Privacy

1474 readers
74 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
1
2
7
submitted 13 hours ago* (last edited 13 hours ago) by [email protected] to c/privacy
3
4
 
 

I know about SponsorBlock for blocking sponsorship segments and interaction reminders, and I also know about privacy friendly alternate front-ends, such as Invidious. Is there an alternate front-end that not only skips SponsorBlock segments, but also allows one to submit new segments to SponsorBlock?

5
6
7
8
9
 
 

Workers at RDU1 and other facilities told CNBC that Amazon is increasingly using digital tools to deter employees from unionizing. That includes messaging through the company’s app and workstation computers. There’s also automated software and handheld package scanners used to track employee performance inside the warehouse, so the company knows when staffers are working or doing something else.

“You cannot get away from the anti-union propaganda or being surveilled, because when you walk into work they have cameras all over the building,” said Medelius-Marsano, who is an organizer with CAUSE. “You can’t get into work without scanning a badge or logging into a machine. That’s how they track you.”

10
11
12
13
14
 
 

hey,

i created a browser-based tool for p2p file transfer where it doesnt use any backend for storage. instead, it relies on storage provided by the browser.

https://file.positive-intentions.com

its still a work in progress, but id like to know your thoughts. it isnt open source, but its largely based off another project which does P2P messaging (its just called "chat"). my intentions with this new app, is that i will aim for this to be a B2B SaaS product, but until i set up login+subscription, its free-to-use. id love to get feedback on features you would find useful.

i have some documentation, but im also sure that it isnt very clear. so feel free to ask any questions about how it works.

the landing page is also largely based off the "chat" project. https://positive-intentions.com/docs/file . i will try to make more time to improve the landing page experience.

15
 
 

cross-posted from: https://lemmy.dbzer0.com/post/36880616

Help Combat Internet Censorship by Running a Snowflake Proxy (Browser or Android)

Internet censorship remains a critical threat to free expression and access to information worldwide. In regions like Iran, Russia, and Belarus, journalists, activists, and ordinary citizens face severe restrictions when trying to communicate or access uncensored news. You can support their efforts by operating a Snowflake proxy—a simple, low-impact way to contribute to a freer internet. No technical expertise is required. Here’s how it works:


What Is Snowflake?

Snowflake is a privacy tool integrated with the Tor network. By running a Snowflake proxy, you temporarily route internet traffic for users in censored regions, allowing them to bypass government or institutional blocks. Unlike traditional Tor relays, Snowflake requires minimal bandwidth, no configuration, and no ongoing maintenance. Your device acts as a temporary bridge, not a permanent node, ensuring both safety and ease of use.


Is This Safe for Me?

Short answer: Yes.

Long answer: pobably. Here is why:

  • Your IP address is not exposed to the websites they access. So, you don't have to worry about what they are doing either. You are not an exit node.
  • No activity logs. Snowflake cannot monitor or record what users do through your connection. The only stored information is how many people have connected to your bridge. Check docs for further info on this.
  • Low resource usage. The data consumed is comparable to background app activity—far less than streaming video or music.
  • No direct access to your system
  • No storage of sensitive data. Snowflake proxies do not store any sensitive data, such as IP addresses or browsing history, on your system.
  • Encrypted communication. All communication between the Snowflake proxy and the Tor network is encrypted, making it difficult for attackers to intercept or manipulate data.

You are not hosting a VPN or a full Tor relay. Your role is limited to facilitating encrypted connections, similar to relaying a sealed envelope.

Your IP address is exposed to the user (in a P2P-like connection). Be mindful that your ISP could also potentially see the WebRTC traffic and the connections being made to it (but not the contents), so be mindful of your threat model.

For most users, it is generally safe to run Snowflake proxies. Theoretically, your ISP will be able to know that there are connections being made there, but to them it will look like you're calling someone on, say, Zoom.

Historically, as far as we know, there haven't been any cases of people getting in legal trouble for running entry relays, middle relays, or bridges. There have a been a few cases of people running exit nodes and getting in trouble with law enforcement agencies, but none of them have been arrested or prosecuted as far as I know it. If you are aware of any cases, let me know so I can update this post.

Do not hesitate to check Snowflake's official documentation for further reference and to make informed decisions.


How to Set Up a Snowflake Proxy

Option 1: Browser Extension (Brave, Firefox, or Chrome)

  1. Install the Snowflake extension.
  2. Click the Snowflake icon in your browser toolbar and toggle "Enable Snowflake."
  3. Keep the browser open. That’s all.

Note: Brave users can enable Snowflake directly in settings. Navigate to brave://settings/privacy and activate the option under "Privacy and security."


