privacy aspects, and I know >>>>> some people are concerned and so they'll religiously never click on them >>>>
    I believe that choice should be theirs, not mine.

    Unfortunately, it's rarely an informed choice, so as a one-time
    advisor on Internet privacy issues, I don't tempt them to make
    the wrong decision.

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened urls.

    But then, of course, we all know that if you have nothing to hide then you
    have nothing to fear!

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Roger Hayter on Tue Jan 7 11:38:03 2025
    On 7 Jan 2025 08:58:59 GMT, Roger Hayter <roger@hayter.org> wrote:

    On 7 Jan 2025 at 08:18:11 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Tue, 7 Jan 2025 05:21:09 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <q95onjt0hhncbcqea1bbcgfcev3tpd7a6a@4ax.com>, at 17:41:09 on >>>> Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    I won't use url shorteners because of the privacy aspects, and I know >>>>>> some people are concerned and so they'll religiously never click on them >>>>>
    I believe that choice should be theirs, not mine.

    Unfortunately, it's rarely an informed choice, so as a one-time
    advisor on Internet privacy issues, I don't tempt them to make
    the wrong decision.

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened
    urls.

    But then, of course, we all know that if you have nothing to hide then you >have nothing to fear!

    Well, in this particular case I don't think there's any significant
    difference between posting a URL on Usenet that tells everyone you've
    visited it and giving that same information to a URL shortening service. So
    the OP doesn't, actually, have anything to fear!

    There is a potential risk, not to the provider of the link, but to the
    person who clicks on it, if the short link redirects somewhere undesirable rather than leading to the same location as the full URL. But there are ways
    to mitigate that risk, if you really don't trust the person who provided it. You can use the preview version of the link, or use incognito mode on your browser to view it, both of which will minimise the risk of something
    untoward appearing in your browsing history, or use a VPN if you are
    concerned about leaking data to the short URL provider or the operator of
    the site that it links to. And if you don't trust even those precautions,
    then simply don't use the link.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pancho@21:1/5 to Mark Goodge on Tue Jan 7 13:31:52 2025
    On 1/7/25 11:38, Mark Goodge wrote:


    Well, in this particular case I don't think there's any significant difference between posting a URL on Usenet that tells everyone you've
    visited it and giving that same information to a URL shortening service. So the OP doesn't, actually, have anything to fear!

    There is a potential risk, not to the provider of the link, but to the
    person who clicks on it, if the short link redirects somewhere undesirable rather than leading to the same location as the full URL. But there are ways to mitigate that risk, if you really don't trust the person who provided it. You can use the preview version of the link, or use incognito mode on your browser to view it, both of which will minimise the risk of something untoward appearing in your browsing history, or use a VPN if you are concerned about leaking data to the short URL provider or the operator of
    the site that it links to. And if you don't trust even those precautions, then simply don't use the link.

    Mark


    As a slight aside, don't some URLs embed personal information in the URL itself. For instance a user ID, but potentially also other personal
    stuff. So there is an anonymity risk posing long URLs, original long
    format or tiny.

    With Amazon links I try to tidy the URL to only include a product id.
    (Not that I personally know what the rest of the Amazon URL contains,
    just a suspicion)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Roland Perry on Tue Jan 7 11:18:55 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened urls.

    It might expand the discussion and inform people if you elaborated on the data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a ‘Private’ browsing facility. Additionally, I delete all web data from it after performing a search, so I’m not sure what ‘leaking’ might be taking place. However, you appear to have expertise in this area which could
    usefully be shared to everyone’s benefit.

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pamela@21:1/5 to Andy Burns on Tue Jan 7 14:42:29 2025
    On 12:09 6 Jan 2025, Andy Burns said:
    Pamela wrote:

    my newsreader doesn't handle UTF-8

    Is 30 years too soon?

    which means I get strange characters appearing in the message text.
    For example, your message is in UTF-8 and I see these characters.

    Sometimes this problem will also appear in the Subject.

    Any header field, really

    UTF-7 would make these messages more legible.

    Except UTF-7 is obsolete and you'll get complaints of e.g. pound
    symbols turning into +AKM-

    My newsreader, like so many others, is no longer being upgraded.

    UTF-7's character set contains everything required for messages here.
    Fancier character sets are not needed.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pamela@21:1/5 to Spike on Tue Jan 7 14:43:15 2025
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 15:52 5 Jan 2025, Spike said:

    In order to avoid situations in which urls in posts become broken,
    it would be helpful to put such links between the characters < and >
    as in the example below:

    <https://mil.in.ua/en/news/the-defense-intelligence-of-
    ukraine-eliminated-the-chief-of-staff-of-the-storm-ossetia-
    battalion/>

    Another method might be to use the services of a url-shortening web
    site such as tinyurl.com (other such sites are available).

    The above link becomes <https://tinyurl.com/4h8yjwev> which might
    stand a better chance of not becoming mangled.

    Note that prepending ‘preview’ (without the quotes) to the
    tinyurl link (to give
    preview.tinyurl.com/whateverwasthereoriginally) will return the
    original link:

    https://preview.tinyurl.com/4h8yjwev

    …gives the link original quoted.

    HTH

    As we're discussing usability of messages, my newsreader doesn't
    handle UTF-8 which means I get strange characters appearing in the
    message text. For example, your message is in UTF-8 and I see these
    characters.

    Sometimes this problem will also appear in the Subject.

    UTF-7 would make these messages more legible.

    There's a separate UTF-8 issue regarding gathering stats mentioned in
    Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Pancho on Tue Jan 7 18:56:32 2025
    On Tue, 7 Jan 2025 13:31:52 +0000, Pancho <Pancho.Jones@proton.me> wrote:

    On 1/7/25 11:38, Mark Goodge wrote:


    Well, in this particular case I don't think there's any significant
    difference between posting a URL on Usenet that tells everyone you've
    visited it and giving that same information to a URL shortening service. So >> the OP doesn't, actually, have anything to fear!

    There is a potential risk, not to the provider of the link, but to the
    person who clicks on it, if the short link redirects somewhere undesirable >> rather than leading to the same location as the full URL. But there are ways >> to mitigate that risk, if you really don't trust the person who provided it. >> You can use the preview version of the link, or use incognito mode on your >> browser to view it, both of which will minimise the risk of something
    untoward appearing in your browsing history, or use a VPN if you are
    concerned about leaking data to the short URL provider or the operator of
    the site that it links to. And if you don't trust even those precautions,
    then simply don't use the link.

    As a slight aside, don't some URLs embed personal information in the URL >itself. For instance a user ID, but potentially also other personal
    stuff. So there is an anonymity risk posing long URLs, original long
    format or tiny.

    Yes, although I would expect anyone who is concerned about online safety to
    be aware of that and strip that off if necessary. But the number of people
    who simply copy and paste URLs containing fbclid values (which inevitably
    makes them ridiculously long as well as encoding personal data) suggests
    that few people care about this.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Tue Jan 7 18:58:55 2025
    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened
    urls.

    It might expand the discussion and inform people if you elaborated on the >data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a >‘Private’ browsing facility. Additionally, I delete all web data from it >after performing a search, so I’m not sure what ‘leaking’ might be taking
    place. However, you appear to have expertise in this area which could >usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Tue Jan 7 19:00:10 2025
    In message <7rtqnj9r4bkfmdmfl3tsr3gruipl3foegr@4ax.com>, at 18:56:32 on
    Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    As a slight aside, don't some URLs embed personal information in the URL >>itself. For instance a user ID, but potentially also other personal
    stuff. So there is an anonymity risk posing long URLs, original long
    format or tiny.

    Yes, although I would expect anyone who is concerned about online safety to >be aware of that and strip that off if necessary. But the number of people >who simply copy and paste URLs containing fbclid values (which inevitably >makes them ridiculously long as well as encoding personal data) suggests
    that few people care about this.

    No, it means they are naive and are putting themselves at risk.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Pamela on Tue Jan 7 15:40:53 2025
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:

    […]

    There's a separate UTF-8 issue regarding gathering stats mentioned in
    Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    That tells me that Mark Goodge made 1170 posts in 2023…

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Roland Perry on Tue Jan 7 19:27:27 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan 2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>> urls.

    It might expand the discussion and inform people if you elaborated on the
    data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a
    ‘Private’ browsing facility. Additionally, I delete all web data from it >> after performing a search, so I’m not sure what ‘leaking’ might be taking
    place. However, you appear to have expertise in this area which could
    usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    I guess it would be hard for the shortner site *not* to know what one is looking at, otherwise they wouldn’t have anything to shorten.

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Roland Perry on Tue Jan 7 21:06:07 2025
    On Tue, 7 Jan 2025 19:00:10 +0000, Roland Perry <roland@perry.uk> wrote:

    In message <7rtqnj9r4bkfmdmfl3tsr3gruipl3foegr@4ax.com>, at 18:56:32 on
    Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    As a slight aside, don't some URLs embed personal information in the URL >>>itself. For instance a user ID, but potentially also other personal >>>stuff. So there is an anonymity risk posing long URLs, original long >>>format or tiny.

    Yes, although I would expect anyone who is concerned about online safety to >>be aware of that and strip that off if necessary. But the number of people >>who simply copy and paste URLs containing fbclid values (which inevitably >>makes them ridiculously long as well as encoding personal data) suggests >>that few people care about this.

