Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"If that makes any sense to you, you have a big problem." -- C. Durance, Computer Science 234


computers / alt.privacy.anon-server / Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

SubjectAuthor
* Glassdoor meltdown as users urged to flee site after posters' real names added wNomen Nescio
+- Re: Glassdoor meltdown as users urged to flee site after posters' real names addD
+* Re: Glassdoor meltdown as users urged to flee site after posters' real names addAlan Browne
|+* Re: Glassdoor meltdown as users urged to flee site after posters' real names addStainless Steel Rat
||`- Re: Glassdoor meltdown as users urged to flee site after posters' real names addNomen Nescio
|+* Re: Glassdoor meltdown as users urged to flee site after posters' real names addmicky
||+- Re: Glassdoor meltdown as users urged to flee site after posters' real names addYamn Remailer
||`* Re: Glassdoor meltdown as users urged to flee site after posters' real names addkelown
|| `* Re: Glassdoor meltdown as users urged to flee site after posters' real names addmicky
||  `- Re: Glassdoor meltdown as users urged to flee site after posters' real names addmicky
|`- Re: Glassdoor meltdown as users urged to flee site after posters' real names addNomen Nescio
`* Re: Glassdoor meltdown as users urged to flee site after posters' real names addanon
 `- Re: Glassdoor meltdown as users urged to flee site after posters' real names addNomen Nescio

1
Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17280&group=alt.privacy.anon-server#17280

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
From: nob...@dizum.com (Nomen Nescio)
Subject: Glassdoor meltdown as users urged to flee site after posters' real
names added without permission
Message-ID: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
Date: Wed, 20 Mar 2024 21:07:02 +0100 (CET)
Newsgroups: alt.comp.os.windows-10, alt.privacy, alt.privacy.anon-server,
comp.mobile.android, misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Wed, 20 Mar 2024 20:07 UTC

Glassdoor, the website that allows workers to anonymously complain about
their workplaces without fear of retribution, is reportedly revealing
staffers� real names in their profiles � prompting a viral backlash over
fears that their identities could be exposed.

The shift began last July when the site added social features integrated
from Fishbowl, an app for work-related discussions that Glassdoor�s parent
company, Recruit, acquired in 2021.

Signing up for an account on Glassdoor required workers to reveal their
full name, job title and employer � a departure from its previous practice
of just requiring email addresses but no names, according to Wired.

https://nypost.com/2024/03/20/business/glassdoor-users-urged-to-flee-site-
after-real-names-added/

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<50e0b9747adb1bb0bcebd7647b814370@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17282&group=alt.privacy.anon-server#17282

  copy link   Newsgroups: alt.privacy.anon-server
Newsgroups: alt.privacy.anon-server
Sender: Nomen Nescio <nobody@dizum.com>
Injection-Info: neodome.net;
posting-account="mail2news";
key="DbiR2SJVpBXa1ByIcVuXN1q0Hwm2T9QESlQuJpUNeMN4NM/r7qdXfC65z1rqh7BBxEtMtk
bJt61cR6IT8P6XX8TTXmO/kcrYBczlt2sIgqvKa3MzROukaRHvZpHgdaRANQ7flWI5M7MfV03ZR
Hoei5rS2DLImgR/jOINd6Bmv6aTAqmPru5VBynbmyymJFF5ZkffhvcjOGHEbeHTAJp1C4gtuHyg
RoQurd9m4jyHXGOkLp8tQwvsUsfPKLlZAhSeva2SyRRQo0Ma5XPLpbhGw/2F71DD+q3rRLfdHVn
QdnhDCS1AhhQNuc8rm8q8bY9Jmfb/FLI9Mo8hWMniQKPmvg==";
data="U2FsdGVkX19xL86gm/vMfWblVDeKgzoTGK64IxIAkTu6f3M+CNEViRAMK0INcfy8MHiAd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==";
mail-complaints-to="abuse@neodome.net"
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@dizum.com>.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 20 Mar 2024 20:55:01 +0000 (UTC)
Path: i2pn2.org!rocksolid2!news.neodome.net!mail2news
Subject: Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission
Date: Wed, 20 Mar 2024 21:52:14 +0100 (CET)
Message-ID: <50e0b9747adb1bb0bcebd7647b814370@dizum.com>
From: J...@M (D)
 by: D - Wed, 20 Mar 2024 20:52 UTC

