• 10 Posts
  • 546 Comments
Joined 1 year ago
cake
Cake day: December 22nd, 2023

help-circle


  • Upvoted because I think this is a common perspective. My comment below is for anyone else out there who may feel the same way as you do.

    Being a passenger may cause less anxiety, but if safety is your biggest concern, driving yourself is the safest option to get around currently (besides bus/train transport or walking).

    Driving is all about strategy. I’ll be transparent and say that it is not a “safe” activity, but I’ll also say that riding in a car driven by someone else is likely less safe than educating yourself on good driving strategy and taking your safety (and the safety of your passengers) into your own hands.

    Driving defensively and using good vehicular communication will put you as a driver above 9/10s of the other drivers out there. That 1/10th leftover could hit you as a driver or passenger, but as a passenger, you have no recourse when you see them coming.

    https://youtu.be/K11S1S4C1qA















  • Just one more of a million massive breaches within the last 10 years. No real consequences, I’m sure.

    At this point, I think it’s safe to say that no individual person’s personal data hasn’t been caught in one of these breaches (unless they were born very recently). That’s not even mentioning the hundreds of vendors who I no longer work with but still have my sensitive data on their systems.

    I heard an idea a few years ago that I found interesting: each person has their private data hosted on a secure data hub. If a vendor needs some of that data (ex: FirstName, LastName, Email) for their system, they have to make a request to your hub for it, which you then have to approve. Each time a vendor system needs that data, they make a callout to your hub. As long as they have an active approval, the callout would succeed for the fields they’ve been authorized. You can then revoke that request whenever you’d like.

    I like the idea of having a running list of vendors who have access to your data and being able to revoke that data. However, it would also create a single location (your data hub) that could be breached and be a higher value target than any of the particular vendors.

    Trade-offs.