    No, it means they are naive and are putting themselves at risk.

    That's just a more judgmental way of saying that they don't care about the risk.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Roland Perry on Tue Jan 7 22:04:52 2025
    On 7 Jan 2025 at 18:58:55 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan 2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>> urls.

    It might expand the discussion and inform people if you elaborated on the
    data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a
    ‘Private’ browsing facility. Additionally, I delete all web data from it >> after performing a search, so I’m not sure what ‘leaking’ might be taking
    place. However, you appear to have expertise in this area which could
    usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    Your ISP already knows anyway.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roger Hayter on Tue Jan 7 23:10:33 2025
    Roger Hayter <roger@hayter.org> wrote:
    On 7 Jan 2025 at 18:58:55 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on >>>> Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>>> urls.

    It might expand the discussion and inform people if you elaborated on the >>> data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a
    ‘Private’ browsing facility. Additionally, I delete all web data from it
    after performing a search, so I’m not sure what ‘leaking’ might be taking
    place. However, you appear to have expertise in this area which could
    usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    Your ISP already knows anyway.


    You have a relationship with your ISP and they are doing business in the jurisdiction you are in. There are legal obligations in how they handle any data they hold about you.

    I have no idea who operates the various link shortening sites. I may be
    able to find out but, unlike my ISP, I am not starting out with a
    reasonable assumption that there is at least in theory some legal recourse should they misuse any information they hold about me.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 8 07:48:25 2025
    In message <lu5dguF37d6U1@mid.individual.net>, at 19:27:27 on Tue, 7 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on >>>> Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>>> urls.

    It might expand the discussion and inform people if you elaborated on the >>> data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a
    ‘Private’ browsing facility. Additionally, I delete all web data from it
    after performing a search, so I’m not sure what ‘leaking’
    might be taking
    place. However, you appear to have expertise in this area which could
    usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    I guess it would be hard for the shortner site *not* to know what one is >looking at, otherwise they wouldn’t have anything to shorten.

    Obviously, but what people dismiss rather airily is the fact that the
    shortener site is able to build up a profile of what sites you visit,
    and conversely a picture of what sort of people visit the site whose
    shortened link has been published.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 8 07:46:11 2025
    In message <po5rnj95isl8ntpt17sq4jj3bvnfgbv5op@4ax.com>, at 21:06:07 on
    Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    On Tue, 7 Jan 2025 19:00:10 +0000, Roland Perry <roland@perry.uk> wrote:

    In message <7rtqnj9r4bkfmdmfl3tsr3gruipl3foegr@4ax.com>, at 18:56:32 on >>Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    As a slight aside, don't some URLs embed personal information in the URL >>>>itself. For instance a user ID, but potentially also other personal >>>>stuff. So there is an anonymity risk posing long URLs, original long >>>>format or tiny.

    Yes, although I would expect anyone who is concerned about online safety to >>>be aware of that and strip that off if necessary. But the number of people >>>who simply copy and paste URLs containing fbclid values (which inevitably >>>makes them ridiculously long as well as encoding personal data) suggests >>>that few people care about this.

    No, it means they are naive and are putting themselves at risk.

    That's just a more judgmental way of saying that they don't care about the >risk.

    Perhaps they don't care because they don't realise what the risk is.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 8 07:49:06 2025
    In message <8749247405.9c316cd2@uninhabited.net>, at 22:04:52 on Tue, 7
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    On 7 Jan 2025 at 18:58:55 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on >>>> Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>>> urls.

    It might expand the discussion and inform people if you elaborated on the >>> data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a >>>‘Private’ browsing facility. Additionally, I delete all web data
    from it after performing a search, so I’m not sure what
    ‘leaking’ might be taking place. However, you appear to have >>>expertise in this area which could usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    Your ISP already knows anyway.

    They are regulated under UK law.

    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pamela@21:1/5 to Spike on Tue Jan 7 22:05:32 2025
    On 15:40 7 Jan 2025, Spike said:

    Pamela <uklm@permabulator.33mail.com> wrote:
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:

    […]

    There's a separate UTF-8 issue regarding gathering stats mentioned in
    Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    That tells me that Mark Goodge made 1170 posts in 2023…

    It says:

    "The software doesn't decode UTF8, this is a known bug that is still
    awaiting the tuit supply to be topped up but, in the meantime, will
    affect the stats."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Tue Jan 7 18:57:24 2025
    In message <1s3qnjl3q4tjcfsdbcoaia5jgkjiu0mtn8@4ax.com>, at 11:38:03 on
    Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    On 7 Jan 2025 08:58:59 GMT, Roger Hayter <roger@hayter.org> wrote:

    On 7 Jan 2025 at 08:18:11 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on
    Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:
    On Tue, 7 Jan 2025 05:21:09 +0000, Roland Perry <roland@perry.uk>
    wrote:

    In message <q95onjt0hhncbcqea1bbcgfcev3tpd7a6a@4ax.com>, at 17:41:09 on >>>>> Mon, 6 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    I won't use url shorteners because of the privacy aspects, and I know >>>>>>> some people are concerned and so they'll religiously never click on them

    I believe that choice should be theirs, not mine.

    Unfortunately, it's rarely an informed choice, so as a one-time
    advisor on Internet privacy issues, I don't tempt them to make
    the wrong decision.

    I'd think that what is left of Usenet users nowadays are a lot more
    savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>> urls.

    But then, of course, we all know that if you have nothing to hide then you >>have nothing to fear!

    Well, in this particular case I don't think there's any significant >difference between posting a URL on Usenet that tells everyone you've
    visited it and giving that same information to a URL shortening service. So >the OP doesn't, actually, have anything to fear!

    Do keep up!

    There is a potential risk, not to the provider of the link, but to the
    person who clicks on it,

    Precisely.

    if the short link redirects somewhere undesirable rather than leading
    to the same location as the full URL.

    No, because it hoovers up the information he's visited that site.

    But there are ways to mitigate that risk, if you really don't trust the >person who provided it.

    Not relevant, the people not-being-trusted are the operators of the
    shortener site.

    You can use the preview version of the link, or use incognito mode on your >browser to view it, both of which will minimise the risk of something >untoward appearing in your browsing history,

    Again, that's the wrong risk.

    or use a VPN if you are concerned about leaking data to the short URL >provider or the operator of the site that it links to. And if you don't
    trust even those precautions,

    The precautions you mention are against other risks, not the data leak.

    then simply don't use the link.

    But people don't generally know that, so they shouldn't be tempted.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Roland Perry on Wed Jan 8 11:20:20 2025
    On Tue, 7 Jan 2025 18:57:24 +0000, Roland Perry <roland@perry.uk> wrote:

    In message <1s3qnjl3q4tjcfsdbcoaia5jgkjiu0mtn8@4ax.com>, at 11:38:03 on
    Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:

    But there are ways to mitigate that risk, if you really don't trust the >>person who provided it.

    Not relevant, the people not-being-trusted are the operators of the
    shortener site.

    What evidence do you have that the operators of, for example, TinyURL are
    less trustworthy than website operators in general?

    After all, every website operator gets a certain amount of your data every
    time you use them, even if it's just your IP address, browser UA and the
    pages on their site that you've visited. Websites which provide a search, directory or redirection service get a little bit more, including the search terms you've used and the links that you've followed. But that's an
    unavoidable consequence of the service being used.

    If you won't use TinyYRL because you don't want TinyURL to know which links you've visited, then neither can you use Google, Bing or DuckDuckGo, for exactly the same reason. But if your web usage is restricted entirely to manually typing or copying and pasting links rather than following them from
    a different site then your web usage is also going to be somewhat limited.
    Most people put functionality above that level of privacy paranoia.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Roland Perry on Wed Jan 8 09:29:33 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <lu5dguF37d6U1@mid.individual.net>, at 19:27:27 on Tue, 7 Jan 2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lu4gsvFt73eU1@mid.individual.net>, at 11:18:55 on Tue, 7 Jan >>> 2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <ttjpnjpubvdo2sp3uufdvq7l9gh7oe9tt8@4ax.com>, at 06:56:39 on >>>>> Tue, 7 Jan 2025, Martin Harran <martinharran@gmail.com> remarked:

    […]

    I'd think that what is left of Usenet users nowadays are a lot more >>>>>> savvy about the Internet than the general population.

    Clearly not, when they pepper their postings with data-leaking shortened >>>>> urls.

    It might expand the discussion and inform people if you elaborated on the >>>> data-leaking aspect of using shortened URLs.

    For example, I use Startpage as a general search engine, which has a
    ‘Private’ browsing facility. Additionally, I delete all web data from it
    after performing a search, so I’m not sure what ‘leaking’
    might be taking
    place. However, you appear to have expertise in this area which could
    usefully be shared to everyone’s benefit.

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    I guess it would be hard for the shortner site *not* to know what one is
    looking at, otherwise they wouldn’t have anything to shorten.

    Obviously, but what people dismiss rather airily is the fact that the shortener site is able to build up a profile of what sites you visit,
    and conversely a picture of what sort of people visit the site whose shortened link has been published.

    I don’t mean to be rude or offensive, but you seem to have concerns about privacy. Yet, if one looked over your last 1000 posts to this group, that
    would certainly ‘build a picture’ of you. So, what is it that you want to avoid?