On Wed, 20 Mar 2024 21:07:02 +0100 (CET), Nomen Nescio <nobody@dizum.com> wrote:
>Glassdoor, the website that allows workers to anonymously complain about
>their workplaces without fear of retribution, is reportedly revealing
>staffers' real names in their profiles -- prompting a viral backlash over
>fears that their identities could be exposed.
>The shift began last July when the site added social features integrated
>from Fishbowl, an app for work-related discussions that Glassdoor's parent
>company, Recruit, acquired in 2021.
>Signing up for an account on Glassdoor required workers to reveal their
>full name, job title and employer -- a departure from its previous practice
>of just requiring email addresses but no names, according to Wired.
>https://nypost.com/2024/03/20/business/glassdoor-users-urged-to-flee-site-
>after-real-names-added/

so much for "anonymously" ... careful use of tor browser w/bridges might
be useful in other cases, notably the "captcha" described below actually
worked using only current tor browser to obtain a webtunnel bridge line...

(using Tor Browser 13.0.12)
https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
>Hiding in plain sight: Introducing WebTunnel
>by shelikhoo, ggus | March 12, 2024
>Today, March 12th, on the World Day Against Cyber Censorship, the Tor Project's
>Anti-Censorship Team is excited to officially announce the release of WebTunnel,
>a new type of Tor bridge designed to assist users in heavily censored regions
>to connect to the Tor network. Available now in the stable version of Tor
>Browser, WebTunnel joined our collection of censorship circumvention tech
>developed and maintained by The Tor Project.
>The development of different types of bridges are crucial for making Tor more
>resilient against censorship and stay ahead of adversaries in the highly dynamic
>and ever-changing censorship landscape. This is especially true as we're going
>through the 2024 global election megacycle, the role of censorship circumvention
>tech becomes crucial in defending Internet Freedom.
>If you've ever considered becoming a Tor bridge operator to help others connect
>to Tor, now is an excellent time to get started! You can find the requirements
>and instructions for running a WebTunnel bridge in the Tor Community portal.
>What is WebTunnel and how does it work?
>WebTunnel is a censorship-resistant pluggable transport designed to mimic
>encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the
>payload connection into a WebSocket-like HTTPS connection, appearing to network
>observers as an ordinary HTTPS (WebSocket) connection. So, for an onlooker
>without the knowledge of the hidden path, it just looks like a regular HTTP
>connection to a webpage server giving the impression that the user is simply
>browsing the web.
>In fact, WebTunnel is so similar to ordinary web traffic that it can coexist
>with a website on the same network endpoint, meaning the same domain, IP
>address, and port. This coexistence allows a standard traffic reverse proxy to
>forward both ordinary web traffic and WebTunnel to their respective application
>servers. As a result, when someone attempts to visit the website at the shared
>network address, they will simply perceive the content of that website address
>and won't notice the existence of a secret bridge (WebTunnel).
>Comparing WebTunnel to obfs4 bridges
>WebTunnel can be used as an alternative to obfs4 for most Tor Browser users.
>While obfs4 and other fully encrypted traffic aim to be entirely distinct and
>unrecognizable, WebTunnel's approach to mimicking known and typical web traffic
>makes it more effective in scenarios where there is a protocol allow list and a
>deny-by-default network environment.
>Consider a network traffic censorship mechanism as a coin sorting machine, with
>coins representing the flowing traffic. Traditionally, such a machine checks if
>the coin fits a known shape and allows it to pass if it does or discards it if
>it does not. In the case of fully encrypted, unknown traffic, as demonstrated in
>the published research How the Great Firewall of China Detects and Blocks Fully
>Encrypted Traffic, which doesn't conform to any specific shape, it would be
>subject to censorship. In our coin analogy, not only must the coin not fit the
>shape of any known blocked protocol, it also needs to fit a recognized allowed
>shape--otherwise, it would be dropped. Obfs4 traffic, being neither a match for
>any known allowed protocol nor a text protocol, would be rejected. In contrast,
>WebTunnel traffic resembling HTTPS traffic, a permitted protocol, will pass.
>If you want to learn more about bridges, different designs and how they work,
>check out our video series.
>How to use a WebTunnel Bridge?
>Step 1 - Getting a WebTunnel bridge
>At the moment, WebTunnel bridges are only distributed via the Tor Project
>bridges website. We plan to include more distributor methods like Telegram and
>moat.
> 1. Using your regular web browser, visit the website:
> https://bridges.torproject.org/options
> 2. In "Advanced Options", select "webtunnel" from the dropdown menu, and click
> on "Get Bridges".
> 3. Solve the captcha.
> 4. Copy the bridge line.
>Step 2 - Download and install Tor Browser for Desktop
>Note: WebTunnel bridges will not work on old versions of Tor Browser (12.5.x).
> 1. Download and install the latest version of Tor Browser for Desktop.
> 2. Open Tor Browser and go to the Connection preferences window (or click on
> "Configure Connection").
> 3. Click on "Add a Bridge Manually" and add the bridge lines provided on Step 1.
> 4. Close the bridge dialog and click on "Connect."
> 5. Note any issues or unexpected behavior while using WebTunnel.
>Or Download and install Tor Browser for Android
> 1. Download and install the latest version of Tor Browser for Android.
> 2. Run Tor Browser and choose the option to configure a bridge.
> 3. Select "Provide a Bridge I know" and enter the provided bridge addresses.
> 4. Tap "OK" and, if everything works well, it will connect.
>Step 3 - Share feedback with us
>Your feedback is crucial to help us identify any issues and ensuring the
>reliability of WebTunnel bridges. For users living in censored regions, we would
>love to hear how this new bridge's performance compares to other circumvention
>methods such as obfs4 and Snowflake.
>Thank you to all the volunteers who have contributed to making WebTunnel possible
>The more tools we have at our disposal, the better we will be able to target our
>response, keeping censors at bay and enabling millions of users to access the
>free and open internet. We first announced this new bridge type in October 2023
>with a call for testers asking Tor users for whom it was safe to use WebTunnel
>to provide feedback. So many of you sprung into action and we received a lot of
>feedback, both public and private, that allowed us to make numerous stability
>improvements to WebTunnel.
>Right now, there are 60 WebTunnel bridges hosted all over the world, and more
>than 700 daily active users using WebTunnel on different platforms. However,
>while WebTunnel works in regions like China and Russia, it does not currently
>work in some regions in Iran.
>Our goal is to ensure that Tor works for everyone. Amid geopolitical conflicts
>that put millions of people at risk, the internet has become crucial for us to
>communicate, to witness and share what is happening around the world, to
>organize, to defend human rights, and to build solidarity. That is why our
>community's volunteer contributions are vital. Remember, there are many ways
>to get engaged: You can run more bridges, Snowflake proxies and relays to
>continue our fight against censorship and for free and open access to the
>unrestricted internet.
[end quote]

