this post was submitted on 13 Oct 2023
176 points (100.0% liked)

Privacy Guides

16784 readers
45 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 1 year ago
MODERATORS
top 26 comments
sorted by: hot top controversial new old
[–] praise_idleness@sh.itjust.works 74 points 1 year ago* (last edited 1 year ago) (1 children)

Oh I'm sure pedos are just sending CSAMs via Whatsapp willy-nilly. Not using already very much accessible numerous e2e encrypted methods that can be self-hosted and harder to find/track. We can definitely catch them for sure if this comes to be a thing!

This is just the laziest excuse for a surveillance. Fuck them.

[–] Anamana@feddit.de 23 points 1 year ago

I wouldn't be surprised if they were, people are lazy after all.

[–] Melatonin@lemmy.dbzer0.com 61 points 1 year ago* (last edited 1 year ago) (1 children)

If you don't have anything to hide, then let them have your privacy. If you don't, well then, you're a suspected terrorist or child predator.

The logic is impeccable.

Edit: I WAS being sarcastic, but I guess I was getting upvotes from people who like the EU position as well.

Win-win.

[–] AdminWorker@lemmy.ca 15 points 1 year ago (2 children)

I don't suppose you own curtains?

[–] dukethorion@lemmy.world 21 points 1 year ago

/missedsarcasm

[–] baggins@beehaw.org 4 points 1 year ago

I ~~think~~ hope they were being sarcastic.

[–] captainastronaut@seattlelunarsociety.org 41 points 1 year ago (1 children)

Stupid bastards. I hope Apple and WhatsApp and Signal all just turn off service in the EU. Let the users eat these assholes alive when their apps stop working.

[–] HughJanus@lemmy.ml 4 points 1 year ago

I hope they just ignore them and keep the services running. But I also know that's not realistic.

Not sure how Signal is going to handle this because they literally built proxies into the app specifically to circumvent this type of legislation.

Apple and Google will put their apps but it's trivial to just install it from the Signal website on Android. Or basically anywhere else.

[–] xilliah@beehaw.org 31 points 1 year ago (2 children)

Naive. There must be more practical methods to counter child abuse. For example always holding people accountable when they are known to hurt children would be a good start.

[–] GregorGizeh@lemmy.zip 32 points 1 year ago

Its just pretense. Authoritarians want that data, corps want that data, so they push that legislation.

[–] sibloure@beehaw.org 30 points 1 year ago

It's not about the children.

[–] merde@sh.itjust.works 29 points 1 year ago (1 children)

Criminalization of encryption : the 8 december case

Op-ed: ʻEncryption protects our rights, privacy is not a crimeʼ

The beginning of the “8 December” trial is also the judgement of the right to privacy and encryption

In this case, protecting one’s privacy and encrypting communications is no longer merely suspect, but participates of constituting a “clandestine behavior”, a way of concealing criminal intentions. In several memos, the DGSI keeps on trying to demonstrate how the use of tools such as Signal, Tor, Proton, Silence, etc., would be evidence of a desire to hide compromising elements. And on top of this, as we denounced last June, the DGSI justifies the absence of evidence of a terrorist project by the use of encryption tools itself. According to them, if they lack of elements proving a terrorist intent, it’s because those proofs are necessarily hold back in those much-vaunted encrypted and inaccessible messages. In reaction of such absurd vicious circle, lawyers of a person charged denounced the fact that “here, the absence of evidence becomes an evidence itself“.

[–] praise_idleness@sh.itjust.works 22 points 1 year ago (1 children)

how the use of tools such as Signal, Tor, Proton, Silence, etc., would be evidence of a desire to hide compromising elements.

I tried to write about how stupid this statement is with logical explanation but this doesn't even deserve that. If that goes anywhere near the actual law enforcement policy, that is no longer a free country.

[–] 9point6@lemmy.world 10 points 1 year ago

I offer an alternative service to having a wallet. I securely hold on to the contents of it and let you use the cards in it whenever you want, helps protect from theft, etc.

Oh you don't want to use this service because there's no need for someone else to have access to your wallet? What are you hiding? Clearly you'd be using the service if you weren't also doing something illegal.

I'd extend the metaphor further to highlight that there's no such thing as a secure backdoor, but this is just the same shit police-state authoritarianism we've been seeing grow in the UK since Thatcher—surveil fucking everyone, in every way possible whilst they do absolutely anything; because you're not a citizen, you're just a criminal or potential criminal.

And we've got a load of shitty news outlets making idiots clap every time their rights are eroded, because this time it'll stop the paedos and terrorists for good. Like all the other times.

[–] cheese_greater@lemmy.world 23 points 1 year ago

Cute how they think that

[–] shotgun_crab@lemmy.world 22 points 1 year ago
[–] AzzyDev@beehaw.org 21 points 1 year ago (1 children)

What’s stopping someone from just sending public keys or something through Signal and encrypting their messages that way? There’s no way to enforce this with such simple loopholes present. We shouldn’t be focusing on breaking privacy and instead invest in helping existing victims in ways that actually matter.

[–] princessnorah@lemmy.blahaj.zone 3 points 1 year ago (1 children)

Whilst I agree with your sentiment, this isn’t how end-to-end encrypted chats work. Otherwise, it would be impossible to know the messages you’re receiving are coming from the person you think they are.

[–] AzzyDev@beehaw.org 1 points 1 year ago

I suppose you’re right, but forging that kind of thing would be difficult, also considering the PKI already in place. If someone has their own email server and they sign/encrypt their email, and host their public key on a key server somewhere, it’s highly unlikely that all three would be compromised. and even if that fails, you could just meet up with them and exchange flash drives with keys.

[–] silmarine@beehaw.org 11 points 1 year ago (1 children)

How does this affect people self hosting an encrypted chat service? Would those people be at risk of a police raid or something?

[–] Infiltrated_ad8271@kbin.social 7 points 1 year ago (1 children)

It only applies if there is any profit, even if it is a single ad for a single user.

[–] gjoel@lemmy.ml 3 points 1 year ago (1 children)

It shouldn't, they are a non-profit foundation that is funded by donations. But take it with a grain of salt.

[–] halfempty@kbin.social 8 points 1 year ago

Acts of authoritarian control always claim to be done "for the children". They don't care about children, they want control.

[–] waow@lemm.ee 3 points 1 year ago

what did you think would happen when unelected elites start appointing Commissioners for Truth?

After all, as many were keen to point out during the EU/Musk row, there’s no free speech in Europe so why should there be private speech?

[–] shiveyarbles@beehaw.org 2 points 1 year ago

We value your privacy, as long as we can see it all