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Pamela on Wed Jan 8 09:20:59 2025
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 15:40 7 Jan 2025, Spike said:

    Pamela <uklm@permabulator.33mail.com> wrote:
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:

    […]

    There's a separate UTF-8 issue regarding gathering stats mentioned in >>>>> Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    That tells me that Mark Goodge made 1170 posts in 2023…

    It says:

    "The software doesn't decode UTF8, this is a known bug that is still
    awaiting the tuit supply to be topped up but, in the meantime, will
    affect the stats."

    Thanks.

    I checked the settings, and UTF-7 isn’t available on my current and up-to-date phone. There are about 40 alternative character sets, would any
    of them be more suitable?

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 8 11:36:05 2025
    In message <ofnsnjpcjo6lc98d8j8tcc4p171d3iaivs@4ax.com>, at 11:20:20 on
    Wed, 8 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    On Tue, 7 Jan 2025 18:57:24 +0000, Roland Perry <roland@perry.uk> wrote:

    In message <1s3qnjl3q4tjcfsdbcoaia5jgkjiu0mtn8@4ax.com>, at 11:38:03 on >>Tue, 7 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:

    But there are ways to mitigate that risk, if you really don't trust the >>>person who provided it.

    Not relevant, the people not-being-trusted are the operators of the >>shortener site.

    What evidence do you have that the operators of, for example, TinyURL are >less trustworthy than website operators in general?

    I have no evidence either way, other than *something* is their revenue
    stream, and for free service it's the user's data which provides that.

    After all, every website operator gets a certain amount of your data every >time you use them, even if it's just your IP address, browser UA and the >pages on their site that you've visited.

    But that's just one isolated site, not a url shortener which has much
    more reach.

    Websites which provide a search, directory or redirection service get a >little bit more, including the search terms you've used and the links
    that you've followed. But that's an unavoidable consequence of the
    service being used.

    If you won't use TinyYRL because you don't want TinyURL to know which links >you've visited, then neither can you use Google, Bing or DuckDuckGo, for >exactly the same reason.

    No, they are quite different forms of risk. I'm very surprised you don't realise that.

    But if your web usage is restricted entirely to
    manually typing or copying and pasting links rather than following them from >a different site then your web usage is also going to be somewhat limited.

    False dichotomy.

    Most people put functionality above that level of

    Which of course your namesake at Facebook makes billions out of.

    privacy paranoia.

    No, they really are out to get you.

    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 8 11:38:17 2025
    In message <lu6urtFao3vU1@mid.individual.net>, at 09:29:33 on Wed, 8 Jan
    2025, Spike <aero.spike@mail.com> remarked:

    When you click on a shortened link, the shortener site knows who you
    are, and what you are looking at. That's a data leak.

    I guess it would be hard for the shortner site *not* to know what one is >>> looking at, otherwise they wouldn’t have anything to shorten.

    Obviously, but what people dismiss rather airily is the fact that the
    shortener site is able to build up a profile of what sites you visit,
    and conversely a picture of what sort of people visit the site whose
    shortened link has been published.

    I don’t mean to be rude or offensive, but you seem to have concerns about >privacy. Yet, if one looked over your last 1000 posts to this group, that >would certainly ‘build a picture’ of you. So, what is it that you want to >avoid?

    Quite different pictures. And one I control, the other I don't.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Spike on Wed Jan 8 13:13:36 2025
    On 2025-01-08, Spike <aero.spike@mail.com> wrote:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 15:40 7 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:

    […]

    There's a separate UTF-8 issue regarding gathering stats mentioned in >>>>>> Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    That tells me that Mark Goodge made 1170 posts in 2023…

    It says:

    "The software doesn't decode UTF8, this is a known bug that is still
    awaiting the tuit supply to be topped up but, in the meantime, will
    affect the stats."

    Thanks.

    I checked the settings, and UTF-7 isn’t available on my current and up-to-date phone. There are about 40 alternative character sets, would any
    of them be more suitable?

    The only suitable character sets for posting to Usenet are ASCII
    (which will work everywhere but implies no "special" characters,
    forbidding even pound signs, angled quote marks, etc), and UTF-8.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Jon Ribbens on Wed Jan 8 13:42:02 2025
    Jon Ribbens <jon+usenet@unequivocal.eu> wrote:
    On 2025-01-08, Spike <aero.spike@mail.com> wrote:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 15:40 7 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:

    […]

    There's a separate UTF-8 issue regarding gathering stats mentioned in >>>>>>> Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    That tells me that Mark Goodge made 1170 posts in 2023…

    It says:

    "The software doesn't decode UTF8, this is a known bug that is still
    awaiting the tuit supply to be topped up but, in the meantime, will
    affect the stats."

    Thanks.

    I checked the settings, and UTF-7 isn’t available on my current and
    up-to-date phone. There are about 40 alternative character sets, would any >> of them be more suitable?

    The only suitable character sets for posting to Usenet are ASCII
    (which will work everywhere but implies no "special" characters,
    forbidding even pound signs, angled quote marks, etc), and UTF-8.

    No ASCII in the character sets here, so UTF-8 it is…

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Pamela@21:1/5 to Jon Ribbens on Wed Jan 8 14:55:03 2025
    On 13:13 8 Jan 2025, Jon Ribbens said:
    On 2025-01-08, Spike <aero.spike@mail.com> wrote:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 15:40 7 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:
    On 11:56 6 Jan 2025, Spike said:
    Pamela <uklm@permabulator.33mail.com> wrote:


    There's a separate UTF-8 issue regarding gathering stats
    mentioned in Mike Goodge's post below last January.

    Message-ID: <lkc6pi116bea18rqgs20l10c5c41i221cq@4ax.com>

    Hmm… NewsTap won’t search on message-ID, can you narrow down
    Goodge’s post?

    Try: http://al.howardknight.net/?ID=173619398000

    That tells me that Mark Goodge made 1170 posts in 2023…

    It says:

    "The software doesn't decode UTF8, this is a known bug that is still
    awaiting the tuit supply to be topped up but, in the meantime, will
    affect the stats."

    Thanks.

    I checked the settings, and UTF-7 isn’t available on my current and
    up-to-date phone. There are about 40 alternative character sets,
    would any of them be more suitable?

    The only suitable character sets for posting to Usenet are ASCII
    (which will work everywhere but implies no "special" characters,
    forbidding even pound signs, angled quote marks, etc), and UTF-8.

    I'm aware UTF-7 contains a few characters which clash with those used on
    the wider Internet (such as the plus symbol and the forward slash).
    However it seems perfectly suitable for Usenet messages.

    In general, UTF-7 may may not be as useful as UTF-8 but that isn't the
    issue here. Using UTF-7 gives greater backward compatibility than
    UTF-8, as I know with my newsreader.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Martin Harran on Wed Jan 8 18:05:14 2025
    Martin Harran wrote:

    When I click on it, it says:

    "al.howardknight.net doesn’t support a secure connection"

    Did you alter the http:// to https:// or did your browser do it by itself?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Martin Harran on Thu Jan 9 09:35:29 2025
    Martin Harran wrote:

    Andy Burns wrote:

    Did you alter the http:// to https:// or did your browser do it by itself?

    Neither. Chrome by default throws up a warning on all sites without a
    valid SSL cert.

    Obviously a http:// site can't have a certificate.

    This feature can be disabled in settings or using a
    browser extension at the user's own risk.

    Chrome isn't my default browser (so I have to paste the link, rather
    than click it) but it does as it's told and goes to the http:// site,
    and loads it with no mention of certificates or secure connection.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to Martin Harran on Thu Jan 9 10:57:41 2025
    On 09/01/2025 10:41, Martin Harran wrote:
    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Martin Harran on Thu Jan 9 11:01:04 2025
    Martin Harran wrote:

    Andy Burns wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.

    Your initial reply seemed to me as though you were saying chrome didn't
    load the page at all, for me I didn't get any security message displayed
    at all, just get a small "lozenge" in the address bar similar to the old
    broken padlock, which if I click does give a message ... I know the bar
    is low for certificates now, but for a site with no login and where all
    content was scraped from public usenet, I don't find SSL necessary

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Thu Jan 9 11:54:08 2025
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:
    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Walker@21:1/5 to Martin Harran on Thu Jan 9 11:16:55 2025
    Martin Harran <martinharran@gmail.com> wrote in news:9m9vnj13tuqplgnpcif57i4mfba7rgifd0@4ax.com:

    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Martin Harran wrote:

    Andy Burns wrote:

    Did you alter the http:// to https:// or did your browser do it by
    itself?

    Neither. Chrome by default throws up a warning on all sites without
    a valid SSL cert.

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.


    You can turn this off (in Chrome) at:

    Safe Browsing > Advanced > Always use secure connections

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    [1] I know that SSL does not eliminate the risks but it does reduce
    them.


    Why should a creator of benign content feel the need to pay extra to host
    a secure site (as many hosting companies do charge extra for this
    privilege)?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Martin Harran on Thu Jan 9 13:43:11 2025
    On 9 Jan 2025 at 13:34:35 GMT, "Martin Harran" <martinharran@gmail.com> wrote:

    On Thu, 9 Jan 2025 10:57:41 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:

    On 09/01/2025 10:41, Martin Harran wrote:
    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Without SSL, how do you know it is the site you think it is and not a redirected copy?

