In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.
You can subscribe to this community from any Kbin or Lemmy instance:
Learn more…
Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!
Want to get involved? The website is open-source on GitHub, and your help would be appreciated!
This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.
Moderation Rules:
- We prefer posting about open-source software whenever possible.
- This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
- No soliciting engagement: Don’t ask for upvotes, follows, etc.
- Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
- Be civil, no violence, hate speech. Assume people here are posting in good faith.
- Don’t repost topics which have already been covered here.
- News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
- Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
- No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
- No misinformation: Extraordinary claims must be matched with evidence.
- Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
- General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.
Additional Resources:
- 1 user online
- 5 users / day
- 10 users / week
- 72 users / month
- 645 users / 6 months
- 1 subscriber
- 665 Posts
- 11.1K Comments
- Modlog
deleted by creator
Or, bear with me, just send a massive amount of spam mails to leaked mailing lists. Maybe 1 in a million reacts and you scam them (cfr all the “Nigerian prince” scams.
A looooot less work because the victim’s will contact you themselves. No need to go and “compare which phones show up together and them figure out why they were together and then figure out if it was an affair or not and then contact them in the hopes they care enough to pay ransom”
I guess your username makes sense.
deleted by creator
As a high value individual you have to accept that you’ll always be a target. Nobodies like you and me on the other hand? Nobody will bother.
Will Mulder rescue me then?
Seriously, that sounds like such a bullshit approach. It’s uneconomical for the criminals. It’s super involved and doesn’t pay that much. Why would anyone do that, if regular fraud is right there to commit.
deleted by creator
But not like that. And not on a scale that would justify all that investment. These crimes only happen in your mind.
deleted by creator