Privacy

4176 readers
52 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 1 year ago
MODERATORS
1
2
 
 

Google image results are shit on purpose. They used to be better (long before AI). I am guessing that they use the pretence that it's all about porn. But they do it for tools, equipment, stereos etc.. to give bad results. Are they getting paid (yet) to return bad results?

Manipulating search results for profit is something that they already do, and targeted adverts. So it's not that much of a stretch. I was just wondering if it is acknowledged already.

3
10
As Easy As PGP (blog.rottenwheel.com)
4
 
 

By "push server" I mean something like Ntfy.sh.


Cross-posts

5
 
 

The most severe restrictions to the general public are imposed within a 20-mile (32 km) radius of the Green Bank Observatory.[5] The Observatory polices the area actively for devices emitting excessive electromagnetic radiation such as microwave ovens, Wi-Fi access points and faulty electrical equipment and request citizens discontinue their usage. It does not have enforcement power[6] (although the FCC can impose a fine of $50 on violators[7]), but will work with residents to find solutions.

6
 
 

Months after a trove of personal data it had collected was stolen, US data broker National Public Data has filed for bankruptcy. In its filing the company admits that the number of people impacted by the data theft is much higher than previously reported.

Earlier this year personal data belonging to “hundreds of millions” of people was stolen from US data broker National Public Data. The company admitted to the scope of the theft in a bankruptcy filing. Several outlets are reporting on the story.

National Public Data indicated that the stolen data included names, addresses, email addresses, telephone numbers and social security numbers. National Public Data’s parent company Jerico Pictures admits that there are “hundreds of millions of potentially impacted individuals.” According to the news site TechCrunch, security experts estimate the number of stolen Social Security numbers to be around 270 million.

Of all the information stolen, the Social Security numbers are considered especially sensitive, because they can be used as proof of identity – meaning criminals could potentially use the information to commit identity theft.

7
23
submitted 1 week ago* (last edited 1 week ago) by Sunny@slrpnk.net to c/privacy@lemmy.world
 
 

Open source 2FA authenticator, with end-to-end encrypted backups

Auth provides end-to-end encrypted cloud backups so you don't have to worry about losing your tokens. Our cryptography has been externally audited.

Auth has an app for every platform. Mobile, desktop and web. Your codes sync across all your devices, end-to-end encrypted.

Auth also comes with Offline mode, tags, icons, pins, import/export and more

8
9
 
 

They are literally everywhere. I can't go any place without being watched. I just want some privacy. The most alarming part is that they put cameras on all entrances and exits so they can know who's entering or leaving. Why do they need to stalk me as I go about my day? The area I live in is overall pretty safe so I don't see the justification.

I have also noticed that some people actually feel safe where there are cameras. I get that people can get scared but I don't think creating a giant network of mass surveillance is the answer.

What is this dystopian future we have marched into.

10
 
 

Right of passage I suppose

11
 
 

It was started by one of the grandfathers of computing/the web/the internet, but I'll be damned if I can remember what it was called and my DuckDuckGo-Foo is failing me today.

12
 
 

cross-posted from: https://lemmy.world/post/21142663

After federal police came to an employee’s house to ask questions, encrypted messaging company Session has decided to leave Australia and switch to a foundation model based in Switzerland.

13
 
 

it is a concern to me because there is no plan to do security audit despite people asked about ti in the past.

https://github.com/rustdesk/rustdesk/discussions/8392

https://github.com/rustdesk/rustdesk/discussions/4968

Not in their roadmap

https://github.com/rustdesk/rustdesk/discussions/918

people had concerns about the company:

https://www.reddit.com/r/rustdesk/comments/11nu94y/is_rustdesk_a_scam/

As HN: RustDesk Installs Chinese Root Certificates

https://news.ycombinator.com/item?id=39256493

14
 
 

As if anybody here needs a reason to be wary of what you do online, this essay shares how a foreign adversary used back doors that were intentionally put in place to spy on Americans and how the rest of the world probably has the same back doors.

I especially appreciate the phrase "nerd harder" and the quote, "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia".

How can IT folk help politicans to understand?

15
 
 

cross-posted from: https://lemmy.world/post/20620106

48-page report urges FTC, FCC to investigate connected TV industry data harvesting.