    In this case, provided the redirected site gives you the message you want it may not matter.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Max Demian on Thu Jan 9 13:49:23 2025
    On Thu, 09 Jan 2025 10:57:41 +0000, Max Demian wrote:

    On 09/01/2025 10:41, Martin Harran wrote:
    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find it
    hard to understand why the publisher of any site should not use SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    I have a lot of intranet sites that I CBA to setup SSL for.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Peter Walker on Thu Jan 9 13:51:29 2025
    On Thu, 09 Jan 2025 11:16:55 +0000, Peter Walker wrote:

    Martin Harran <martinharran@gmail.com> wrote in news:9m9vnj13tuqplgnpcif57i4mfba7rgifd0@4ax.com:

    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Martin Harran wrote:

    Andy Burns wrote:

    Did you alter the http:// to https:// or did your browser do it by
    itself?

    Neither. Chrome by default throws up a warning on all sites without a
    valid SSL cert.

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.


    You can turn this off (in Chrome) at:

    Safe Browsing > Advanced > Always use secure connections

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find it
    hard to understand why the publisher of any site should not use SSL.

    [1] I know that SSL does not eliminate the risks but it does reduce
    them.


    Why should a creator of benign content feel the need to pay extra to
    host a secure site (as many hosting companies do charge extra for this privilege)?

    Or someone using a site on their own intranet:

    Webmin (several machines)
    HomeAssistant
    Get_iplayer
    Deluge
    MiniDLNA

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Martin Harran on Thu Jan 9 13:52:41 2025
    On 9 Jan 2025 at 13:41:28 GMT, "Martin Harran" <martinharran@gmail.com> wrote:

    On 9 Jan 2025 11:16:55 GMT, Peter Walker <not@for.mail> wrote:

    Martin Harran <martinharran@gmail.com> wrote in
    news:9m9vnj13tuqplgnpcif57i4mfba7rgifd0@4ax.com:

    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Martin Harran wrote:

    Andy Burns wrote:

    Did you alter the http:// to https:// or did your browser do it by >>>>>> itself?

    Neither. Chrome by default throws up a warning on all sites without
    a valid SSL cert.

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.


    You can turn this off (in Chrome) at:

    Safe Browsing > Advanced > Always use secure connections

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    [1] I know that SSL does not eliminate the risks but it does reduce
    them.


    Why should a creator of benign content feel the need to pay extra to host
    a secure site

    To minimise the risk of somebody setting up a false copy of it for redirection.

    (as many hosting companies do charge extra for this
    privilege)?

    Where they do charge, it's usually miniscule [1] compare to the cost
    of developing and hosting a site let alone the potential cost if
    someone does hack it (in terms of impact on reputation, not direct liabilities).

    [1] Can also be done free. I use letsencrypt on my personal sites;
    works fine.

    That is only free if you discount your time setting it up.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Roger Hayter on Thu Jan 9 14:13:01 2025
    On Thu, 09 Jan 2025 13:52:41 +0000, Roger Hayter wrote:

    On 9 Jan 2025 at 13:41:28 GMT, "Martin Harran" <martinharran@gmail.com> wrote:

    On 9 Jan 2025 11:16:55 GMT, Peter Walker <not@for.mail> wrote:

    Martin Harran <martinharran@gmail.com> wrote in
    news:9m9vnj13tuqplgnpcif57i4mfba7rgifd0@4ax.com:

    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Martin Harran wrote:

    Andy Burns wrote:

    Did you alter the http:// to https:// or did your browser do it by >>>>>>> itself?

    Neither. Chrome by default throws up a warning on all sites without >>>>>> a valid SSL cert.

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.


    You can turn this off (in Chrome) at:

    Safe Browsing > Advanced > Always use secure connections

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    [1] I know that SSL does not eliminate the risks but it does reduce
    them.


    Why should a creator of benign content feel the need to pay extra to
    host a secure site

    To minimise the risk of somebody setting up a false copy of it for
    redirection.

    (as many hosting companies do charge extra for this
    privilege)?

    Where they do charge, it's usually miniscule [1] compare to the cost of
    developing and hosting a site let alone the potential cost if someone
    does hack it (in terms of impact on reputation, not direct
    liabilities).

    [1] Can also be done free. I use letsencrypt on my personal sites;
    works fine.

    That is only free if you discount your time setting it up.

    The same is true of anything, really.

    Letsencrypt does take a little handling. Especially if you want to
    seamlessly auto renew domains.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Roland Perry on Thu Jan 9 14:28:25 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

    […]

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to Roland Perry on Thu Jan 9 18:06:31 2025
    On 09/01/2025 11:54, Roland Perry wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

     In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates,  I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    The websites don't get my "identity" in any reasonable sense of the word.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to Roger Hayter on Thu Jan 9 18:08:41 2025
    On 09/01/2025 13:43, Roger Hayter wrote:
    On 9 Jan 2025 at 13:34:35 GMT, "Martin Harran" <martinharran@gmail.com> wrote:
    On Thu, 9 Jan 2025 10:57:41 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:
    On 09/01/2025 10:41, Martin Harran wrote:
    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be
    switched to https.

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Without SSL, how do you know it is the site you think it is and not a
    redirected copy?

    In this case, provided the redirected site gives you the message you want it may not matter.

    Exactly. It's just a website. Even with SSL, it might provide wrong information.

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Martin Harran on Thu Jan 9 18:11:03 2025
    On 9 Jan 2025 at 17:47:31 GMT, "Martin Harran" <martinharran@gmail.com> wrote:

    On 9 Jan 2025 13:43:11 GMT, Roger Hayter <roger@hayter.org> wrote:

    On 9 Jan 2025 at 13:34:35 GMT, "Martin Harran" <martinharran@gmail.com> wrote:

    On Thu, 9 Jan 2025 10:57:41 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:

    On 09/01/2025 10:41, Martin Harran wrote:
    On Thu, 9 Jan 2025 09:35:29 +0000, Andy Burns <usenet@andyburns.uk>
    wrote:

    Obviously a http:// site can't have a certificate.

    Which is why Chrome throws up a warning for every site that can't be >>>>> switched to https.

    In todays' Internet world with so many bad actors about [1] and with >>>>> the availability of low cost and even free SSL certificates, I find >>>>> it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either >>>> to or from, and it's a nuisance if the browser whinges.

    Without SSL, how do you know it is the site you think it is and not a
    redirected copy?

    In this case, provided the redirected site gives you the message you want it >> may not matter.

    If it contains malware, it might matter quite a bit.

    Can sites install malware without you volunteering to download anything? If so it applies equally to any site you visit, whether you know the correct domain name or not.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to All on Thu Jan 9 22:14:08 2025
    On Thu, 9 Jan 2025 18:06:31 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:

    On 09/01/2025 11:54, Roland Perry wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    The websites don't get my "identity" in any reasonable sense of the word.

    The main reason why the browser gives an error when you visit an insecure
    site is that the browser has no way of knowing what data may be being transmitted to and from the site. So it's taking the safe option and warning you every time. You are, of course, free to disregard the warning if you
    want to.

    More generally, given that there are precisely zero circumstances in which using https will make things worse for the user, but many circumstances in which it will make things better, using https by default can never be the
    wrong choice.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Peter Walker on Thu Jan 9 22:17:48 2025
    On 9 Jan 2025 11:16:55 GMT, Peter Walker <not@for.mail> wrote:

    Why should a creator of benign content feel the need to pay extra to host
    a secure site (as many hosting companies do charge extra for this
    privilege)?

    Practically no hosting provider charges extra for SSL these days. If yours does, find a better provider. Or proxy the site behind a free Cloudflare account, which will not only give you SSL but also a caching CDN (and hence better performance for your website) at precisely zero cost.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Fri Jan 10 09:09:57 2025
    In message <lua4o9Fqh4kU1@mid.individual.net>, at 14:28:25 on Thu, 9 Jan
    2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

    […]

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    No, because it isn't false that those things are private information.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Fri Jan 10 09:10:20 2025
    In message <vlp376$3ff3c$1@dont-email.me>, at 18:06:31 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 11:54, Roland Perry wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

    In todays' Internet world with so many bad actors about [1] and with
    the availability of low cost and even free SSL certificates, I find
    it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information
    either to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard
    those as "private information", I can find plenty of people who do.

    The websites don't get my "identity" in any reasonable sense of the word.

    Dream on.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Fri Jan 10 09:11:38 2025
    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:

    Can sites install malware without you volunteering to download anything?

    On that narrow point, yes. It's called "drive-by malware".
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to All on Fri Jan 10 10:19:56 2025
    Jethro_uk wrote:

    Peter Walker wrote:

    Why should a creator of benign content feel the need to pay extra to
    host a secure site

    Or someone using a site on their own intranet:

    Webmin (several machines)
    In the case of Howard's article lookup, he runs the public site on port
    80 and his hosting company runs the Plesk admin console for the VPS on
    port 443, maybe he'd need to pay extra to run the site on a public IP
    port 443?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Andy Burns on Fri Jan 10 12:28:57 2025
    On 10 Jan 2025 at 10:19:56 GMT, "Andy Burns" <usenet@andyburns.uk> wrote:

    Jethro_uk wrote:

    Peter Walker wrote:

    Why should a creator of benign content feel the need to pay extra to
    host a secure site

    Or someone using a site on their own intranet:

    Webmin (several machines)
    In the case of Howard's article lookup, he runs the public site on port
    80 and his hosting company runs the Plesk admin console for the VPS on
    port 443, maybe he'd need to pay extra to run the site on a public IP
    port 443?

