Privacy

4206 readers
7 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 1 year ago
MODERATORS
1
 
 

I selfhost what I gain and try to degoogle as well.

2
3
4
5
6
 
 

Google image results are shit on purpose. They used to be better (long before AI). I am guessing that they use the pretence that it's all about porn. But they do it for tools, equipment, stereos etc.. to give bad results. Are they getting paid (yet) to return bad results?

Manipulating search results for profit is something that they already do, and targeted adverts. So it's not that much of a stretch. I was just wondering if it is acknowledged already.

7
11
As Easy As PGP (blog.rottenwheel.com)
8
 
 

By "push server" I mean something like Ntfy.sh.


Cross-posts

9
 
 

The most severe restrictions to the general public are imposed within a 20-mile (32 km) radius of the Green Bank Observatory.[5] The Observatory polices the area actively for devices emitting excessive electromagnetic radiation such as microwave ovens, Wi-Fi access points and faulty electrical equipment and request citizens discontinue their usage. It does not have enforcement power[6] (although the FCC can impose a fine of $50 on violators[7]), but will work with residents to find solutions.

10
 
 

Months after a trove of personal data it had collected was stolen, US data broker National Public Data has filed for bankruptcy. In its filing the company admits that the number of people impacted by the data theft is much higher than previously reported.

Earlier this year personal data belonging to “hundreds of millions” of people was stolen from US data broker National Public Data. The company admitted to the scope of the theft in a bankruptcy filing. Several outlets are reporting on the story.

National Public Data indicated that the stolen data included names, addresses, email addresses, telephone numbers and social security numbers. National Public Data’s parent company Jerico Pictures admits that there are “hundreds of millions of potentially impacted individuals.” According to the news site TechCrunch, security experts estimate the number of stolen Social Security numbers to be around 270 million.

Of all the information stolen, the Social Security numbers are considered especially sensitive, because they can be used as proof of identity – meaning criminals could potentially use the information to commit identity theft.

11
23
submitted 2 weeks ago* (last edited 2 weeks ago) by Sunny@slrpnk.net to c/privacy@lemmy.world
 
 

Open source 2FA authenticator, with end-to-end encrypted backups

Auth provides end-to-end encrypted cloud backups so you don't have to worry about losing your tokens. Our cryptography has been externally audited.

Auth has an app for every platform. Mobile, desktop and web. Your codes sync across all your devices, end-to-end encrypted.

Auth also comes with Offline mode, tags, icons, pins, import/export and more

12
13
 
 

They are literally everywhere. I can't go any place without being watched. I just want some privacy. The most alarming part is that they put cameras on all entrances and exits so they can know who's entering or leaving. Why do they need to stalk me as I go about my day? The area I live in is overall pretty safe so I don't see the justification.

I have also noticed that some people actually feel safe where there are cameras. I get that people can get scared but I don't think creating a giant network of mass surveillance is the answer.

What is this dystopian future we have marched into.

14
 
 

Right of passage I suppose

15
 
 

It was started by one of the grandfathers of computing/the web/the internet, but I'll be damned if I can remember what it was called and my DuckDuckGo-Foo is failing me today.

16
 
 

cross-posted from: https://lemmy.world/post/21142663

After federal police came to an employee’s house to ask questions, encrypted messaging company Session has decided to leave Australia and switch to a foundation model based in Switzerland.

17
 
 

it is a concern to me because there is no plan to do security audit despite people asked about ti in the past.

https://github.com/rustdesk/rustdesk/discussions/8392

https://github.com/rustdesk/rustdesk/discussions/4968

Not in their roadmap

https://github.com/rustdesk/rustdesk/discussions/918

people had concerns about the company:

https://www.reddit.com/r/rustdesk/comments/11nu94y/is_rustdesk_a_scam/

As HN: RustDesk Installs Chinese Root Certificates

https://news.ycombinator.com/item?id=39256493

18
 
 

As if anybody here needs a reason to be wary of what you do online, this essay shares how a foreign adversary used back doors that were intentionally put in place to spy on Americans and how the rest of the world probably has the same back doors.

I especially appreciate the phrase "nerd harder" and the quote, "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia".

How can IT folk help politicans to understand?

19
 
 

cross-posted from: https://lemmy.world/post/20620106

48-page report urges FTC, FCC to investigate connected TV industry data harvesting.

The companies behind the streaming industry, including smart TV and streaming stick manufacturers and streaming service providers, have developed a "surveillance system" that has "long undermined privacy and consumer protection," according to a report from the Center for Digital Democracy (CDD) published today and sent to the Federal Trade Commission (FTC). Unprecedented tracking techniques aimed at pleasing advertisers have resulted in connected TVs (CTVs) being a "privacy nightmare," according to Jeffrey Chester, report co-author and CDD executive director, resulting in calls for stronger regulation.

20
 
 

Make sure that you tell your registrar that you want to be anonymous.

Edit: wow I missed the phone number censor. I guess that proves my point even farther.

21
22
 
 

cross-posted from: https://lemmy.world/post/20402370 or https://lemm.ee/post/43793474

Technically, I have some online activity I could try to refer to for work purposes, but it would mean sharing content tied to usernames/profiles I think of more as casual and personal. I could delete those profiles and move the relevant work to usernames/profiles I'm willing to share, but then I'm less likely to use those as much for portfolio building as I wouldn't want to contribute/do things online under a more public-facing profile, or link my personal ones to said profile.

Any which way I think about it involves crossing private/public streams I'd prefer to keep uncrossed, but I'm thinking I may be overlooking some compromises that could work, so what might those be?

23
24
 
 

On Monday a new version of the globally unprecedented EU bill aimed at searching all private messages and chats for suspicious content (so-called chat control or child sexual abuse regulation) was circulated and leaked by POLITICO soon after. According to the latest proposal providers would be free whether or not to use ‘artificial intelligence’ to classify unknown images and text chats as ‘suspicious’. However they would be obliged to search all chats for known illegal content and report them, even at the cost of breaking secure end-to-end messenger encryption. The EU governments are to position themselves on the proposal by 23 September, and the EU interior ministers are to endorse it on 10 October. Messenger providers Signal and Threema have already announced that they will never agree to incorporate such surveillance routines into their apps and would rather shut down operations in the EU.

25
view more: next ›