help-circle
rss
Privacy friendly fitness tracker recommendations
I'm looking for advice on a privacy friendly fitness tracker. One that doesn't require storing my personal data on a third party site, where I can sync the data locally using an open source program. I do have a PineTime but it doesn't really track metrics and I question the accuracy of the heat rate monitor. FitBit is owned by google, and I don't want an Apple Watch. Any recommendations?
fedilink

Archive https://archive.is/zkNkU
fedilink

  • merlin
  • English
  • edit-2
    3d
backup options in mull
Hi guys Does anyone know a efficient way to backup bookmarks in mull (preferably to a file)
fedilink
17


  • Lemmy
  • English
  • edit-2
    3d
How is your experience with JMP.chat and Cheogram?
I'm looking to use JMP.chat as my main number along as my work number.
fedilink



Bitwarden rolls out highly-requested autofill feature inside form fields
Bitwarden rolls out highly-requested autofill feature inside form fields [https://alternativeto.net/news/2024/2/bitwarden-rolls-out-highly-requested-autofill-feature-inside-form-fields/](https://alternativeto.net/news/2024/2/bitwarden-rolls-out-highly-requested-autofill-feature-inside-form-fields/) [@privacyguides](https://lemmy.one/c/privacyguides)
fedilink


cross-posted from: https://lemmy.world/post/12199398 > TLDR version as per Signal's [Mastodon](https://mastodon.world/@signalapp/111965169100132276): > > Introducing usernames and phone number privacy on Signal! > > We’re making it possible for people to connect with each other without having to share phone numbers. Now launching to beta users, available for everyone soon. > > 1. New default: Your phone number will no longer be visible in Signal > 2. You can create an optional username to connect without sharing your phone number > 3. You can enable a new, optional privacy setting to require people to connect with you via username instead of phone number > > A Signal username isn't the profile name that’s displayed in chats, and isn't visible to the people you chat with on Signal. A username is simply a way to initiate contact on Signal without having to share your phone number. (You still need a phone number to sign up for Signal.) > > Create a username by going to your Settings > Profile. Your username must be unique, and can be changed at any time. > > To connect with someone via username instead of phone number, type their exact, unique username. > > We’re launching these updates to our beta users now, and will be turning them on for everyone running the latest version of the Signal app soon. Our goal is to listen to your feedback, make adjustments, and ensure phone number privacy on Signal is easy and useful for everyone. > > You can sign up for beta to test these features. Note that Apple caps the number of iOS beta testers, and we have reached that limit. If you use Signal on iOS, you can get around this by signing up for Desktop beta, linked to your iOS account. See more: https://support.signal.org/hc/en-us/articles/360007318471-Signal-Beta > > For more information: [Signal's Blog Post](https://signal.org/blog/phone-number-privacy-usernames/) > >
fedilink

Proton’s Free plan now offers up to 5 GB (up from 1 GB) on Proton Drive and 1 GB (up from 500 MB) on Proton Mail after completing certain tasks.
cross-posted from: https://lemmy.world/post/12202255 > Announcement from the Proton team on [Reddit](https://www.reddit.com/r/ProtonDrive/comments/1avicc5/the_free_proton_drive_plan_is_getting_5x_the/) ([Libreddit link](https://farside.link/libreddit/r/ProtonDrive/comments/1avicc5/the_free_proton_drive_plan_is_getting_5x_the/)): > > >Today, we’re increasing file storage limits on the free plan. > > > >Instead of sharing 1 GB between files and email, you’ll now have: > > > > 5 GB for Proton Drive > > > > 1 GB for Proton Mail > > Additional context: For Proton Drive, you now start with 2 GB and for Proton Mail, you start with 500 MB. After signing up for the Free plan, you can unlock the maximum storage allowance on each service thus: > > You can boost your Proton Mail storage from 500 MB to 1 GB by completing four [account setup actions](https://proton.me/support/get-started-mail). > > You can boost your Proton Drive storage from the default 2 GB to 5 GB by completing three [tasks](https://proton.me/support/more-storage-proton-drive). > >
fedilink

