• 0 Posts
  • 111 Comments
Joined 1Y ago
cake
Cake day: Jul 06, 2023

help-circle
rss

Using an exchange that has your identity means your activity on the exchange is discoverable, either by the bureaucracy, or by hackers.

Once you transition your money to a untraceable currency like monero, your activity after that point becomes undiscoverable.

When you use an ATM on a street corner to pull cash out, the ATM, the ATM network, anybody on the street, can see you pulling the money out. What you do if the money after that is up to you, and is less tracenable.

Whatever your use case, you have to factor in the above points, using an exchange is traceable, once the funds leave the exchange it’s not traceable. The rest is up to you


The Mozilla term is used to be ambiguous, I think deliberately so. So they get ZERO sympathy from critical readers when they do some BS under the auspice of “no, that wasn’t the non-profit side”. You have one reputation, you live and die by your behavior.

The Corporation / Foundation split is great for accounting and corporate structure, sure, but its not a shield against criticism of their behavior not matching their stated missions.




Oh yeah, agreed, if your syncing then your security model doesn’t include worrying about tracking.


https://datatracker.ietf.org/doc/html/draft-ietf-ppm-dap#name-security-considerations

The explicitly say if the aggregator is controlled by hostile party, and in my scenario that would be Mozilla, they could have full access to the deanonymized data. It’s out of scope for their protocol.

And while the DAP draft is nice, it doesn’t change my threat model, it just introduces extra steps. As the absolute hunger of AI inputs for models have shown us, if a company has the capability to get data, they will. Mozilla has demonstrated they are hungry for data and money. I don’t want to give them the capability


From my understanding of their implementation, you have to give a Mozilla server all of your traffic history, and then they feed a curated, sanitize topic list of that activity to the advertisers.

So now we’re trusting Mozilla with your full browsing history, that seems like a really bad idea. Even if I love and trust Mozilla, I don’t want to add yet another thing to the critical path



It turns out, if you hire executives to run your non-profit, they’re just going to use it to further their own objectives. And they don’t care about the mission.


Not all new cars. But some. Whenever you get a vehicle, it’s probably a good idea to buy one of those aftermarket service manuals sold to car mechanics for your make and model. Then you can verify radio repair etc etc and what circuits to take out etc

Besides if you’re trying to do information upsell, you don’t want your customer to have to go to a cell phone store and buy a SIM card and put it in the car. That’s extra friction they might change their mind. You want it to be always on and available, so they can just consent and get into the funnel


The telemetry from your car has value, plus if they control your infotainment system they can constantly try to upsell you to subscribe or buy other features.

Not to mention when we’re talking about on a car manufacturer, they can negotiate fleet-wide data access for all the vehicles. With an agreement with the manufacturer that if the user actually buys data access for themselves, they split the profit with the carrier


Not necessarily true. Don’t let perfection be the enemy of good enough. Limiting the number of organizations that have your data is a good thing. There’s no reason the car vendor needs that data


I can’t speak to the legality, but if you own the vehicle 100%, I can’t see removing parts from the vehicle being illegal as long as they don’t impinge on road safety.

I would recommend removing more than just the SIM card, if the radios have their own fuse, take the fuse out, or physically remove the radios themselves.


I’m not sure. That might be it.

I use grapheneos so I can just turn off network access in the app info panel and still use my VPN.


On Android, there’s a VPN in f Droid that acts as a firewall, so you can say this app has internet this app doesn’t have internet

To ensure that this program only works with a VPN, you can set up a work profile require always on VPN in the Android settings, then this app running in the work profile must use the VPN no matter what

GrapheneOS has the internet kill switch built in for any app anywhere.

Depending on your threat model, you need to be very careful, just because an app doesn’t have direct internet access, doesn’t mean it can’t talk to Google Play and pass messages that way. In the Android model, apps can talk to each other consensually, and you can’t stop that

For desktop computers, we’d be talking about virtual machines and network names bases to enforce your policy rules. Qubes is the gold standard here.


Honestly, I’m really impressed… Ddg works across VPN, and TOR. That includes these chatbots. That’s a great improvement for privacy



It’s $5 a month. And you get five simultaneous logins. So you and five of your friends could get together and get the price down to $1 a month.



Custom email domain name, plus sub-domains. and a catch-all email address that goes to one mailbox.

So service@lowurgency.domain.name and service2@highpriority.domain.name

I have it setup if I reply to a email, it comes from the address the email was sent to.