    Surely it's been easy to run virtual https websites on the same IP address for a decade or two? It seems to be quite a long time since Apache couldn't do this.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Spike@21:1/5 to Roland Perry on Fri Jan 10 11:16:08 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <lua4o9Fqh4kU1@mid.individual.net>, at 14:28:25 on Thu, 9 Jan 2025, Spike <aero.spike@mail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:

    Most of the sites I visit don't involve any private information either >>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    No, because it isn't false that those things are private information.

    “In argumentation theory, an argumentum ad populum (Latin for 'appeal to
    the people') is a fallacious argument which is based on claiming a truth or affirming something is good or correct because many people think so.”

    ‘I can find plenty of people who do’ would seem to fulfil the requirements of such an argument.

    --
    Spike

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andy Burns@21:1/5 to Roger Hayter on Fri Jan 10 14:22:36 2025
    Roger Hayter wrote:

    Andy Burns wrote:

    In the case of Howard's article lookup, he runs the public site on port
    80 and his hosting company runs the Plesk admin console for the VPS on
    port 443, maybe he'd need to pay extra to run the site on a public IP
    port 443?

    Surely it's been easy to run virtual https websites on the same IP address for
    a decade or two? It seems to be quite a long time since Apache couldn't do this.
    If it's your box then yes, but if you're paying a couple of quid a month
    for AYCE web hosting, you probably don't get much say in the matter.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Roland Perry on Fri Jan 10 14:35:33 2025
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:

    Can sites install malware without you volunteering to download anything?

    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait around? Surely it is something browsers could and should prevent?

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Roger Hayter on Fri Jan 10 17:05:54 2025
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote:
    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything?

    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait around? Surely it is something browsers could and should prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Fri Jan 10 17:57:53 2025
    In message <lucdroF772nU1@mid.individual.net>, at 11:16:08 on Fri, 10
    Jan 2025, Spike <aero.spike@mail.com> remarked:

    Most of the sites I visit don't involve any private information either >>>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those >>>> as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    No, because it isn't false that those things are private information.

    “In argumentation theory, an argumentum ad populum (Latin for 'appeal to >the people') is a fallacious argument which is based on claiming a truth or >affirming something is good or correct because many people think so.”

    ‘I can find plenty of people who do’ would seem to fulfil the requirements >of such an argument.

    OK, lots of people think the world is round (not flat). Does that
    qualify?

    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Fri Jan 10 18:00:01 2025
    In message <1973326510.11aed102@uninhabited.net>, at 14:35:33 on Fri, 10
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:

    Can sites install malware without you volunteering to download anything?

    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait >around? Surely it is something browsers could and should prevent?

    There are various schemes in place to try to alleviate it, but people
    still "get their computers hacked" probably by drive-by malware.

    Browsers are insufficiently good at detecting it, there's a significant
    market for anti-malware sofware.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Fri Jan 10 18:03:06 2025
    In message <slrnvo2kri.40n.jon+usenet@raven.unequivocal.eu>, at 17:05:54
    on Fri, 10 Jan 2025, Jon Ribbens <jon+usenet@unequivocal.eu> remarked:
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote:
    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything? >>>
    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait >> around? Surely it is something browsers could and should prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Perhaps you should have a word with the authors of:

    en.wikipedia.org/Drive-by_download
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Martin Brown@21:1/5 to Roger Hayter on Fri Jan 10 17:51:27 2025
    On 10/01/2025 14:35, Roger Hayter wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:

    Can sites install malware without you volunteering to download anything?

    On that narrow point, yes. It's called "drive-by malware".

    Just being physically connected to the internet can be enough if you
    don't have decent firewall protection. Some routers themselves are not
    fit for purpose and can be quite easily attacked by malware.

    This is an example from last year and a decent manufacturer but it was
    still a serious vulnerability according to this source:

    https://www.cyfirma.com/research/comprehensive-analysis-of-cve-2024-21833-vulnerability-in-tp-link-routers-threat-landscape-exploitation-risks-and-mitigation-strategies/

    Cyber security firms always play up the risks and hardware/software
    vendors downplay them. The truth is usually somewhere in between.

    Then why is that not much more common, given the amount of random clickbait around? Surely it is something browsers could and should prevent?

    In an ideal world yes they should.

    Sandboxes and virtual machine tricks can help to avoid malware but a
    zero day exploit can cut through anything if the fault is deep enough.

    That is one way that state intelligence services install spyware...

    --
    Martin Brown

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Max Demian@21:1/5 to Mark Goodge on Fri Jan 10 18:16:07 2025
    On 09/01/2025 22:14, Mark Goodge wrote:
    On Thu, 9 Jan 2025 18:06:31 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:

    On 09/01/2025 11:54, Roland Perry wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

     In todays' Internet world with so many bad actors about [1] and with >>>>> the availability of low cost and even free SSL certificates,  I find >>>>> it hard to understand why the publisher of any site should not use
    SSL.

    Most of the sites I visit don't involve any private information either >>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    The websites don't get my "identity" in any reasonable sense of the word.

    The main reason why the browser gives an error when you visit an insecure site is that the browser has no way of knowing what data may be being transmitted to and from the site. So it's taking the safe option and warning you every time. You are, of course, free to disregard the warning if you
    want to.

    More generally, given that there are precisely zero circumstances in which using https will make things worse for the user, but many circumstances in which it will make things better, using https by default can never be the wrong choice.

    I can't choose whether a website I want to access uses http or https.
    It's up to the website operator.

    It isn't obvious (or easy) to give me a simple choice whether I want to
    "risk it".

    --
    Max Demian

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Max Demian on Fri Jan 10 18:50:35 2025
    On 10 Jan 2025 at 18:16:07 GMT, "Max Demian" <max_demian@bigfoot.com> wrote:

    On 09/01/2025 22:14, Mark Goodge wrote:
    On Thu, 9 Jan 2025 18:06:31 +0000, Max Demian <max_demian@bigfoot.com>
    wrote:

    On 09/01/2025 11:54, Roland Perry wrote:
    In message <vloa34$3aqfq$1@dont-email.me>, at 10:57:41 on Thu, 9 Jan
    2025, Max Demian <max_demian@bigfoot.com> remarked:
    On 09/01/2025 10:41, Martin Harran wrote:

    In todays' Internet world with so many bad actors about [1] and with >>>>>> the availability of low cost and even free SSL certificates, I find >>>>>> it hard to understand why the publisher of any site should not use >>>>>> SSL.

    Most of the sites I visit don't involve any private information either >>>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those >>>> as "private information", I can find plenty of people who do.

    The websites don't get my "identity" in any reasonable sense of the word. >>
    The main reason why the browser gives an error when you visit an insecure
    site is that the browser has no way of knowing what data may be being
    transmitted to and from the site. So it's taking the safe option and warning >> you every time. You are, of course, free to disregard the warning if you
    want to.

    More generally, given that there are precisely zero circumstances in which >> using https will make things worse for the user, but many circumstances in >> which it will make things better, using https by default can never be the
    wrong choice.

    I can't choose whether a website I want to access uses http or https.
    It's up to the website operator.

    It isn't obvious (or easy) to give me a simple choice whether I want to
    "risk it".

    It is actually your browser that makes that choice for you, and refuses to be overruled, in those cases where the website offers either.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Roland Perry on Fri Jan 10 18:58:04 2025
    On 10 Jan 2025 at 18:03:06 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <slrnvo2kri.40n.jon+usenet@raven.unequivocal.eu>, at 17:05:54
    on Fri, 10 Jan 2025, Jon Ribbens <jon+usenet@unequivocal.eu> remarked:
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote: >>>> In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9 >>>> Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything? >>>>
    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait >>> around? Surely it is something browsers could and should prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Perhaps you should have a word with the authors of:

    en.wikipedia.org/Drive-by_download

    Which says that relies on either unwise actions by the user or vulnerabilities in the browser or operating system. It suggests that if everything is working properly and you don't click on things it can't happen.


    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to All on Fri Jan 10 18:52:52 2025
    On 10 Jan 2025 at 17:05:54 GMT, "Jon Ribbens" <jon+usenet@unequivocal.eu> wrote:

    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote:
    In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything? >>>
    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait >> around? Surely it is something browsers could and should prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Unfortunately it is easy to insert a button which says it is doing one thing but in fact does another. Is this a feasible to trick people into downloading executable software to a dangerous place merely by doing this?

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Roger Hayter on Fri Jan 10 19:49:24 2025
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 17:05:54 GMT, "Jon Ribbens" <jon+usenet@unequivocal.eu> wrote:
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote: >>>> In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9 >>>> Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything? >>>>
    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random
    clickbait around? Surely it is something browsers could and should
    prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Unfortunately it is easy to insert a button which says it is doing one
    thing but in fact does another. Is this a feasible to trick people
    into downloading executable software to a dangerous place merely by
    doing this?

    Obviously a site can have a button that says "look at lovely pictures
    of kittens" but in fact when clicked on tries to download a virus, but
    it shouldn't be possible for it to actually succeed without the browser
    giving a specific, clear, warning message that has to be explicitly
    confirmed.