Archive https://archive.is/Dhth8
fedilink

ProtonMail voluntarily offers Assistance for Real-Time Surveillance
From 2019, but still [this fullstop signals not only the end of that sentence, but also the end of this statement]. And here [those two words indicate that new information/context is being added; it is being indicated that we now no longer talk about the article, which the uneditorialized post title references and the post link leads to] something a bit more recent about the glorious “swiss privacy” [this makes it further clear that the following is about swiss privacy in general and not about Proton] https://www.republik.ch/2024/01/09/der-bund-ueberwacht-uns-alle ## key points [they were added because the main article is about Proton and written in english and because OP assumed that most in here are unable to read german and care less about general swiss privacy than they do care about Proton] - New reporting based on documents and court records shows that since 2017, the internet traffic of Swiss citizens has been massively monitored and read when it crosses borders, which happens routinely even for communication within Switzerland. - The intelligence service's claims that purely domestic Swiss internet traffic is collected are false, given how internet routing actually works. Traffic flows across borders dynamically, not through static "cables" as claimed. - All data is stored and searched, including retrospectively, meaning the intelligence service builds an ever growing haystack of private communication to dig through. This includes communication from journalists and lawyers that should be protected. - In 2023, steps were taken to expand monitoring further by requiring more Swiss internet providers to enable access to their infrastructure, including providers that don't directly deal with cross-border traffic. This contradicts previous claims about how the monitoring would work. - Critics argue this invalidates assurances given earlier by the government and intelligence officials and constitutes mass surveillance that violates civil liberties. There are plans in 2024 to revise the intelligence law again, possibly to retroactively legalize monitoring practices already occurring.
fedilink


The answer is yes, and the TL;DR is not to use them, use 2FA, and not share personal details online (which is hopefully all obvious advice) cross-posted from: https://lemmy.world/post/12060980
fedilink

  • Extras
  • English
  • edit-2
    12d
is there an android packages wiki
cross-posted from: https://lemmy.today/post/6586506 > Wiki for android packages > > Another post made me wonder if there is some kind of wiki or website for android packages with descriptions that can/should be removed via adb. Back when I had a bloated phone, about 3 years back, I remember how much of a pain in the ass this was and had to go through XDA developers and reddit posts just to get the info on which to not remove. Has this process changed since?
fedilink

Any thoughts on «Stract», an open source search engine (that appears to be self hostable as well, but there is a main instance of it)
Here is the [github page](https://github.com/StractOrg/stract). The option for different « optics » is neat, and the inclusion of DDG bangs style syntax is also appreciated.
fedilink


How to stop privacy/security theatre? How to stop worrying?
I guess a lot of us do some form of privacy/security theatre. I'm at least doing it quite a lot of it, and it's difficult to stop thinking of new things that could (but probably never will) go wrong. So instead of hearing how safe and cool your setup is, I'd like to hear how you simplified things and stopped the (hopefully 🤔) needless overthinking.
fedilink


cross-posted from: https://lemmy.ml/post/11703528 > It was fun while it lasted. The recent addition of PGP support was very welcome, and I thought that such support might have been a sign that they were in it for the long-term with the email product, but I thought wrong. > > >Dear Skiff Community, > > >We are excited to share that Skiff is joining Notion. > > >Skiff's mission is to bring freedom to the internet by helping people collaborate and communicate with freedom and privacy. We see a deep alignment with Notion’s vision to build a connected workspace and enable everyone to build tools that reflect their values. > > >We’re extremely excited to accelerate our mission by joining forces with Notion’s world-class team. We sincerely hope that the Skiff community will join us for this next stage of our journey. We’re pursuing big plans for making all of our online lives freer and more empowered, and these plans will carry forward directly the ambitions we’ve strived for alongside the Skiff community. > > >As we begin to shift focus to our shared efforts with Notion, we will be closing down Skiff's product suite after a 6-month sunset period We are deeply appreciative of the trust users have extended to us, and we are committed to honoring that trust by ensuring that all data on Skiff is easily exportable. For the next 6 months, Skiff services will continue to operate without disruption, and users can freely duplicate, migrate, or export data. You can now also set up a forwarding address to redirect mail to any other provider. > > >Our commitment to privacy and security is unchanged. All user data remains end-to-end encrypted, and Skiff products will never monetize your data. Accounts and data on Skiff will not be converted into Notion accounts. > > >We encourage you to export your data and migrate custom domains within the next 6 months. We’ve prepared this guide to make that process as easy as possible. For any other questions, our support team is readily available via the in-app “Send feedback” option or at support@skiff.org. > > >The Skiff community has lifted, inspired, and energized us at every step. We are humbled by your support and we apologize for any disappointment or inconvenience this change may cause you. We remain as committed as ever to bringing about the vision for a better internet that brought us together. Thank you for being part of the Skiff family, and we look forward to continuing to serve you with our future efforts. > > >Sincerely, > Skiff Team
fedilink



