Privacy

4010 readers
40 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 1 year ago
MODERATORS
26
 
 

Im not keen on trying to deGoogle only by purchasing a Google pixel... -_-

Please provide other options with nothing to do with google or microsoft., Such as Fairphone, etc.

As you know(or may not), new CPU's from intel have remote access hardwired, regardless of the OS you are using. I suspect Google outsmarted the GrapheneOS userbase and went one step ahead.

27
28
29
 
 

Like when I read 3 Billion National Public Data Records with SSNs, Addresses Dumped Online, am I supposed to access that data dump or something to see if I got pwned? Are there equivalents to haveibeenpwned.com for this type of stuff? Any guides on what to do when these happen? I feel like I'm doomscrolling or watching the news, and feeling depressed about the world as a result because I should be doing something but I can't or it seems like I can't.

Even though I know better than to put such personal info online, but that doesn't eliminate the odds of them getting into breaches like these, and having started to be careful about digital privacy has opened my eyes to the sad state of privacy.

30
31
32
 
 

Join the Webinar How to Protect Your Data on the Internet.

webinar

33
 
 

I tried looking for lists but didn't find any.

The Work Number is US-specific and where your employers input your salary data for future employers to see. You can opt out here: https://employees.theworknumber.com/employee-data-freeze/.

34
 
 

After almost 2 years, Privacy Guides has added a new Hardware Recommendations section to their website.

Thanks to Daniel Nathan Gray and others for implementing this new hardware guide

35
36
 
 

One example would be state disability programs, they already need my real name and identity to work with me. Are there any downsides to sharing a simplelogin alias containing my real name vs no containing my real name? I just think it would be easier record keeping for them.

37
 
 

cross-posted from: https://lemmy.ml/post/18390499

For those of you using Proton services to protect your privacy, a new feature is being rolled out which is a self-custody Bitcoin wallet. If you have a proton e-mail address, you can now send and receive Bitcoin automatically. This is in tradition with their long-standing policy of accepting Bitcoin payments for their services.

A few key points to know:

  • You and only you have access to the Bitcoin, it is a self-custody wallet. You are not dependent on proton's cooperation to access your funds and they do not hold onto the funds for you.
  • Proton automatically translates e-mail addresses to Bitcoin addresses. This means you can send/receive BTC to/from any Proton user by just knowing their e-mail address
  • Proton does not support Bitcoin lightning. This means transactions will take an average of 10 minutes for an average fee of 75c. Hopefully they will add lightning in the future so that can drop to under a second for pennies in fees. Lightning would also enhance privacy
  • Note that using Bitcoin is pseudonymous. Using it privately and anonymously requires some effort.
  • Proton has also put together a good primer on Bitcoin here.

from their blog post:

Early in our journey, we experienced first-hand what it’s like being cut off from the financial system and at the mercy of large banks and institutions — an ordeal that affects millions of people across the globe. In the summer of 2014, as the original Proton Mail crowdfunding campaign was in progress, Proton had a near-death experience when PayPal froze our funds, questioned whether encryption was legal, and whether Proton had government approval to encrypt emails.

Fortunately, in that instance PayPal returned the blocked funds, and Proton was able to start the journey that we’ve been on for the past decade. However, that dangerous moment has always stayed in our minds, and we still keep a proportion of Proton’s financial reserves in Bitcoin.

Having experienced firsthand the unreliability of the traditional financial sector, building Proton Wallet is an important strategic move to make Proton more resilient and independent in the future. By enabling us and the entire Proton community to more easily adopt means of payment that deliver on the promise of financial freedom for all, we better insulate Proton from the risks posed by traditional finance.

38
 
 

Staring yesterday evening, I'm unable to watch any videos with Freetube (on PopOS 22.04). I think Google is trying harder and harder to break things.

39
 
 

cross-posted from: https://feddit.uk/post/15132091

Bedfordshire Police have said just ten arrests were made over the Bedford River Festival this weekend (20/21 July) with Live Facial Recognition (LFR) technology responsible...

40
 
 

I just tried changing my email on studentaid.gov to a simplelogin alias (using SL is a habit at this point) and I got notifications that emails from it were bounced while trying to verify the email change with sent codes. I looked it up and found a bunch of Reddit posts about issues with SL and iCloud.

41
 
 

I want to keep a timeline of the places I go like Google Maps can, and export it to mac for my diary*. The maps app doesn't have to be great, it just needs to keep a timeline in the background, I would still use Apple Maps as my main navigation app.

*(ideally I can automatically export it somehow, perhaps with the Shortcuts and Scriptable app but just tell me any apps with a timeline and export feature)

42
 
 

Hiya, just switched to LibreWolf due to Mozilla's recent actions... Just quickly wondering why these two "privacy preferences" are off by default? Are they not worth ticking off? Or is this another "part" of ones fingerprint that makes it more unique?

43
 
 

Doesn't seem especially practical, but I thought folks here might be interested in this method. With the increasing scarcity of pay phones I suspect it might be equally as "easy" to get a burner cell phone with cash and register a signal account that way.

44
22
submitted 2 months ago* (last edited 2 months ago) by mark to c/[email protected]
 
 

And it applies across your entire SL account. Seems very easy to hit, given that people use SL to curb influxes of inbound email spam.

If you go over the limit, they start throttling your emails (delivering them late).

45
 
 

We're happy to announce that BusKill is presenting at DEF CON 32.

What: Open Hardware Design for BusKill Cord
When: 2024-08-10 12:00 - 13:45
Where: W303 – Third Floor – LVCC West Hall

BusKill goes to DEF CON 32 (Engage)
BusKill is presenting at DEF CON 32

via @[email protected]

What is BusKill?