    On the other hand if the button says "download a program to enable you
    to watch lovely videos of kittens" and the user therefore deliberately
    clicks "yes" to the browser's warning then all bets are off.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Roger Hayter on Fri Jan 10 19:55:27 2025
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 18:03:06 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <slrnvo2kri.40n.jon+usenet@raven.unequivocal.eu>, at 17:05:54
    on Fri, 10 Jan 2025, Jon Ribbens <jon+usenet@unequivocal.eu> remarked:
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote: >>>>> In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9 >>>>> Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download
    anything?

    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random
    clickbait around? Surely it is something browsers could and should
    prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Perhaps you should have a word with the authors of:

    en.wikipedia.org/Drive-by_download

    Which says that relies on either unwise actions by the user or vulnerabilities in the browser or operating system. It suggests that
    if everything is working properly and you don't click on things it
    can't happen.

    Exactly, the article backs up me rather than Roland.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Sat Jan 11 09:22:37 2025
    In message <3548393599.7e4a3ef9@uninhabited.net>, at 18:58:04 on Fri, 10
    Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    On 10 Jan 2025 at 18:03:06 GMT, "Roland Perry" <roland@perry.uk> wrote:

    In message <slrnvo2kri.40n.jon+usenet@raven.unequivocal.eu>, at 17:05:54
    on Fri, 10 Jan 2025, Jon Ribbens <jon+usenet@unequivocal.eu> remarked:
    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote: >>>>> In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9 >>>>> Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything? >>>>>
    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait
    around? Surely it is something browsers could and should prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Perhaps you should have a word with the authors of:

    en.wikipedia.org/Drive-by_download

    Which says that relies on either unwise actions by the user or vulnerabilities >in the browser or operating system. It suggests that if everything is working >properly and you don't click on things it can't happen.

    Vulnerabilities are inevitable, and as it says the user isn't involved
    in triggering them. So unless you can nominate a browser which
    "properly" bounces all such attempts (there isn't one) then we are back
    to having to use third party anti-malware.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Sat Jan 11 09:26:13 2025
    In message <slrnvo2upf.40n.jon+usenet@raven.unequivocal.eu>, at 19:55:27
    on Fri, 10 Jan 2025, Jon Ribbens <jon+usenet@unequivocal.eu> remarked:
    Can sites install malware without you volunteering to download
    anything?

    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random
    clickbait around? Surely it is something browsers could and should
    prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Perhaps you should have a word with the authors of:

    en.wikipedia.org/Drive-by_download

    Which says that relies on either unwise actions by the user or
    vulnerabilities in the browser or operating system. It suggests that
    if everything is working properly and you don't click on things it
    can't happen.

    Exactly, the article backs up me rather than Roland.

    On the contrary, it describes various mechanisms which require no action
    by the user.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Mark Goodge on Sat Jan 11 13:41:15 2025
    On 2025-01-11, Mark Goodge <usenet@listmail.good-stuff.co.uk> wrote:
    On 10 Jan 2025 18:52:52 GMT, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 17:05:54 GMT, "Jon Ribbens" <jon+usenet@unequivocal.eu> >>wrote:
    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Unfortunately it is easy to insert a button which says it is doing one >>thing but in fact does another. Is this a feasible to trick people
    into downloading executable software to a dangerous place merely by
    doing this?

    Not with any current browser, no. Downloads will always go to the downloads folder (wherever that is configured), and can't be arbitrarily redirected to a different location.

    The issue with drive-by malware isn't usually downloads, though. If the intention is to attack the local machine, then this is more typically done
    by exploiting vulnerabilities in either the browser itself or in plugins added to the browser. But malware doesn't have to be intended to compromise the target machine. Sometimes, all it needs to do is use it. Bitcoin mining Javascript, for example, won't do anything to the target machine other than consume its CPU resources, and will go away when the web page containing it is closed. But it's no less malware for being transient.

    Well, ok, sure. But that's a bit like saying that putting an offensive
    letter through someone's letterbox, and putting petrol and a flame
    through someone's letterbox, are both crimes. It's true but erases
    absolutely enormous differences between the two things.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Roger Hayter on Sat Jan 11 13:31:18 2025
    On 10 Jan 2025 18:52:52 GMT, Roger Hayter <roger@hayter.org> wrote:

    On 10 Jan 2025 at 17:05:54 GMT, "Jon Ribbens" <jon+usenet@unequivocal.eu> >wrote:

    On 2025-01-10, Roger Hayter <roger@hayter.org> wrote:
    On 10 Jan 2025 at 09:11:38 GMT, "Roland Perry" <roland@perry.uk> wrote: >>>> In message <4626346641.5beb4c15@uninhabited.net>, at 18:11:03 on Thu, 9 >>>> Jan 2025, Roger Hayter <roger@hayter.org> remarked:
    Can sites install malware without you volunteering to download anything? >>>>
    On that narrow point, yes. It's called "drive-by malware".

    Then why is that not much more common, given the amount of random clickbait >>> around? Surely it is something browsers could and should prevent?

    It is not in fact possible for web sites to do that, in general.
    If it was then, as you say, it would happen extremely frequently.
    I would imagine most occurrences of such a thing happening are
    either people with very old browsers, or people who are tricked
    into voluntarily installing software.

    Unfortunately it is easy to insert a button which says it is doing one thing >but in fact does another. Is this a feasible to trick people into downloading >executable software to a dangerous place merely by doing this?

    Not with any current browser, no. Downloads will always go to the downloads folder (wherever that is configured), and can't be arbitrarily redirected to
    a different location.

    The issue with drive-by malware isn't usually downloads, though. If the intention is to attack the local machine, then this is more typically done
    by exploiting vulnerabilities in either the browser itself or in plugins
    added to the browser. But malware doesn't have to be intended to compromise
    the target machine. Sometimes, all it needs to do is use it. Bitcoin mining Javascript, for example, won't do anything to the target machine other than consume its CPU resources, and will go away when the web page containing it
    is closed. But it's no less malware for being transient.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roland Perry on Sun Jan 12 12:03:03 2025
    Roland Perry <roland@perry.uk> wrote:
    In message <lucdroF772nU1@mid.individual.net>, at 11:16:08 on Fri, 10
    Jan 2025, Spike <aero.spike@mail.com> remarked:

    Most of the sites I visit don't involve any private information either >>>>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those >>>>> as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    No, because it isn't false that those things are private information.

    “In argumentation theory, an argumentum ad populum (Latin for 'appeal to >> the people') is a fallacious argument which is based on claiming a truth or >> affirming something is good or correct because many people think so.”

    ‘I can find plenty of people who do’ would seem to fulfil the requirements
    of such an argument.

    OK, lots of people think the world is round (not flat). Does that
    qualify?

    A statement that many people believe something is not an argument.

    Asserting that the world is round because many people believe it would be argumentum ad populum.

    This does not shed any light on the discussion about information that some people consider private. I found that too vague and rambling to be of any interest.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Jan 13 13:07:19 2025
    In message <vm0b1n$1501d$1@dont-email.me>, at 12:03:03 on Sun, 12 Jan
    2025, Owen Rees <orees@hotmail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lucdroF772nU1@mid.individual.net>, at 11:16:08 on Fri, 10
    Jan 2025, Spike <aero.spike@mail.com> remarked:

    Most of the sites I visit don't involve any private information either >>>>>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those >>>>>> as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    No, because it isn't false that those things are private information.

    “In argumentation theory, an argumentum ad populum (Latin for 'appeal to >>> the people') is a fallacious argument which is based on claiming a truth or >>> affirming something is good or correct because many people think so.”

    ‘I can find plenty of people who do’ would seem to fulfil the >>>requirements
    of such an argument.

    OK, lots of people think the world is round (not flat). Does that
    qualify?

    A statement that many people believe something is not an argument.

    OK

    Asserting that the world is round because many people believe it would be >argumentum ad populum.

    And as such, automatically bogus?

    This does not shed any light on the discussion about information that some >people consider private. I found that too vague and rambling to be of any >interest.

    I've been working in that field 25yrs and what people do or don't
    consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roland Perry on Mon Jan 13 21:54:13 2025
    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    In message <vm0b1n$1501d$1@dont-email.me>, at 12:03:03 on Sun, 12 Jan
    2025, Owen Rees <orees@hotmail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lucdroF772nU1@mid.individual.net>, at 11:16:08 on Fri, 10
    Jan 2025, Spike <aero.spike@mail.com> remarked:

    Most of the sites I visit don't involve any private information either >>>>>>>> to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those >>>>>>> as "private information", I can find plenty of people who do.

    Isnt that an argumentum ad populem?

    No, because it isn't false that those things are private information. >>>>
    In argumentation theory, an argumentum ad populum (Latin for 'appeal to >>>> the people') is a fallacious argument which is based on claiming a truth or
    affirming something is good or correct because many people think so.

    I can find plenty of people who do would seem to fulfil the >>>>requirements
    of such an argument.

    OK, lots of people think the world is round (not flat). Does that
    qualify?

    A statement that many people believe something is not an argument.

    OK

    Asserting that the world is round because many people believe it would be >>argumentum ad populum.

    And as such, automatically bogus?

    Of course not. A logical fallacy says nothing about the truth of the proposition it is produced to support.