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<ZS3LN.140603$hN14.40694@fx17.iad>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17303&group=alt.privacy.anon-server#17303

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!npeer.as286.net!npeer-ng0.as286.net!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx17.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Content-Language: en-US
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
From: bitbuc...@blackhole.com (Alan Browne)
In-Reply-To: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 13
Message-ID: <ZS3LN.140603$hN14.40694@fx17.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Fri, 22 Mar 2024 00:00:57 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Thu, 21 Mar 2024 20:00:57 -0400
X-Received-Bytes: 1436
 by: Alan Browne - Fri, 22 Mar 2024 00:00 UTC

On 2024-03-20 16:07, Nomen Nescio wrote:
>
> Signing up for an account on Glassdoor required workers to reveal their
> full name, job title and employer — a departure from its previous practice
> of just requiring email addresses but no names, according to Wired.

Why I use fake names, date of birth, anonymized e-mail addresses ...
(I've never posted on Glassdoor, however).

--
“Markets can remain irrational longer than you can remain solvent.”
- John Maynard Keynes.

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<971158e7b019866208e33a63d4fe83ed@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17306&group=alt.privacy.anon-server#17306

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
From: inva...@anon.com (anon)
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Message-ID: <971158e7b019866208e33a63d4fe83ed@dizum.com>
Date: Fri, 22 Mar 2024 05:26:38 +0100 (CET)
Newsgroups: alt.comp.os.windows-10, alt.privacy, alt.privacy.anon-server,
comp.mobile.android, misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: anon - Fri, 22 Mar 2024 04:26 UTC

Nomen Nescio <nobody@dizum.com> wrote in
news:2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com:

> Glassdoor, the website that allows workers to anonymously complain
> about their workplaces without fear of retribution, is reportedly
> revealing staffers� real names in their profiles � prompting a viral
> backlash over fears that their identities could be exposed.
>
> The shift began last July when the site added social features
> integrated from Fishbowl, an app for work-related discussions that
> Glassdoor�s parent company, Recruit, acquired in 2021.
>
> Signing up for an account on Glassdoor required workers to reveal
> their full name, job title and employer � a departure from its
> previous practice of just requiring email addresses but no names,
> according to Wired.
>
> https://nypost.com/2024/03/20/business/glassdoor-users-urged-to-flee-si
> te- after-real-names-added/

Obviously they want to sell revenge information to corporations.

