[-] [email protected] 8 points 2 days ago

It really depends on each person's threat model. But there are a few things everyone would benefit from. Like VPN, email aliasing, password manager, 2FA/MFA. They don't have any convenience cost and in most cases make your life easier.

If you are interested in learning more:

[-] [email protected] 21 points 2 days ago* (last edited 2 days ago)

If you read the blog post you would know there are 0 mentions of VPNs there. VPNs have very limited purpose, and it's just a small tool in the arsenal of privacy.

919
submitted 2 days ago by [email protected] to c/[email protected]

The most common argument used in defense of mass surveillance is ‘If you have nothing to hide, you have nothing to fear’. Try saying that to women in the US states where abortion has suddenly become illegal. Say it to investigative journalists in authoritarian countries. Saying ‘I have nothing to hide’ means you stop caring about anyone fighting for their freedom. And one day, you might be one of them.

[-] [email protected] 22 points 4 days ago

RCS doesn't support encryption natively. Google only has proprietary encryption for Messages app.

132
submitted 4 days ago by [email protected] to c/[email protected]

In recent weeks, I’ve noticed a rise in censorship regarding SMS communication that’s not being discussed. At all. I’m concerned that it may become a slippery slope that eventually effects us all. I don’t have any dramatic, prose-ridden introduction this week. Just some news, facts, and observations I wanted to share. So this week, follow me down the rabbit hole as I explore an existing but rising threat to our free speech and what we can do about it.

[-] [email protected] 35 points 1 week ago

How about the false positives? You want your name permanently associated with child porn because someone fucked up and ruined your life? https://www.eff.org/deeplinks/2022/08/googles-scans-private-photos-led-false-accusations-child-abuse

The whole system is so flawed that it has like 20-25% success rate.

Or how about this system being adopted for anything else? Guns? Abortion? LGBT related issues? Once something gets implemented, it's there forever and expansion is inevitable. And each subsequent government will use it for their personal agenda.

67
submitted 3 weeks ago by [email protected] to c/[email protected]

Email aliasing is one of the most underrated privacy techniques that has yet to go mainstream. For the privacy-conscious user, it offers a degree of separation between all your accounts, making it harder for data brokers to correlate your various accounts across different services by not using the same email address to sign up. For security, the same technique can also help defeat credential stuffing while obscuring your true email address, which is the central hub where all your identities can be managed (and the email address itself is literally half of the login information a would-be attacker would need to attempt to login). Your inbox is a critical thing to protect since a breach can offer information about additional accounts you have (via the emails already sitting in your inbox like updates, notifications, sign-in verifications, etc) as well as allowing an attacker to simply hit “reset password” on websites where you already have an account and thus take them over. As for mainstream users, the biggest advantage is probably the ability to manage spam more effectively – particularly from companies who refuse to respect opt-out links – from a single inbox, rather than having one inbox for professional use, then logging out and back into another for online shopping, then another for personal or newsletters, and so forth or simply having to give up and hope the spam filters don’t falsely flag anything important (or let junk though). Email aliasing makes effectively managing and controlling your inbox incredibly easy. With that in mind, this week, let’s examine some popular email aliasing services that the privacy community has to offer.

107
Is Privacy Worth It? (blog.thenewoil.org)
submitted 1 month ago by [email protected] to c/[email protected]

When I announced I would be closing my communities earlier this year, a curious thing happened: a surprising number of regulars replied with some variation of “I think this is my exit.” While some were specifically talking about Matrix, claiming that mine was the only room they were really active in and therefore they saw no point to having a Matrix account anymore, at least one specifically announced they would be quitting privacy entirely, save for a few basic techniques like using a password manager and being mindful of what to post online. While I didn’t expect the number of people responding that way, I was expecting that response from one or two people. If you check any given privacy forum – especially the ones with a heavy overlap of mainstream users such as Reddit – you’ll find no shortage of people asking “is all this work worth it?” and/or announcing that they’re giving up privacy because it’s too much work. So what gives? Is privacy worth the work?

[-] [email protected] -1 points 1 month ago

Are you from Belarus or know anyone in real life that lives there? Because I do, and I can tell you with certainty that people who live there have a different view from yours. So you can insist it's a NATO propaganda, but I'm sorry I will believe people I actually know and trust over you.

russia is currently a vital part in the worldwide anti imperialist axis of resistance

That is rich since imperialist Russia is the one who is occupying parts of Moldova, Georgia, and Ukraine.

You claim to be in support of Russia, yet you misrepresent them and their goals. Putin himself said he's an imperialist and his primary goal before his death is to restore former USSR territories.

[-] [email protected] 3 points 1 month ago

It converts YouTube links into privacy-friendly frontend.

[-] [email protected] 12 points 1 month ago

They offer integrated aliases via Proton Pass now.

95
submitted 1 month ago by [email protected] to c/[email protected]

Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers on the same network could force a target’s traffic off of the protection provided by their VPN without triggering any alerts to the user.

[-] [email protected] 1 points 1 month ago

Good point, but I didn't think of it that way just because, I saw things and read stuff that made me suspect it...

There is "speculation" spread about every single "privacy" focused service for exactly that reason. If you don't trust them, you are not using them. I'm not saying don't be suspicious, but also look at facts that make it unlikely of it being a honeypot.

But they did, and it worked for them before, and it'll always work unless no one start using that service, so there's no point in keeping servers operational.. time for a rebrand. plus they're getting paid.

Right, but there are plenty of easier services to target that provide more sensitive information. If you are a honeypot, you have to be profitable and expand your services or people will move somewhere else. That all takes time and work. Buying other services like SimpleLogin or Standard Notes and integrating their staff into your scheme would be unnecessary complication.

having it outside 14 eyes countries would be the most stupid decision the government could make.

It's not a story. So called 5 eyes, 9 eyes and 14 eyes refers to country agreements to share intelligence and make cooperation instant instead of having to go through proper channels that take time. I'm sure there are many conspiracy theories about specific things that might not be true, but there is no dispute that these agreements exist.

Government run honeypots are usually facilitated by federal agencies, INTERPOL, or EUROPOL, and if they want to run something in a country where they are not welcome it has to be court approved. Hence, it being run in 14 eyes countries, make it easy. Switzerland on the other hand not only requires everything to be approved by their courts, but also require using their specific privacy laws when making determination, which are the strongest in the world.

You only need to look at previous known honeypots to see where they originate and what they target.

[-] [email protected] 3 points 1 month ago

You thinking it's a honeypot is a win for the government. All they need to do is spread some propaganda instead of actually bothering to run a service that is hard to keep alive. And if they were to run a honeypot, having it outside 14 eyes countries would be the most stupid decision the government could make.

[-] [email protected] 12 points 1 month ago

No company executive will go to jail for you. Give any company a court signed order and they will comply. Hence, the companies that orient around privacy limit the data they retain so that when they get a court order, they have nothing to give. Email is flawed by design, so some metadata always has to be stored for it to be functional.

[-] [email protected] 7 points 1 month ago* (last edited 1 month ago)

You are absolutely right about metadata, but as far as protests, just having encryption is enough to prevent anyone from accessing the data. Extracting metadata from 3rd party companies or extracting a phone requires a lot more resources than cops can spare.

1
submitted 1 month ago by [email protected] to c/[email protected]

cross-posted from: https://lemmy.zip/post/14903482

Finland's Transport and Communications Agency (Traficom) has issued a warning about an ongoing Android malware campaign targeting banking accounts.

331
submitted 1 month ago by [email protected] to c/[email protected]

Simple steps to take before hitting the streets

90
submitted 1 month ago by [email protected] to c/[email protected]

Like it or not, email is a critical part of our digital lives. It’s how we sign up for accounts, get notifications, and communicate with a wide range of entities online. Critics of email rightfully point out that email suffers from a significant number of flaws that make it less than ideal, but that doesn’t change the current reality. In light of that reality, I believe that an encrypted email provider is a must-have for everyone in today’s age of rampant data breaches, insider threats, warrantless police access, and targeted advertising. If I can get access to your emails, I can get a range of sensitive information including where you bank (to craft more convincing phishing attacks), information about pets (I get notifications each year from the vet for my cats’ annual checkups), calendar reminders, news announcements from family, support tickets from services you use, and more. In a worse case scenario, if I get access to the account itself, it’s trivial to simply issue password reset requests for nearly any of those accounts, have it to sent to said compromised email account, and gain access to a wide number of other accounts you use – from banking to shopping and more – for any number of reasons. So this week, let’s look into the top encrypted email providers The New Oil recommends and their features to help decide which one is right for you.

236
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]

This is why people say the open source ecosystem sucks.

47
submitted 2 months ago by [email protected] to c/[email protected]

Defending Mastodon from Donald Trump's social media

4
submitted 2 months ago by [email protected] to c/[email protected]

This weekend in the United States, taxes are due. For the more responsible readers – aka “everyone but me” – this was probably already done weeks – if not months – ago. But don’t worry. Taxes will roll around again the same time next year, as inevitable as death itself as the famous philosopher noted, and our financial lives are year-round. So in other words, this is merely a good excuse to discuss some ways that you can protect your financial life – both online and off – and keep your funds, identity, and credit safe.

1
submitted 3 months ago by [email protected] to c/[email protected]

Making the application open-source could help the government quickly export it to other countries, Digital Transformation Minister Mykhailo Fedorov says.

GitHub: https://github.com/diia-open-source

view more: next ›

BrikoX

joined 11 months ago