    This does not shed any light on the discussion about information that some >>people consider private. I found that too vague and rambling to be of any >>interest.

    I've been working in that field 25yrs and what people do or don't
    consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25
    years does not impress me whether the field is security or the web.

    I agree that what people consider private varies and also that it is
    likely that most people consider that their browsing history should be
    private.

    There were various participants in the discussion and my comment was
    based on all the comments, not just yours.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From billy bookcase@21:1/5 to Owen Rees on Tue Jan 14 09:47:35 2025
    "Owen Rees" <orees@hotmail.com> wrote in message news:960bojts3ql21b1ja0hpj27j1uop0vrtte@4ax.com...

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't
    consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 years does not impress me whether the field is security or the web.


    Top Trumps !


    bb

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Mark Goodge on Tue Jan 14 18:07:15 2025
    On Tue, 14 Jan 2025 17:57:12 +0000, Mark Goodge wrote:

    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote:

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't >>>consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981. Does that count?

    I was writing software for the ZX81 in 1981 ...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Owen Rees on Tue Jan 14 17:57:12 2025
    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote:

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't
    consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981. Does that count?

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to billy bookcase on Tue Jan 14 20:09:26 2025
    On Tue, 14 Jan 2025 20:06:20 -0000, "billy bookcase" <billy@anon.com> wrote:


    "Mark Goodge" <usenet@listmail.good-stuff.co.uk> wrote in message >news:q79dojlcn5vd5oac6827i8lof1akgb89s6@4ax.com...
    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote:

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote >>>in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't >>>>consider private varies hugely. The only comment I made was about >>>>whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK >>>government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981.

    To part of the UK governmnent ?

    I have no idea who bought it. It's entirely plausible that a government minister might have enjoyed early computer games in their spare time.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From billy bookcase@21:1/5 to Mark Goodge on Tue Jan 14 20:06:20 2025
    "Mark Goodge" <usenet@listmail.good-stuff.co.uk> wrote in message news:q79dojlcn5vd5oac6827i8lof1akgb89s6@4ax.com...
    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote:

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't >>>consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981.

    To part of the UK governmnent ?

    Does that count?

    See above.

    bb


    Mark


    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From billy bookcase@21:1/5 to Mark Goodge on Tue Jan 14 20:25:00 2025
    "Mark Goodge" <usenet@listmail.good-stuff.co.uk> wrote in message news:12hdojp7jnao4n4flhnjiq2oscpghvgf35@4ax.com...
    On Tue, 14 Jan 2025 20:06:20 -0000, "billy bookcase" <billy@anon.com> wrote:


    "Mark Goodge" <usenet@listmail.good-stuff.co.uk> wrote in message >>news:q79dojlcn5vd5oac6827i8lof1akgb89s6@4ax.com...
    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote: >>>
    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote >>>>in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't >>>>>consider private varies hugely. The only comment I made was about >>>>>whether people in general regard their browsing history as private, >>>>>and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK >>>>government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>>>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981.

    To part of the UK governmnent ?

    I have no idea who bought it. It's entirely plausible that a government minister might have enjoyed early computer games in their spare time.


    But that's computer games.

    Some people, believe it or not, had whole computer game franchises
    named after them in the 80's.

    But nothing to do with governments, not at that stage at least.


    bb

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Tim Jackson@21:1/5 to All on Wed Jan 15 00:19:08 2025
    On Tue, 14 Jan 2025 17:57:12 +0000, Mark Goodge wrote...

    I was selling software for the ZX81 in, er 1981. Does that count?

    Mark

    I wrote an extension ROM to the BASIC interpreter of the Acorn Atom
    round about the same time. It sold sufficiently well to give rise to
    the tax problem mentioned in another thread.

    --
    Tim Jackson
    news@timjackson.invalid
    (Change '.invalid' to '.plus.com' to reply direct)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 15 12:00:06 2025
    In message <q79dojlcn5vd5oac6827i8lof1akgb89s6@4ax.com>, at 17:57:12 on
    Tue, 14 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote:

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't >>>consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981. Does that count?

    Not really. I was writing published articles in 1969 (school tech
    magazine) and Nationally in 1973 (Practical Wireless). Not sure when I
    first sold software commercially, but it was probably 1978. However
    software I'd written in 1977 was used internally by ICL from then
    onwards.

    And then there was the country's (possibly the World's) first online
    supplement to a print magazine, where I not only wrote the software, but
    built the computer - Z80 running CP/M clone. 1982. It was possibly the country's first ecommerce site, because you could use it to place orders
    for electronic components etc. But the history is a bit foggy back then,
    and it's possible there was another BBS with a token ecommerce facility.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 15 11:51:34 2025
    In message <960bojts3ql21b1ja0hpj27j1uop0vrtte@4ax.com>, at 21:54:13 on
    Mon, 13 Jan 2025, Owen Rees <orees@hotmail.com> remarked:
    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    In message <vm0b1n$1501d$1@dont-email.me>, at 12:03:03 on Sun, 12 Jan
    2025, Owen Rees <orees@hotmail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lucdroF772nU1@mid.individual.net>, at 11:16:08 on Fri, 10
    Jan 2025, Spike <aero.spike@mail.com> remarked:

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those >>>>>>>> as "private information", I can find plenty of people who do.

    Isn’t that an argumentum ad populem?

    No, because it isn't false that those things are private information. >>>>>
    “In argumentation theory, an argumentum ad populum (Latin for 'appeal to
    the people') is a fallacious argument which is based on claiming a >>>>>truth or
    affirming something is good or correct because many people think so.” >>>>>
    ‘I can find plenty of people who do’ would seem to fulfil the >>>>>requirements
    of such an argument.

    OK, lots of people think the world is round (not flat). Does that
    qualify?

    A statement that many people believe something is not an argument.

    OK

    Asserting that the world is round because many people believe it would be >>>argumentum ad populum.

    And as such, automatically bogus?

    Of course not. A logical fallacy says nothing about the truth of the >proposition it is produced to support.

    Just resembling one of a class of fallacies doesn't mean every example
    is in fact a fallacy. See black crows.

    This does not shed any light on the discussion about information that some >>>people consider private. I found that too vague and rambling to be of any >>>interest.

    I've been working in that field 25yrs and what people do or don't
    consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >years does not impress me whether the field is security or the web.

    I'm sorry 25yrs doesn't impress *you*, but it's a lifetime for many
    people commenting on issues like this. We need to write the history and
    learn from it, and not repeat previous mistakes. Things which happened
    24yrs ago are part of that.

    I agree that what people consider private varies and also that it is
    likely that most people consider that their browsing history should be >private.

    There were various participants in the discussion and my comment was
    based on all the comments, not just yours.

    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Wed Jan 15 14:19:16 2025
    In message <vm6h75$2imaq$1@dont-email.me>, at 20:25:00 on Tue, 14 Jan
    2025, billy bookcase <billy@anon.com> remarked:

    Some people, believe it or not, had whole computer game franchises
    named after them in the 80's.

    Or even just nine games from a much wider catalogue. And one brand new
    one last year!
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to Roland Perry on Wed Jan 15 21:16:55 2025
    On Wed, 15 Jan 2025 12:00:06 +0000, Roland Perry <roland@perry.uk> wrote:

    In message <q79dojlcn5vd5oac6827i8lof1akgb89s6@4ax.com>, at 17:57:12 on
    Tue, 14 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    On Mon, 13 Jan 2025 21:54:13 +0000, Owen Rees <orees@hotmail.com> wrote:

    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote >>>in <wV6XRn+HARhnFAId@perry.uk>:

    I've been working in that field 25yrs and what people do or don't >>>>consider private varies hugely. The only comment I made was about >>>>whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK >>>government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981. Does that count?

    Not really. I was writing published articles in 1969 (school tech
    magazine) and Nationally in 1973 (Practical Wireless). Not sure when I
    first sold software commercially, but it was probably 1978. However
    software I'd written in 1977 was used internally by ICL from then
    onwards.

    My comment was tongue-in-cheek and aimed at Owen, not you. It's fairly
    obvious that someone who is older than me is likely to have been involved in things from before I was. But I think that Owen's point is that willy-waving about length of service isn't directly relevant to the validity of a
    person's argument about things as they are now.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roland Perry on Wed Jan 15 22:05:48 2025
    On Wed, 15 Jan 2025 11:51:34 +0000, Roland Perry <roland@perry.uk> wrote
    in <Gna6drZGF6hnFAca@perry.uk>:

    In message <960bojts3ql21b1ja0hpj27j1uop0vrtte@4ax.com>, at 21:54:13 on
    Mon, 13 Jan 2025, Owen Rees <orees@hotmail.com> remarked:
    On Mon, 13 Jan 2025 13:07:19 +0000, Roland Perry <roland@perry.uk> wrote
    in <wV6XRn+HARhnFAId@perry.uk>:

    In message <vm0b1n$1501d$1@dont-email.me>, at 12:03:03 on Sun, 12 Jan >>>2025, Owen Rees <orees@hotmail.com> remarked:
    Roland Perry <roland@perry.uk> wrote:
    In message <lucdroF772nU1@mid.individual.net>, at 11:16:08 on Fri, 10 >>>>> Jan 2025, Spike <aero.spike@mail.com> remarked:

    Most of the sites I visit don't involve any private information either
    to or from, and it's a nuisance if the browser whinges.

    Only your identity and the fact you visited. If you don't regard those
    as "private information", I can find plenty of people who do.

    Isnt that an argumentum ad populem?

    No, because it isn't false that those things are private information. >>>>>>
    In argumentation theory, an argumentum ad populum (Latin for 'appeal to >>>>>> the people') is a fallacious argument which is based on claiming a >>>>>>truth or
    affirming something is good or correct because many people think so. >>>>>>
    I can find plenty of people who do would seem to fulfil the >>>>>>requirements
    of such an argument.

    OK, lots of people think the world is round (not flat). Does that
    qualify?

    A statement that many people believe something is not an argument.

    OK

    Asserting that the world is round because many people believe it would be >>>>argumentum ad populum.

    And as such, automatically bogus?

    Of course not. A logical fallacy says nothing about the truth of the >>proposition it is produced to support.

    Just resembling one of a class of fallacies doesn't mean every example
    is in fact a fallacy. See black crows.

    Have you now switched to referring to your earlier "Only your identity
    and the fact you visited. If you don't regard those as "private
    information", I can find plenty of people who do."?

    I can see several ways to resolve the ambiguity in that remark.

    1) Plenty of people believe that their identity and the fact that they
    visited a site is private information.

    That is a proposition where people could argue whether or not it is true
    but it does not involve a logical fallacy. I consider it to be true and
    taking it to be true we could follow the consequences.

    2) A person's identity and the fact that they visited a site is private information because plenty of people believe that that is private
    information.

    That could be argumentum ad populum but it is a bit of a grey area
    because of the lack of quantifiers. Inserting 'always', 'sometimes' or
    'never' in the appropriate places shifts the meaning around. If you
    replace the first 'is' with "must be treated as" then you are much
    better placed to do the right thing and the issue of logical fallacies
    no longer arises.

    By "black crows" I suspect that you are referring to Hempel's Paradox
    although it seems that in the original form it was about ravens. Perhaps
    you can explain its relevance to this discussion.

    I just dug out my copy of "The Mathematics of Inheritance Systems" by
    Touretzky to refresh my memory of Clyde the royal elephant and Stretch
    the flying ostrich. It is about knowledge representation and how we can
    handle exceptions.


    This does not shed any light on the discussion about information that some >>>>people consider private. I found that too vague and rambling to be of any >>>>interest.

    I've been working in that field 25yrs and what people do or don't >>>consider private varies hugely. The only comment I made was about
    whether people in general regard their browsing history as private,
    and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK
    government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>years does not impress me whether the field is security or the web.

    I'm sorry 25yrs doesn't impress *you*, but it's a lifetime for many
    people commenting on issues like this. We need to write the history and
    learn from it, and not repeat previous mistakes. Things which happened
    24yrs ago are part of that.

    "Progress, far from consisting in change, depends on retentiveness. When
    change is absolute there remains no being to improve and no direction is
    set for possible improvement: and when experience is not retained, as
    among savages, infancy is perpetual. Those who cannot remember the past
    are condemned to repeat it."

    Yes we need to retain the history and learn from it.

    I have also dug out a book I inherited from my father. First published
    in 1930, I have the 1956 reprint of the 1953 revised edition. Its
    appendix 1 describes itself as "a list which can be conveniently used
    for detecting dishonest modes of thought which we shall actually meet in arguments and speeches".


    I agree that what people consider private varies and also that it is
    likely that most people consider that their browsing history should be >>private.

    There were various participants in the discussion and my comment was
    based on all the comments, not just yours.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Thu Jan 16 12:32:54 2025
    In message <079gojl4l1q7u4a8u5f58h27hjo169uodv@4ax.com>, at 21:16:55 on
    Wed, 15 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    I've been working in that field 25yrs and what people do or don't >>>>>consider private varies hugely. The only comment I made was about >>>>>whether people in general regard their browsing history as private, >>>>>and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK >>>>government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>>>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981. Does that count?

    Not really. I was writing published articles in 1969 (school tech
    magazine) and Nationally in 1973 (Practical Wireless). Not sure when I >>first sold software commercially, but it was probably 1978. However >>software I'd written in 1977 was used internally by ICL from then
    onwards.

    My comment was tongue-in-cheek and aimed at Owen, not you. It's fairly >obvious that someone who is older than me is likely to have been involved in >things from before I was. But I think that Owen's point is that willy-waving >about length of service isn't directly relevant to the validity of a
    person's argument about things as they are now.

    OK, if that 25yrs was between 1960 and 1985, but mine is 1999-2024.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Thu Jan 16 12:34:20 2025
    In message <826goj907augl6d0nlkd729di38k3jmcav@4ax.com>, at 22:05:48 on
    Wed, 15 Jan 2025, Owen Rees <orees@hotmail.com> remarked:
    Asserting that the world is round because many people believe it would be >>>>>argumentum ad populum.

    And as such, automatically bogus?

    Of course not. A logical fallacy says nothing about the truth of the >>>proposition it is produced to support.

    Just resembling one of a class of fallacies doesn't mean every example
    is in fact a fallacy. See black crows.

    Have you now switched to referring to your earlier "Only your identity
    and the fact you visited. If you don't regard those as "private
    information", I can find plenty of people who do."?

    I haven't switched anything.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to Roland Perry on Thu Jan 16 21:52:59 2025
    On Thu, 16 Jan 2025 12:32:54 +0000, Roland Perry <roland@perry.uk> wrote
    in <dYlMiUz2xPinFAVt@perry.uk>:

    In message <079gojl4l1q7u4a8u5f58h27hjo169uodv@4ax.com>, at 21:16:55 on
    Wed, 15 Jan 2025, Mark Goodge <usenet@listmail.good-stuff.co.uk>
    remarked:
    I've been working in that field 25yrs and what people do or don't >>>>>>consider private varies hugely. The only comment I made was about >>>>>>whether people in general regard their browsing history as private, >>>>>>and I feel quite strongly that the majority do.

    I was doing computer security consulting work for part of the UK >>>>>government in 1985. I was also on the W3C Advisory Committee in 1996. 25 >>>>>years does not impress me whether the field is security or the web.

    I was selling software for the ZX81 in, er 1981. Does that count?

    Not really. I was writing published articles in 1969 (school tech >>>magazine) and Nationally in 1973 (Practical Wireless). Not sure when I >>>first sold software commercially, but it was probably 1978. However >>>software I'd written in 1977 was used internally by ICL from then >>>onwards.

    My comment was tongue-in-cheek and aimed at Owen, not you. It's fairly >>obvious that someone who is older than me is likely to have been involved in >>things from before I was. But I think that Owen's point is that willy-waving >>about length of service isn't directly relevant to the validity of a >>person's argument about things as they are now.

    That is a fair summary.

    Length of service is a very poor measure of expertise and understanding.


    OK, if that 25yrs was between 1960 and 1985, but mine is 1999-2024.

    If that is how you measure the value of people's opinions then you
    should defer to my 1985-2025. That is just for computer security. If you
    want to include writing software intended to be used by customers then
    you can go back to 1973.

    Going back to what Mark wrote, none of that is directly relevant to the validity of any argument.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Owen Rees on Fri Jan 17 10:35:10 2025
    On Thu, 16 Jan 2025 21:52:59 +0000, Owen Rees wrote:

    Length of service is a very poor measure of expertise and understanding.

    Not in the real world where employers "require" x-years experience.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Owen Rees@21:1/5 to jethro_uk@hotmailbin.com on Fri Jan 17 13:27:28 2025
    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    On Thu, 16 Jan 2025 21:52:59 +0000, Owen Rees wrote:

    Length of service is a very poor measure of expertise and understanding.

    Not in the real world where employers "require" x-years experience.

    Have you never heard the stories of employers asking for 5 years experience
    of a technology invented last year?

    Filtering out the fast learners is not a smart idea either.

    A measure being in use does not necessarily make it a good measure.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Owen Rees on Fri Jan 17 15:26:46 2025
    On Fri, 17 Jan 2025 13:27:28 +0000, Owen Rees wrote:

    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    On Thu, 16 Jan 2025 21:52:59 +0000, Owen Rees wrote:

    Length of service is a very poor measure of expertise and
    understanding.

    Not in the real world where employers "require" x-years experience.

    Have you never heard the stories of employers asking for 5 years
    experience of a technology invented last year?

    I have encountered recruitment agencies, yes

    Filtering out the fast learners is not a smart idea either.

    A measure being in use does not necessarily make it a good measure.

    Quite. It's a variation of "if the only tool you have is a hammer, then
    every problem looks like a nail" truism.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Owen Rees on Fri Jan 17 15:27:32 2025
    On Fri, 17 Jan 2025 13:27:28 +0000, Owen Rees wrote:

    Jethro_uk <jethro_uk@hotmailbin.com> wrote:
    On Thu, 16 Jan 2025 21:52:59 +0000, Owen Rees wrote:

    Length of service is a very poor measure of expertise and
    understanding.

    Not in the real world where employers "require" x-years experience.

    Have you never heard the stories of employers asking for 5 years
    experience of a technology invented last year?

    Filtering out the fast learners is not a smart idea either.

    A measure being in use does not necessarily make it a good measure.

    "Best cheese shop for miles, sir !"
    "How pray tell was that decided ?"
    "Very clean sir ...."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)