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<20240330135052.438D51200C2@fleegle.mixmin.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17368&group=alt.privacy.anon-server#17368

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
<ZS3LN.140603$hN14.40694@fx17.iad>
Message-Id: <20240330135052.438D51200C2@fleegle.mixmin.net>
Date: Sat, 30 Mar 2024 13:50:52 +0000 (GMT)
Newsgroups: alt.comp.os.windows-10, alt.privacy, alt.privacy.anon-server,
comp.mobile.android, misc.phone.mobile.iphone
Author-Supplied-Address: ssr<AT>nym<DOT>mixmin<DOT>net
From: Use-Auth...@[127.1] (Stainless Steel Rat)
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Stainless Steel Rat - Sat, 30 Mar 2024 13:50 UTC

On Thu, 21 Mar 2024 20:00:57 -0400, Alan Browne <bitbucket@blackhole.com>
wrote:

> On 2024-03-20 16:07, Nomen Nescio wrote:
> >
> > Signing up for an account on Glassdoor required workers to reveal their
> > full name, job title and employer — a departure from its previous
> > practice
> > of just requiring email addresses but no names, according to Wired.
>
> Why I use fake names, date of birth, anonymized e-mail addresses ... (I've
> never posted on Glassdoor, however).

Same here. Once you hand-over your personal information, you lose control of
it, and you *never* get it back. Privacy policies aren't worth the paper
they're (not) written on.

Stainless Steel Rat

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17456&group=alt.privacy.anon-server#17456

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!feeder.cambriumusenet.nl!feed.tweaknews.nl!posting.tweaknews.nl!fx09.ams1.POSTED!not-for-mail
From: NONONOmi...@fmguy.com (micky)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission
Message-ID: <3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com> <ZS3LN.140603$hN14.40694@fx17.iad>
X-Newsreader: Forte Agent 5.00/32.1171
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Antivirus: AVG (VPS 240414-0, 4/13/2024), Outbound message
X-Antivirus-Status: Clean
Lines: 19
X-Complaints-To: abuse@tweaknews.nl
NNTP-Posting-Date: Sun, 14 Apr 2024 16:19:42 UTC
Organization: Tweaknews
Date: Sun, 14 Apr 2024 12:18:56 -0400
X-Received-Bytes: 1691
 by: micky - Sun, 14 Apr 2024 16:18 UTC

In alt.comp.os.windows-10, on Thu, 21 Mar 2024 20:00:57 -0400, Alan
Browne <bitbucket@blackhole.com> wrote:

>On 2024-03-20 16:07, Nomen Nescio wrote:
>>
>> Signing up for an account on Glassdoor required workers to reveal their
>> full name, job title and employer — a departure from its previous practice
>> of just requiring email addresses but no names, according to Wired.

Seems like this opens them up to an enormous lawsuit for lost wages,
health insurance, from up to hundreds of people.
>
>Why I use fake names, date of birth, anonymized e-mail addresses ...

Me too.

>(I've never posted on Glassdoor, however).

Me neither. I'm hoping to get a job someday.

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<20240415.041505.eaf5ac78@erienetworks.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17457&group=alt.privacy.anon-server#17457

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
DKIM-Filter: OpenDKIM Filter v2.11.0 sept-huit.erienetworks.net 3039D40212
Content-Transfer-Encoding: 8bit
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Date: Mon, 15 Apr 2024 04:15:05 -0400
From: remai...@domain.invalid (Yamn Remailer)
Message-Id: <20240415.041505.eaf5ac78@erienetworks.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Mime-Version: 1.0
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
<ZS3LN.140603$hN14.40694@fx17.iad>
<3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com>
Newsgroups: alt.comp.os.windows-10, alt.privacy, alt.privacy.anon-server,
comp.mobile.android, misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Yamn Remailer - Mon, 15 Apr 2024 08:15 UTC

On Sun 14 Apr 2024 7:18 pm, micky wrote:
> Signing up for an account on Glassdoor required workers to reveal their
> full name, job title and employer —
and then pull down their pants, bend over, and spread their cheeks. And
the majority morons comply gladly. Attention citizens: It is safe and
effective!