Twiiit: A tool to find Nitter instances that haven’t been ratelimited
cross-posted from: https://lemmy.ca/post/14982981
fedilink

Oh the hilarious irony. Can anyone recommend an up to date Firefox addon that gets rid of these fucking popups, automatically declining all but necessary? I've looked at a few but I remember folks here recommending some that I can't now for the life if me remember what they were. Thanks!
fedilink



Best service for filing taxes?
I'm sure doing it manually is the safest, but perhaps there's a least poison for software/services for filing US taxes. What do you recommend? (or, atleast, what do you recommend steering clear of)
fedilink

What is this thing, an app or codes? https://www.reddit.com/r/AndroidQuestions/comments/15yotxd/what_is_google_partner_setup/ https://eu.community.samsung.com/t5/galaxy-z-fold-z-flip/quot-google-partner-setup-quot-app/td-p/8026228 https://techwiti.com/google-partner-setup/ https://support.google.com/android/thread/205176241/what-is-the-app-google-partner-set-up-for-and-is-it-something-standard-for-my-galaxy-a-13-5g?hl=en
fedilink

Any thoughts on Secureblue (and the greater ublue ecosystem of images)?
As the title states, I am just curious what peoples opinions are on [secureblue](https://github.com/secureblue/secureblue), as well as the many other images that exist (notably Bazzite for the SteamDeck)
fedilink

How secure is multi-account-containers?
Hello privacyguides. I have a question: Talking strictly about security, how would you rate multi-account-containers for compartmentalizing internet activity? By compartmentalizing, I mean if, for example, I click on link "xyz" on container "a", and this link is somehow capable of accessing account "b" and compromise it. Except I have this account "b" logged in another container. Would the website be able to compromise the account? I know zero-days exist, but in a typical situation, would this extension improve security in this example or not? Thanks in advance for your time and any answers!
fedilink


TL;DR version: - Mobile carriers collect and sell customer data for profit. - Carriers use various methods to collect data, including default settings that enroll customers in data collection programs without their knowledge or consent, and opt-in programs that require explicit consent but may use misleading language or design to trick users into agreeing. - Major mobile carriers, such as AT&T, Verizon, and T-Mobile, collect customer data through their privacy policies, which often go unread by consumers. - Carriers collect various data, including web browsing history, app usage, device location, demographic information, and more. Carriers also combine data collected from customers with information from external sources, such as credit reports, marketing mailing lists, and social media posts. - They use this data to create models and inferences about customers' interests and buying intentions, which they then share with advertisers for targeted advertising. - Individuals can choose to opt out of data collection initiatives, utilize Virtual Private Networks (VPNs) to limit data accessibility, and change to alternate Domain Name System (DNS) servers to reduce the amount of data gathered.
fedilink