Very convenient. So far I’ve only had to block the xfinity email address, because they had a leak and it started to get spam.


I’m excited that Samsung’s offering more years of support. But it’s not clear to me that Qualcomm is actually going to provide the hardware device security patches for that time frame. Samsung may be doing something on top. But I want to make sure the extra years of support are fully up and down the hardware stack

For instance previous fairphone devices offer many years more “support” then the hardware vendor does. Meaning there’s a Gap where they’re just patching Android issues but not hardware issues


This brings up an interesting question. Should large organizations be forced to disclose their privacy related bug backlog? I realize this could be used for exploitation, but if they’re not willing to fix it we should at least know about it


https://safing.io/spn/

Safing is a interesting approach to distributed VPNs. Unlike the crypto models, you pay for your use with the subscription the payments accepted via crypto if you like. So there’s no direct link to you as the payee

Each circuit could take a different path through the network, it’s kind of like a self-supported tor architecture.

It’s a super interesting project I highly recommend reading about it if you’re interested in distributed VPNs, or even onion networks in general

Of course the granddaddy’s of distributed VPNs are tor and I2P. That should be the start of any of your research, and then you can look at the more niche options.

Avoid any VPN, distributed or not, that’s closed source. The vast majority of the " crypto VPNs " are closed source packages which do evil things to your network


These projects are great, and I donated, to be sustainable these need to be group efforts, not a single person’s passion project.


This person has very strong opinions. I’ve blocked 7 of their sockpuppets so far. Whenever I see a link to simplified privacy I know it’s going to be a first pass hot take with super strong opinions no nuance and a strong self promotional bent. (They are name squatters).


This is great. Thank you for creating such a nice and succinct summary


I see the issue, I’m using the Voyager app, it’s very clear it’s a video before I open the post.

I guess if different apps don’t make that clear, there would be a point of contention. Fair enough thank you for bringing that up

I provided a link to the transcript of the video, you can engage with that textually and join the discussion.


If people click on a video link, the discussion is typically about the video. Coming into the discussion about the video saying you’re refusing to watch the video is not productive in my mind. People who want to engage in the content of the video typically wish to have a productive conversation.

For people who wish to be text only, I respect that, and I understand that, that’s why I provided the previous parent a link to the transcript that is also available on the YouTube video.



You’re correct. Let me amend my previous post.

It’s weird to reply to a Lemmy post about a video, saying you’re not going to watch the video.


The issue of people in oppressive countries, where internet traffic is logged, is that using Tor won’t be blocked, but will mark somebody as a person of interest.

So there’s a lot of people on this planet who are connected to the internet and have a legal requirement to have their traffic logged. Those people absolutely should be using a VPN, the VPN cannot possibly be worse than their ISP


It’s kind of weird to comment on a video saying you’re not going to watch the video but hey fair enough.

Just for you here is the video transcript

https://pastebin.com/ijpuwQZ7

Apologies for the link, it was too large to fit in a post


The video covers that as well, if your bridge becomes discovered later, log traffic can be used to identify your tour usage in the past. And if that’s not acceptable in your threat model, then a VPN still makes sense


I think there’s a huge difference between we cannot make a recommendation and you shouldn’t do this.

The tor FAQ says we cannot endorse this in all scenarios… “generally speaking”

https://support.torproject.org/faq/faq-5/

The video makes a reasonable argument that if you can’t trust your ISP not to log, adding a VPN that has less incentive to log you makes sense and in worst case is the same as your ISP logging you so you lose nothing by trying it



It’s machine generated off the video transcript, so it’s hit and miss but it should give you enough information to determine if you want to watch the video


It’s a good video, filled with nuance, and good discussion. Definitely worth watching


Canonical link : https://www.youtube.com/watch?v=vo22D-dUeCA

Tldr via notegpt io

  • 🔥 Hot take of the month: Should you use a VPN before connecting to Tor? Probably yes!
  • 🔍 Counter-argument to Mental Outlaw’s video on “Stop Using Tor With VPNs”
  • 🌐 Tor Project acknowledges the benefits of using a VPN with Tor
  • 🤝 Privacy Guides is not affiliated with any VPN providers
  • 🔒 Using a VPN before Tor enhances privacy and security
  • 🌍 Reasons to hide Tor usage from ISPs and network administrators
  • 🚫 Misconceptions about Tor’s anonymity and the need for VPN usage