The companies behind the streaming industry, including smart TV and streaming stick manufacturers and streaming service providers, have developed a "surveillance system" that has "long undermined privacy and consumer protection," according to a report from the Center for Digital Democracy (CDD) published today and sent to the Federal Trade Commission (FTC). Unprecedented tracking techniques aimed at pleasing advertisers have resulted in connected TVs (CTVs) being a "privacy nightmare," according to Jeffrey Chester, report co-author and CDD executive director, resulting in calls for stronger regulation.

16
 
 

Make sure that you tell your registrar that you want to be anonymous.

Edit: wow I missed the phone number censor. I guess that proves my point even farther.

17
18
 
 

cross-posted from: https://lemmy.world/post/20402370 or https://lemm.ee/post/43793474

Technically, I have some online activity I could try to refer to for work purposes, but it would mean sharing content tied to usernames/profiles I think of more as casual and personal. I could delete those profiles and move the relevant work to usernames/profiles I'm willing to share, but then I'm less likely to use those as much for portfolio building as I wouldn't want to contribute/do things online under a more public-facing profile, or link my personal ones to said profile.

Any which way I think about it involves crossing private/public streams I'd prefer to keep uncrossed, but I'm thinking I may be overlooking some compromises that could work, so what might those be?

19
20
 
 

On Monday a new version of the globally unprecedented EU bill aimed at searching all private messages and chats for suspicious content (so-called chat control or child sexual abuse regulation) was circulated and leaked by POLITICO soon after. According to the latest proposal providers would be free whether or not to use ‘artificial intelligence’ to classify unknown images and text chats as ‘suspicious’. However they would be obliged to search all chats for known illegal content and report them, even at the cost of breaking secure end-to-end messenger encryption. The EU governments are to position themselves on the proposal by 23 September, and the EU interior ministers are to endorse it on 10 October. Messenger providers Signal and Threema have already announced that they will never agree to incorporate such surveillance routines into their apps and would rather shut down operations in the EU.

21
 
 

Law enforcement agencies in Germany have monitored Tor servers for months to identify individual users. The agencies managed to identify a server of the ransomware group Vanir Locker that the group operated from within the Tor network.

The group announced that it would release copied data from one of its latest coups on the server. Law enforcement agents managed to identify the location of the server by using a technique that is called Timing Analysis.

Reporters from ARD, a publicly financed broadcasters, were able to view documents that confirmed four successful identifications in a single investigation, according to reports. Agencies used the technique to identify members of a child abuse platform.

22
 
 

cross-posted from: https://lemm.ee/post/42694373

Leak on latest #ChatControl attempt (in German): https://netzpolitik.org/2024/interne-dokumente-sperrminoritaet-gegen-chatkontrolle-wackelt/ +++ Only AUT, DEU, EST, LUX, POL, SVN were critical – no blocking minority! +++ BEL, CZE, FIN, ITA, NLD, PRT, SWE undecided +++ EU legal experts confirm violation of our fundamental rights +++ Only 5 days to next discussion +++

Help pressure our governments into defending our #privacy of correspondence and secure #encryption now: https://www.patrick-breyer.de/en/take-action-to-stop-chat-control-now/

23
 
 

This is straightforward with browser addons like uBlock Origin where you can add and choose blocklists, but I did searches for doing so system wide and using a VPN but didn’t find clear answers. I could use a DNS service that provides blocklists but isn’t it best practice to leave DNS to the VPN provider? I looked up blocklists and VPNs but didn’t find relevant results.

On Android, I didn’t find any apps that let you filter blocklists and using your own VPN other than Rethink, but the blocklists feature requires using Rethink’s DNS.

So what’s the best way to filter ads and trackers on both 3rd party apps and on OS’s like Android (specific Samsung phones) while still using a VPN?

24
 
 

Found a great site with info about privacy focused OSes written for non-technical readers. It lists basic things to know about several different mobile os options, and there are also pages that list what open source and privacy focused apps from F droid (the alternative to play store) are good to use.

There is also, wonderfully, a page that specifically lists user friendly and nice looking ones. This site is a goldmine. Had to post as I was looking for this exact thing yesterday and I know I am not the only person on lemmy looking for alternatives.

25
 
 

I've had a Galaxy S22+ for 2 years and still want to use it. When I look up how to maximize privacy on Android, many results say to install custom ROMs which I can't since its a US model and the bootloader is locked. I just want to minimize tracking and sharing of personal information. I could use a firewall app like RethinkDNS to block trackers, but could I completely block tracking from Google and Samsung? Are there any lists of packages to uninstall to improve privacy? (I've used ADB to remove a bunch of bloatware. Ex: pm uninstall -k --user 0 com.samsung.android.arzone)

view more: next ›