Here’s a condensed version of all 20 tips in one place. Click on any individual tip to learn more. *Note: Not all tips apply to everyone. Assess your [threat model](https://ssd.eff.org/module/your-security-plan) before implementing.* - [Use a privacy protector](https://mrkup.org/gj-toc-1) on your phone and computer screens to protect your activity from wandering eyes. - [Download a privacy-protecting web browser](https://mrkup.org/gj-toc-2) that blocks not only ads, but cookies, trackers, and more. - [Install software updates](https://mrkup.org/gj-toc-3) as soon as they’re available to stay secure and avoid being hacked. - [Activate two-factor authentication](https://mrkup.org/gj-toc-4) across all of your accounts, ideally using authenticator apps or security keys. - [Don’t share your current location](https://mrkup.org/gj-toc-5) on social media—at least, until after you’ve left it. - [Use a password manager](https://mrkup.org/gj-toc-6) to ensure you have a secure, unique password for each of your accounts. - [Upgrade your wireless router](https://mrkup.org/gj-toc-7) hardware, especially if yours is from before 2020. Your connection will be more secure thanks to new privacy standards. - [Get a burner phone number](https://mrkup.org/gj-toc-8) in case you need an extra level of privacy when working, signing up for shopper rewards programs, or even using dating apps. - [Review your social media privacy settings](https://mrkup.org/gj-toc-9) to stop your account from being shown to people you may not want seeing it. - [Ditch Google Maps](https://mrkup.org/gj-toc-10) for an alternative. Even switching to Apple Maps can reduce how much of your data is sent to advertisers. - [Browse the web in “private” or “incognito” mode](https://mrkup.org/gj-toc-11) to reduce the amount of cookies you’re tracked by and keep your accounts secure. Especially if you’re using a public computer. - [Activate a little-known Screen Time setting](https://mrkup.org/gj-toc-12), if you’re an iPhone user, to decrease the chance of your data being taken if your phone gets lost or stolen. - [Keep your kids' info off the internet](https://mrkup.org/gj-toc-13) if you’re a parent. That’s it. That’s the tip. - [Keep your info off the internet](https://mrkup.org/gj-toc-14) by using services like DeleteMe, that remove your data from data brokers’ hands. - [Don’t forget about real-world privacy](https://mrkup.org/gj-toc-15), like using cash and shredding your mail before you throw it away. - [Try using a “virtual machine”](https://mrkup.org/gj-toc-16) the next time you want to open a potentially sketchy document or software. - [Implement a written or numeric passcode](https://mrkup.org/gj-toc-17), rather than using FaceID or other face recognition technology, to unlock your phone. - [Lie about your birthday!](https://mrkup.org/gj-toc-18) To retailers in particular. They don’t need to know. - [Fake your answers to account security questions](https://mrkup.org/gj-toc-19) to keep hackers from finding and using your real info. This can also stop some pretty personal data from getting exposed in a potential breach. - [Say goodbye to Gmail, Hotmail, and the like](https://mrkup.org/gj-toc-20) by switching to a more private email provider. Actions like these—however small they may feel—do make a difference. By implementing just a few of these privacy tips, your accounts could be safer and less of your data could end up with advertisers. If thinking about protecting your privacy online makes you feel anxious, overwhelmed, or resigned, you aren’t alone. Nearly 70 percent of Americans felt overwhelmed solely by the number of passwords they have to track, according to a 2023 [Pew Research Center survey](https://www.pewresearch.org/internet/2023/10/18/how-americans-view-data-privacy/). Just over 60 percent aren’t sure that any steps they take when managing their privacy online make a difference, the same survey found. That’s why, this January, The Markup published one practical privacy tip a day that Markup staffers or readers actually use in their own lives. We called it “[Gentle January](https://themarkup.org/series/gentle-january)” because the tips are a mix of calming (did you know you can stop tracking all those passwords yourself?), whimsical (yes yes, we do teach you to fake some things), or downright practical (turns out, you should install those software updates). *The above excerpts are taken from [this](https://themarkup.org/gentle-january/2024/01/31/overwhelmed-by-digital-privacy-reset-with-these-practical-tips) article by The Markup.* *Please note that not all of the software suggestions provided in the article are necessarily the best options from a privacy standpoint. For example, the article mentions using Google Authenticator for two-factor authentication (2FA) instead of Aegis or Ente Auth. If you're looking for privacy tools, you may find the following resources helpful:* [Privacy Guides](https://www.privacyguides.org/en/tools/) [Avoid the Hack](https://avoidthehack.com/tools)
fedilink


cross-posted from: [https://links.hackliberty.org/post/897256](https://links.hackliberty.org/post/897256) > > > The NSA’s long history of often legally sketchy mass surveillance continues, despite some of the agency’s activities getting exposed more than a decade ago by whistleblower Edward Snowden. > > > > Now, the National Security Agency has had to reveal, in response to a senator’s questions, that it is, as one report put it, “sidestepping” obtaining warrants first before it buys people’s information, put on sale by data brokers. > > > > This came to light in an exchange of letters between Senator Ron Wyden and several top security officials. > > > > And this time – because of NSA’s own interest being at stake – he has been able to reveal the information he obtained. > > > > Wyden’s January 25 letter to Director of National Intelligence Avril Haines contained a fairly straight-forward request: US intelligence agencies should only buy American’s data “that has been obtained in a lawful manner.” > > > > We obtained a copy of the letter for you here. > > > > With the implication that something entirely different is happening, the senator went on to explain what: if these agencies went to communications companies themselves for the data, that would require a court order. > > > > Instead, Wyden continued, they go the roundabout way to get information (like location data) taken from people’s phones – collected via apps, and finally ending up with commercial brokers, who sell it to the likes of the NSA. And, this particular agency is also buying “Americans’ domestic internet metadata.” > > > > In other words, a comprehensive, yet legally questionable mass surveillance scheme. > > > > Wyden “reinforced” his letter to Haines by attaching NSA Director General Paul Nakasone’s December response to one of his earlier queries – a back-and-forth that has been going on for almost three years, he says, and concerned other agencies as well and their practice of data acquisition. > > > > But now that he said he would block the Senate confirmation of Nakasone’s successor – the information he received finally “got cleared” for release and pretty quickly. > > > > Nakasone confirmed the practice, and then went on to justify it by saying it only pertains to “records” of online traffic, rather than “emails and documents.” He said what the NSA purchases is “netflow data” that comes from devices where “one or both” ends of the connection is in the US. > > > > And why? It is “critical,” wrote Nakasone, in “protecting US defense contractors from cyber threats.” > >
fedilink

The video discusses the privacy concerns associated with SIM cards in mobile phones, highlighting three main reasons to be cautious. First, it explains how SIM cards enable constant location tracking through communication with cell towers. Second, it delves into the autonomy of SIM cards, particularly proactive SIMs that can send hidden messages to the cell network without the user's knowledge. Lastly, it explores the potential risks of having too much control centralized on a single device, particularly in terms of split tunneling with VPNs. Then Naomi shares personal reasons for not using a SIM card in her phone, emphasizing alternatives such as relying on WiFi, using an anonymous Calyx hotspot, or considering mobile hotspots. The benefits of these alternatives include increased privacy, the ability to control VPN usage, and reduced exposure to potential hidden messages sent by SIM cards. The video also touches on potential downsides, such as the need to carry multiple devices and potential connectivity issues when using hotspots.
fedilink

>The [Privacy Checkup](https://privacy-checkup.info/en) is an interactive questionnaire that uses everyday examples to show what consequences your online behavior has in regard to privacy and how to protect your data. >How are results calculated? The calculation is based on two categories: privacy and security. Each answer therefore has two values. For example, if an answer is particularly relevant for privacy but less so for security, it will have three points for privacy and one for security. If an answer is unfavorable from both a privacy and a security perspective, it will have zero points for both. The points are then added up, weighted, and combined to create a single percentage. >On completing the Privacy Checkup, your Checkup Report will explain a list of steps you can take to protect your privacy even better, as well as [software recommendations](https://privacy-checkup.info/en/recommendations) that fulfill strict requirements. - The Privacy Checkup was developed by the [Privacy Training](https://privacy-training.info/en) project to celebrate Data Privacy Week and is independently supported by Threema. Data Privacy Week, which we started off by publishing an [open letter on the topic of the proposed EU chat control](https://threema.ch/en/blog/posts/open-letter-csa-regulation), will be rounded off on January 28, 2024, with the Data Privacy Day. This annual event was initiated by the European Council to raise awareness for online privacy. [Source](https://threema.ch/en/blog/posts/privacy-checkup)
fedilink


    Create a post

    In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

    This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


    You can subscribe to this community from any Kbin or Lemmy instance:

    Learn more…


    Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

    Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


    This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


    Moderation Rules:

    1. We prefer posting about open-source software whenever possible.
    2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
    3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
    4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
    5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
    6. Don’t repost topics which have already been covered here.
    7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
    8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
    9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
    10. No misinformation: Extraordinary claims must be matched with evidence.
    11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
    12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

    Additional Resources:

    • 1 user online
    • 12 users / day
    • 89 users / week
    • 266 users / month
    • 1.79K users / 6 months
    • 1 subscriber
    • 541 Posts
    • 8.82K Comments
    • Modlog
    Lemmy.one
    The better front page of the internet

    Lemmy.one is a general-purpose instance of Lemmy, a self-hostable, decentralized alternative to Reddit and other link aggregators. Learn more…

    To save on server-storage, please consider using third-party providers like imgur if you want to post images, thanks!

    For the best experience, set your default post type to “All” and your default sort type to “Hot” in your profile settings.

    Support me on Ko-Fi

    Community creation is disabled on Lemmy.one, so if you’re hoping to do that you should probably register your account on a different Lemmy instance. Learn more…

    Some communities to check out first:

    Tech → !technology@beehaw.org
    News → !news@beehaw.org
    Memes → !memes@sopuli.xyz
    Music → !music@beehaw.org
    Books → !literature@beehaw.org

    More…

    What are the rules here?

    1. No pornography.
    2. No racism, sexism, homophobia, transphobia, xenophobia, or casteism
    3. No incitement of violence or promotion of violent ideologies
    4. No harassment, dogpiling or doxxing of other users
    5. No content illegal in the United States, Germany, or Finland
    6. Do not share intentionally false or misleading information
    7. Do not spam or abuse network features.

    Operating this server costs money, if you’d like to support the service, please consider contributing on Ko-Fi or Patreon. Thank you!