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<uviuv5$7mk9$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17459&group=alt.privacy.anon-server#17459

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: kel...@privacy.invalid (kelown)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Date: Mon, 15 Apr 2024 05:19:14 -0500
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <uviuv5$7mk9$1@dont-email.me>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
<ZS3LN.140603$hN14.40694@fx17.iad>
<3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 15 Apr 2024 12:19:17 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="da50e1a8f0a5f1942c066e14a8c285b2";
logging-data="252553"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/YRThfmjheFXIY6v1/bTp2"
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:5.0) Aura/20220509
Interlink/52.9.8165
Cancel-Lock: sha1:ZXrWmM52GZacxhALqmlNinAWKwA=
In-Reply-To: <3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com>
Content-Language: en-US
 by: kelown - Mon, 15 Apr 2024 10:19 UTC

>>> Signing up for an account on Glassdoor required workers to reveal their
>>> full name, job title and employer — a departure from its previous practice
>>> of just requiring email addresses but no names, according to Wired.
>
> Seems like this opens them up to an enormous lawsuit for lost wages,
> health insurance, from up to hundreds of people.
>>
>> Why I use fake names, date of birth, anonymized e-mail addresses ...

If Glassdoor is asking for a full name and employer name during
registration (for NEW accounts), why would there be a lawsuit if it's
revealed? How could it be "without permission" if the registrant gave
them the info?

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<h5kr1jhq7ovcqs16t7scl2n9vc50lv1ud0@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17467&group=alt.privacy.anon-server#17467

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder6.news.weretis.net!border-1.nntp.ord.giganews.com!nntp.giganews.com!npeer.as286.net!npeer-ng0.as286.net!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!feeder.cambriumusenet.nl!feed.tweaknews.nl!posting.tweaknews.nl!fx03.ams1.POSTED!not-for-mail
From: NONONOmi...@fmguy.com (micky)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission
Message-ID: <h5kr1jhq7ovcqs16t7scl2n9vc50lv1ud0@4ax.com>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com> <ZS3LN.140603$hN14.40694@fx17.iad> <3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com> <uviuv5$7mk9$1@dont-email.me>
X-Newsreader: Forte Agent 5.00/32.1171
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Antivirus: AVG (VPS 240415-4, 4/15/2024), Outbound message
X-Antivirus-Status: Clean
Lines: 24
X-Complaints-To: abuse@tweaknews.nl
NNTP-Posting-Date: Tue, 16 Apr 2024 01:18:53 UTC
Organization: Tweaknews
Date: Mon, 15 Apr 2024 21:18:06 -0400
X-Received-Bytes: 2136
X-Original-Bytes: 2020
 by: micky - Tue, 16 Apr 2024 01:18 UTC

In comp.mobile.android, on Mon, 15 Apr 2024 05:19:14 -0500, kelown
<kelown@privacy.invalid> wrote:

>
>>>> Signing up for an account on Glassdoor required workers to reveal their
>>>> full name, job title and employer — a departure from its previous practice
>>>> of just requiring email addresses but no names, according to Wired.
>>
>> Seems like this opens them up to an enormous lawsuit for lost wages,
>> health insurance, from up to hundreds of people.
>>>
>>> Why I use fake names, date of birth, anonymized e-mail addresses ...
>
>If Glassdoor is asking for a full name and employer name during
>registration (for NEW accounts), why would there be a lawsuit if it's
>revealed? How could it be "without permission" if the registrant gave
>them the info?

Seriously? If the webpage said, "This info is only for our own records
and will not be revealed"*, then when the webpage says that and the user
signs up, a unilateral contract is created and the owners and staff of
the webpage have to live by what they said on the webpage.