BusKill is a laptop kill-cord. It's a USB cable with a magnetic breakaway that you attach to your body and connect to your computer.

What is BusKill? (Explainer Video)
Watch the BusKill Explainer Video for more info youtube.com/v/qPwyoD_cQR4

If the connection between you to your computer is severed, then your device will lock, shutdown, or shred its encryption keys -- thus keeping your encrypted data safe from thieves that steal your device.

What is DEF CON?

DEF CON is a yearly hacker conference in Las Vegas, USA.

DEF CON Documentary
Watch the DEF CON Documentary for more info youtube.com/watch?v=3ctQOmjQyYg

What is BusKill presenting at DEF CON?

I (goldfishlaser) will be presenting Open Hardware Design for BusKill Cord in a Demo Lab at DEF CON 32.

What: Open Hardware Design for BusKill Cord
When: Sat Aug 10 12PM – 1:45PM
Where: W303 – Third Floor – LVCC West Hall

Who: Melanie Allen (goldfishlaser) More info

Talk Description

BusKill is a Dead Man Switch triggered when a magnetic breakaway is tripped, severing a USB connection. I’ve written OpenSCAD code that creates a 3D printable file for plastic parts needed to create the magnetic breakaway. Should anyone need to adjust this design for variations of components, the code is parameterized allowing for easy customization. To assemble a BusKill Dead Man Switch cord you will need:

  1. a usb-a extension cord,
  2. a usb hard drive capable of being attached to a carabiner,
  3. a carabiner,
  4. the plastic pieces in this file,
  5. a usb female port,
  6. a usb male,
  7. 4 magnets,
  8. 4 pogo pins,
  9. 4 pogo receptors,
  10. wire,
  11. 8 screws,
  12. and BusKill software.
Image of the Golden BusKill decoupler with the case off
Golden DIY BusKill Print

Full BOM, glossary, and assembly instructions are included in the github repository. The room holds approx. 70 attendees seated. I’ll be delivering 3 x 30 min presentations – with some tailoring to what sort of audience I get each time.

Meet Me @ DEF CON

If you'd like to find me and chat, I'm also planning to attend:

  • ATL Meetup (DCG Atlanta Friday: 16:00 – 19:00 | 236),
  • Hacker Kareoke (Friday and Sat 20:00-21:00 | 222),
  • Goth Night (Friday: 21:00 – 02:00 | 322-324),
  • QueerCon Mixer (Saturday: 16:00-18:00 | Chillout 2),
  • EFF Trivia (Saturday: 17:30-21:30 | 307-308), and
  • Jack Rysider’s Masquerade (Saturday: 21:00 – 01:00 | 325-327)

I hope to print many fun trinkets for my new friends, including some BusKill keychains.

Image shows a collection of 3D-printed bottle openers and whistles that say "BusKill"
Come to my presentation @ DEF CON for some free BusKill swag

By attending DEF CON, I hope to make connections and find collaborators. I hope during the demo labs to find people who will bring fresh ideas to the project to make it more effective.

46
47
 
 

That's a use case for aliases, catching if any company or service gives out your email to be abused by advertisers and whatnot. I tried looking for stories but didn't find any, I wonder if you have any to share.

48
 
 

cross-posted from: https://links.hackliberty.org/post/2121207

EU’s law enforcement agency Europol is another major entity that is setting its sights on breaking encryption.

This time, it’s about home routing and mobile encryption, and the justification is a well-known one: encryption supposedly stands in the way of the ability of law enforcement to investigate.

The overall rationale is that police and other agencies face serious challenges in doing their job (an argument repeatedly proven as false) and that destroying the internet’s currently best available security feature for all users – encryption – is the way to solve the problem.

Europol’s recent paper treats home routing not as a useful security feature, but, as “a serious challenge for lawful interception.” Home routing works by encrypting data from a phone through the home network while roaming.

We obtained a copy of the paper for you here.

Europol appears to want to operate on trust: the agency “swears” it needs access to this protected traffic simply to catch criminals. And if the feature was gone, then ISPs and Europol could have smooth access to traffic.

But if the past decade or so has taught law-abiding citizens anything, it is how, given the right tools, massive government and transnational organizations “seamlessly” slip from lawful to unlawful conduct, and secretive mass surveillance.

Not to mention that tampering with encryption – in this instance available in home routing as a part of the privacy-enhancing technologies (PET) – in security and privacy terms, means opening a can of worms.

It turns out, as ever, that agencies like Europol actually do have other mechanisms to go after criminals, some more controversial than others: one is “voluntary cooperation” by providers outside the EU (in which case Europol has to disclose information about “persons of interest” using foreign phone cards with other countries) as well as issuing an EIO – European Investigation Order.

But that barely compares to breaking encryption, in terms of setting up the infrastructure for effective mass surveillance. Europol’s complaint about the available procedures naturally doesn’t mention any of that – instead, they talk about “slow EIO replies” that hinder “urgent investigations.”

Europol presents two solutions to the home routing encryption “problem”: One, disable PET in home routing. The second is a cross-border mechanism inside the EU where “interception requests are quickly processed by service providers.”

49
 
 

I want to be logged in so I can do most things on Reddit like post and comment. I want it to be a web frontend rather than an app because I keep many tabs on Reddit open in my browser while doing research on things (like digital privacy for instance!). I did some searching and didn't find any currently working frontends with login support.

50
view more: ‹ prev next ›