Option 2: Android Devices via Orbot

  1. Download Orbot (Tor’s official Android app).
  2. Open the app’s menu, select "Snowflake Proxy," and toggle it on.
  3. For continuous operation, keep your device charged and connected to Wi-Fi.

Your device will now contribute as a proxy whenever the app is active.


Addressing Common Concerns

  • Battery drain: Negligible. Snowflake consumes fewer resources than typical social media or messaging apps.
  • Data usage: Most users report under 1 GB per month. Adjust data limits in Orbot’s settings or restrict operation to Wi-Fi if necessary.

Why Your Participation Matters

Censorship mechanisms grow more sophisticated every year, but tools like Snowflake empower ordinary users to counteract them. Each proxy strengthens the Tor network’s resilience, making it harder for authoritarian regimes to isolate their populations. By donating a small amount of bandwidth, you provide someone with a critical connection to uncensored information, education, and global dialogue.

Recent surges in demand—particularly in Russia—highlight the urgent need for more proxies. Your contribution, however small, has an impact.

By participating, you become part of a global effort to defend digital rights and counter censorship. Please, also be mindful of your threat mode and understand the potential risks (though very little for most people). Check Snowflake's official documentation for further reference and don't make any decisions based on this post before taking your time to read through it.

Please share this post to raise awareness. The more proxies, the stronger the network.

– llama

16
 
 

[email protected]

Hello everyone,

After a discussion on [email protected] ( https://feddit.org/post/6950586 ), a few people interested in privacy decided to reopen [email protected] as an alternative to [email protected] .

Feel free to join us there!

Note: created a same post yesterday, didn't federate (https://lemmy.zip/post/30504557?scrollToComments=true ), hope it works this time!

17
 
 

[email protected]

Hello everyone,

After a discussion on [email protected] ( https://feddit.org/post/6950586 ), a few people interested in privacy decided to reopen [email protected] as an alternative to [email protected] .

Feel free to join us there!

18
 
 

App: https://chat.positive-intentions.com

A p2p encrypted file transfer and messaging app. Here are some features below:

  • Open Source
  • Cross platform
    • PWA
    • iOS, Android, Desktop (self compile)
    • App store, Play store (coming soon)
    • Desktop
      • Windows, Macos, Linux (self compile)
      • run index.html on any modern browser
    • Decentralized
  • Secure
    • No cookies
    • P2P encrypted
    • No registration
    • No installing
  • Messaging
    • Group Messaging (coming soon)
    • Text Messaging
    • Multimedia Messaging
    • Screensharing (on desktop browsers)
    • Offline Messaging (in research phase)
    • File Transfer
    • Video Calls
  • Data Ownership
    • Self Hosting
    • GitHub pages Hosting
    • Local-Only storage

Check it out!

19
 
 

Its clear that the technology is there and in use to track cars in real time. And for better or worse, its not even remotely secure.

20
21
 
 

I want to keep a list of my contacts on my phone so I can call them, but I never want the list of contacts to leave the device, through contact sync or similar. I'm using the Android built-in Contacts app.

On my old phone I used an F-droid app called 'local contacts' or 'offline contacts', but I can't find it with my new phone. It would create a new account, separate from your gmail account, to associate the contacts with. Something like that might be nice to have, although I don't know how effective it is.

I see in my settings under "Google Contacts sync" that "Sync is off" and "Also sync device contacts" is off. "Device contacts" sounds like maybe some Android built-in version of the offline contacts app I mentioned before. Does anyone know if this is the case?

I'm worrying that if I use a builtin features, Google will ask me about backup for photos or something at a later point, I'll reflexively click 'proceed' without realizing what I'm doing, and this will activate all Google-related sync features, including contact sync, updating my Xkeyscore (NSA) profile with my social graph before I know what's happening.

Perhaps it's best to assume my social graph is already known by Google? Then maybe I should focus on limiting others from getting access to it? I believe apps have to ask before accessing any contacts so I guess I could just deny access for apps I don't trust.

There are few questions above, but I'm really mostly looking for a discussion about what good security practices are when it comes to phone contacts. It seems like one of the more sensitive sets of information on a phone.

22
17
Can the Government Read My Text Messages? (www.digitalrightsbytes.org)
submitted 2 months ago by [email protected] to c/privacy
 
 

There's a meme that every person has a U.S. government agent assigned to read their text messages. That’s not true. But government agencies, from the National Security Administration to local police departments, can potentially read the conversations on many text messaging applications. Fortunately, this is not always the case, and there are many ways you can protect your privacy.

23
24
25
 
 

Does that mean that other apps like signal for example have back doors?

Do criminals have a knowledge of exploits in the recommended messaging apps?

view more: next ›