**Often it will include, "except in response to a valid subpoena".

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<061s1jl3nii26csehv9i3gjj7fh9nfh7in@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17470&group=alt.privacy.anon-server#17470

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!npeer.as286.net!npeer-ng0.as286.net!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!feeder.cambriumusenet.nl!feed.tweaknews.nl!posting.tweaknews.nl!fx07.ams1.POSTED!not-for-mail
From: NONONOmi...@fmguy.com (micky)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission
Message-ID: <061s1jl3nii26csehv9i3gjj7fh9nfh7in@4ax.com>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com> <ZS3LN.140603$hN14.40694@fx17.iad> <3d0o1jdmbs0lsb3hrcs5kglk67hni4tb4v@4ax.com> <uviuv5$7mk9$1@dont-email.me> <h5kr1jhq7ovcqs16t7scl2n9vc50lv1ud0@4ax.com>
X-Newsreader: Forte Agent 5.00/32.1171
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Antivirus: AVG (VPS 240416-0, 4/15/2024), Outbound message
X-Antivirus-Status: Clean
Lines: 55
X-Complaints-To: abuse@tweaknews.nl
NNTP-Posting-Date: Tue, 16 Apr 2024 05:04:06 UTC
Organization: Tweaknews
Date: Tue, 16 Apr 2024 01:03:19 -0400
X-Received-Bytes: 3598
 by: micky - Tue, 16 Apr 2024 05:03 UTC

In comp.mobile.android, on Mon, 15 Apr 2024 21:18:06 -0400, micky
<NONONOmisc07@fmguy.com> wrote:

>In comp.mobile.android, on Mon, 15 Apr 2024 05:19:14 -0500, kelown
><kelown@privacy.invalid> wrote:
>
>>
>>>>> Signing up for an account on Glassdoor required workers to reveal their
>>>>> full name, job title and employer — a departure from its previous practice
>>>>> of just requiring email addresses but no names, according to Wired.
>>>
>>> Seems like this opens them up to an enormous lawsuit for lost wages,
>>> health insurance, from up to hundreds of people.
>>>>
>>>> Why I use fake names, date of birth, anonymized e-mail addresses ...
>>
>>If Glassdoor is asking for a full name and employer name during
>>registration (for NEW accounts), why would there be a lawsuit if it's
>>revealed? How could it be "without permission" if the registrant gave
>>them the info?
>
>Seriously? If the webpage said, "This info is only for our own records
>and will not be revealed"*, then when the webpage says that and the user
>signs up, a unilateral contract is created and the owners and staff of
>the webpage have to live by what they said on the webpage.
>
>**Often it will include, "except in response to a valid subpoena".

I was looking at the Freedom Boat Club, and this what it says its
privacy policy includes:

Exceptions: HOWEVER, Brunswick may also share information with other
third parties for the following purposes ONLY:

To comply with applicable law or legal process (including to law
enforcement authorities or other governmental officials)
When necessary to protect the vital interests of a person (including
to prevent physical harm, financial loss, and compliance with an
investigation of legal/ethical activity)
To enforce Brunswick policy and prevent fraud
To protect our property, services, and legal rights
In connection with a corporate merger, consolidation, restructuring,
sale, or other corporate change
https://www.brunswick.com/privacy-policy

This is pretty vague, and many other privacy policies are stronger than
this, but even this doesn't say they will release names because they've
changed their mind. Still, "to enforce Brunswick policy" is really
vague and non-comittal.

And previously it said "BRUNSWICK DOES NOT SELL PERSONAL INFORMATION". I
think that too is vague, ambiguous, or downright non-committal, because
it doesn't say they will never sell it.

I should go check out what glassdoor has promised. Or you could.

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<uvl4pa$vm3$4@toxic.dizum.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17474&group=alt.privacy.anon-server#17474

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!weretis.net!feeder8.news.weretis.net!sewer!.POSTED.localhost!not-for-mail
From: nob...@dizum.com (Nomen Nescio)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Date: Mon, 15 Apr 2024 23:10:53 -0700
Organization: dizum.com - The Internet Problem Provider
Message-ID: <uvl4pa$vm3$4@toxic.dizum.net>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
<ZS3LN.140603$hN14.40694@fx17.iad>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 16 Apr 2024 06:10:50 -0000 (UTC)
Injection-Info: toxic.dizum.net; posting-host="localhost:127.0.0.1";
logging-data="32451"; mail-complaints-to="abuse@dizum.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <ZS3LN.140603$hN14.40694@fx17.iad>
 by: Nomen Nescio - Tue, 16 Apr 2024 06:10 UTC

On 3/21/2024 5:00 PM, Alan Browne wrote:
> On 2024-03-20 16:07, Nomen Nescio wrote:
>>
>> Signing up for an account on Glassdoor required workers to reveal their
>> full name, job title and employer — a departure from its previous
>> practice
>> of just requiring email addresses but no names, according to Wired.
>
> Why I use fake names, date of birth, anonymized e-mail addresses ...
> (I've never posted on Glassdoor, however).
>

Hate your job, no current other prospects, addicted to paycheck.

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<uvl4ut$vm3$5@toxic.dizum.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17475&group=alt.privacy.anon-server#17475

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!sewer!.POSTED.localhost!not-for-mail
From: nob...@dizum.com (Nomen Nescio)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Date: Mon, 15 Apr 2024 23:13:52 -0700
Organization: dizum.com - The Internet Problem Provider
Message-ID: <uvl4ut$vm3$5@toxic.dizum.net>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
<ZS3LN.140603$hN14.40694@fx17.iad>
<20240330135052.438D51200C2@fleegle.mixmin.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 16 Apr 2024 06:13:49 -0000 (UTC)
Injection-Info: toxic.dizum.net; posting-host="localhost:127.0.0.1";
logging-data="32451"; mail-complaints-to="abuse@dizum.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <20240330135052.438D51200C2@fleegle.mixmin.net>
 by: Nomen Nescio - Tue, 16 Apr 2024 06:13 UTC

On 3/30/2024 6:50 AM, Stainless Steel Rat wrote:
> On Thu, 21 Mar 2024 20:00:57 -0400, Alan Browne <bitbucket@blackhole.com>
> wrote:
>
>> On 2024-03-20 16:07, Nomen Nescio wrote:
>>>
>>> Signing up for an account on Glassdoor required workers to reveal their
>>> full name, job title and employer — a departure from its previous
>>> practice
>>> of just requiring email addresses but no names, according to Wired.
>>
>> Why I use fake names, date of birth, anonymized e-mail addresses ... (I've
>> never posted on Glassdoor, however).
>
> Same here. Once you hand-over your personal information, you lose control of
> it, and you *never* get it back. Privacy policies aren't worth the paper
> they're (not) written on.
>
> Stainless Steel Rat

Exactly. A lot of chicks found that out when they sent pics that turned
up on the Internet later. Glassdoor no different.

Re: Glassdoor meltdown as users urged to flee site after posters' real names added without permission

<uvl522$vm3$6@toxic.dizum.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=17476&group=alt.privacy.anon-server#17476

  copy link   Newsgroups: alt.comp.os.windows-10 alt.privacy alt.privacy.anon-server comp.mobile.android misc.phone.mobile.iphone
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!sewer!.POSTED.localhost!not-for-mail
From: nob...@dizum.com (Nomen Nescio)
Newsgroups: alt.comp.os.windows-10,alt.privacy,alt.privacy.anon-server,comp.mobile.android,misc.phone.mobile.iphone
Subject: Re: Glassdoor meltdown as users urged to flee site after posters'
real names added without permission
Date: Mon, 15 Apr 2024 23:15:34 -0700
Organization: dizum.com - The Internet Problem Provider
Message-ID: <uvl522$vm3$6@toxic.dizum.net>
References: <2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com>
<971158e7b019866208e33a63d4fe83ed@dizum.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 16 Apr 2024 06:15:30 -0000 (UTC)
Injection-Info: toxic.dizum.net; posting-host="localhost:127.0.0.1";
logging-data="32451"; mail-complaints-to="abuse@dizum.net"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <971158e7b019866208e33a63d4fe83ed@dizum.com>
 by: Nomen Nescio - Tue, 16 Apr 2024 06:15 UTC

On 3/21/2024 9:26 PM, anon wrote:
> Nomen Nescio <nobody@dizum.com> wrote in
> news:2371bfbeaf1f53dc1ed039253a9fc8de@dizum.com:
>
>> Glassdoor, the website that allows workers to anonymously complain
>> about their workplaces without fear of retribution, is reportedly
>> revealing staffers’ real names in their profiles — prompting a viral
>> backlash over fears that their identities could be exposed.
>>
>> The shift began last July when the site added social features
>> integrated from Fishbowl, an app for work-related discussions that
>> Glassdoor’s parent company, Recruit, acquired in 2021.
>>
>> Signing up for an account on Glassdoor required workers to reveal
>> their full name, job title and employer — a departure from its
>> previous practice of just requiring email addresses but no names,
>> according to Wired.
>>
>> https://nypost.com/2024/03/20/business/glassdoor-users-urged-to-flee-si
>> te- after-real-names-added/
>
> Obviously they want to sell revenge information to corporations.

Kiss your career goodbye.

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor