Sidebar

Privacy Guides

privacyguides
Privacy Guides jonah 1 year ago 98%
We're giving Lemmy a try: Welcome to !privacyguides@lemmy.one https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/

With Reddit's encroaching IPO and their poorly planned API changes, we need a place to keep up with privacy topics that isn't tied to an anti-privacy, centralized ~~sinking ship~~ site. Our [forum running Discourse](https://discuss.privacyguides.net/) has been a great place to discuss website changes and answer questions, but it doesn't *quite* provide the same experience as Reddit does for things like sharing news, so we're trying something new: [!privacyguides@lemmy.one](https://lemmy.one/c/privacyguides) is our new ActivityPub-enabled community for sharing links and other information from the privacy and security realm. Welcome! We're going to be trying out posting to this community for a few months to decide if we want this to replace or coexist with the r/privacyguides subreddit, so we'll see how it goes. If you want this to succeed, stay active! Our mission is to become the most inviting and friendly place to discuss privacy and security on the fediverse 😎 ### How do I join the Privacy Guides community on Lemmy? You can join a few different ways: * **On [Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)**, a Lemmy alternative with a more Reddit-like UI and **instant registrations**. [I didn't like](https://www.reddit.com/r/PrivacyGuides/comments/13zo1cf/comment/jmwpic2/?utm_source=share&utm_medium=web2x&context=3) Kbin *from a hosting perspective* because of some missing features, but for just browsing communities and joining ours it's a great option: [https://kbin.social/m/privacyguides@lemmy.one](https://kbin.social/m/privacyguides@lemmy.one) * **On** [**Lemmy.one**](https://Lemmy.one), this is the server which hosts the Privacy Guides community on Lemmy, and also the server that I admin myself. You are welcome to create an account, but it might take up to 24 hours for your account to be approved. * **On another Lemmy instance:** You can join the community by entering `!privacyguides@lemmy.one` in the search box on your instance. There are [plenty of servers you could join](https://join-lemmy.org/instances), or you could host your own relatively easily if you're familiar with self-hosting. * **On another ActivityPub instance:** You can also probably join by entering `@privacyguides@lemmy.one` or [https://lemmy.one/c/privacyguides](https://lemmy.one/c/privacyguides) in the search box of the ActivityPub software you use, although Mastodon does not seem to pull in posts from Lemmy communities properly in my limited testing, so **YMMV**. --- Verification post: https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/

179
62
privacyguides
Privacy Guides TheTwelveYearOld 11 hours ago 100%
How do you filter ads and trackers outside of a browser while still using a VPN service?

This is straightforward with browser addons like uBlock Origin where you can add and choose blocklists, but I did searches for doing so system wide and using a VPN but didn’t find clear answers. I could use a DNS service that provides blocklists but isn’t it best practice to leave DNS to the VPN provider? I looked up blocklists and VPNs but didn’t find relevant results. On Android, I didn’t find any apps that let you filter blocklists and using your own VPN other than Rethink, but the blocklists feature requires using Rethink’s DNS. So what’s the best way to filter ads and trackers on both 3rd party apps and on OS’s like Android (specific Samsung phones) while still using a VPN?

16
6
privacyguides
Privacy Guides TheTwelveYearOld 2 days ago 100%
Maximizing privacy on Android without custom ROMs?

I've had a Galaxy S22+ for 2 years and still want to use it. When I look up how to maximize privacy on Android, many results say to install custom ROMs which I can't since its a US model and the bootloader is locked. I just want to minimize tracking and sharing of personal information. I could use a firewall app like RethinkDNS to block trackers, but could I completely block tracking from Google and Samsung? Are there any lists of packages to uninstall to improve privacy? (I've used ADB to remove a bunch of bloatware. Ex: `pm uninstall -k --user 0 com.samsung.android.arzone`)

25
13
privacyguides
Privacy Guides ElvenMithril 6 days ago 97%
please help me with some arguments for my wife

Hi, my wife decided to create a new email for our newborn daughter which my wife would use to send updates to our relatives about what is going on in our daughter life. My wife is using gmail, I do use proton. She has created a new gmail account but I have asked her to reconsider and to create a new account on proton privacy wise. What arguments would you use for my case? Thanks.

36
34
privacyguides
Privacy Guides BrikoX 7 days ago 100%
Meta fixes easily bypassed WhatsApp ‘View Once’ privacy feature https://www.bleepingcomputer.com/news/security/meta-fixes-easily-bypassed-whatsapp-view-once-privacy-feature/

> A privacy flaw in WhatsApp, an instant messenger with over 2 billion users worldwide, is being exploited by attackers to bypass the app's "View once" feature and view messages again.

23
5
privacyguides
Privacy Guides pcouy 2 weeks ago 100%
Increase privacy by using nginx as a caching proxy in front of a map tile server pierre-couy.dev

publication croisée depuis : https://lemmy.pierre-couy.fr/post/653426 > This is a guide I wrote for Immich's documentation. It features some Immich specific parts, but should be quite easy to adapt to other use cases. > > It is also possible (and not technically hard) to self-host a protomaps release, but this would require 100GB+ of disk space (which I can't spare right now). The main advantages of this guide over hosting a full tile server are : > - it's a single nginx config file to deploy > - it saves you some storage space since you're only hosting tiles you've previously viewed. You can also tweak the maximum cache size to your needs > - it is easy to configure a trade-off between map freshness and privacy by tweaking the cache expiration delay > > If you try to follow it, please send me some feedback on the content and the wording, so I can improve it

33
0
privacyguides
Privacy Guides ForgottenFlux 2 weeks ago 100%
Mozilla removes telemetry service Adjust from mobile Firefox versions www.techzine.eu

For Android users seeking a privacy-focused browser, [Privacy Guides](https://www.privacyguides.org/en/mobile-browsers/#mull) recommends Mull: >Mull is a privacy oriented and deblobbed Android browser based on Firefox. Compared to Firefox, it offers much greater fingerprinting protection out of the box, and disables JavaScript Just-in-Time (JIT) compilation for enhanced security. It also removes all proprietary elements from Firefox, such as replacing Google Play Services references. >Mull enables many features upstreamed by the Tor uplift project using preferences from Arkenfox. Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid.

64
0
privacyguides
Privacy Guides fine_sandy_bottom 4 weeks ago 95%
How to Promote Phishing and Scam Awareness

Just wondered how others promote threat awareness for friends, family, co-workers, and clients. Every few weeks I email a half dozen employees & family members explaining one or other phishing attempt I've seen, just to keep it in peoples minds. I heard someone else talking about a kind of email pen-testing service you can sign up for and they send scammy emails to see if the recipient falls for it. Seems like a great idea but only viable for me if it's very cheap. I could link to something on privacyguides.org in my email footer but I think that's just virtue signalling more than anything actually useful.

18
3
privacyguides
Privacy Guides andrew 1 month ago 99%
The spies in your home: How WiFi companies monitor your private life

The spies in your home: How WiFi companies monitor your private life [https://proton.me/blog/wifi-surveillance](https://proton.me/blog/wifi-surveillance) [@privacyguides](https://lemmy.one/c/privacyguides)

139
15
privacyguides
Privacy Guides otter 1 month ago 100%
GrapheneOS's post on Mastodon discusses the flaws with Google's Play Integrity API https://grapheneos.social/@GrapheneOS/112878067304840664

cross-posted from: https://lemmy.ca/post/26747543 > The post is in the link, the article with more background info is here (it cites the mastodon post): https://www.androidauthority.com/custom-roms-vs-google-3469378/ > > I originally saw the article on [this post](https://lemm.ee/post/39353290) on [!android@lemdro.id](https://lemdro.id/c/android) and went looking for links.

81
2
privacyguides
Privacy Guides TheTwelveYearOld 1 month ago 100%
What should I do when I see headlines about personal data getting breached? How do I keep such info off the internet?

Like when I read [3 Billion National Public Data Records with SSNs, Addresses Dumped Online](https://reddit.com/r/privacy/comments/1emmz1r/3_billion_national_public_data_records_with_ssns/), am I supposed to access that data dump or something to see if I got pwned? Are there equivalents to [haveibeenpwned.com](https://haveibeenpwned.com) for this type of stuff? Any guides on what to do when these happen? I feel like I'm doomscrolling or watching the news, and feeling depressed about the world as a result because I should be doing something but I can't or it seems like I can't. Even though I know better than to put such personal info online, but that doesn't eliminate the odds of them getting into breaches like these, and having started to be careful about digital privacy has opened my eyes to the sad state of privacy.

16
3
privacyguides
Privacy Guides ForgottenFlux 2 months ago 98%
Here are the best Google Maps alternatives for finding your way: With a number of community-driven, open-source mapping projects, picking a navigation app without ads or tracking has never been easier tuta.com

>repeated media reports of Google’s disregard for the privacy of the general public led to a push for open source, community driven alternatives to Google Maps. The biggest contender, now used by Google’s direct competitors and open source projects alike is OpenStreetMap. 1. OsmAnd > >OsmAnd is a fantastic choice when searching for an alternative to Google Maps. It is available on both Android and iOS devices with both free and paid subscription options. Free accounts have full access to maps and navigation features, but choosing a paid subscription will allow you unlimited map downloads and increases the frequency of updates. > >All subscriptions can take advantage of turn-by-turn navigation, route planning, map markers, and all the favorite features you expect from a map and navigation app in 2024. By making the jump to a paid subscription you get some extra features like topo maps, nautical depths, and even point-of-interest data imported from Wikipedia. 2. Organic Maps > >Organic Maps is a great choice primarily because they offer support for all features of their iOS and Android apps completely offline. This means if you have an old phone laying around, you can install the app, download the maps you need and presto! You now have an indepth digital map in the palm of your hand without needing to worry about losing or damaging your primary mobile device when exploring the outdoors. > >Organic Maps tugs our heartstrings by their commitment to privacy. The app can run entirely without a network connection and comes with no ads, tracking, data collection, and best of all no registration. 3. Locus Maps > >Our third, and last recommendation today is Locus Maps. Locus Maps is built by outdoor enthusiasts for the same community. Hiking, biking, and geocaching are all mainstays of the Locus App, alongside standard street map navigation as well. > >Locus is available in its complete version for Android, and an early version is available for iOS which is continuing to be worked on. Locus Maps offers navigation, tracking and routes, and also information on points-of-interest you might visit or stumble upon during your adventures.

74
4
privacyguides
Privacy Guides ForgottenFlux 2 months ago 100%
Google ads push fake Google Authenticator site installing malware | The ad displays "google.com" and "https://www.google.com" as the click URL, and the advertiser's identity is verified by Google https://www.bleepingcomputer.com/news/security/google-ads-push-fake-google-authenticator-site-installing-malware/

>Google has fallen victim to its own ad platform, allowing threat actors to create fake Google Authenticator ads that push the DeerStealer information-stealing malware. >In a new malvertising campaign found by Malwarebytes, threat actors created ads that display an advertisement for Google Authenticator when users search for the software in Google search. >What makes the ad more convincing is that it shows 'google.com' and "https://www.google.com" as the click URL, which clearly should not be allowed when a third party creates the advertisement. >We have seen this very effective URL cloaking strategy in past malvertising campaigns, including for KeePass, Arc browser, YouTube, and Amazon. Still, Google continues to fail to detect when these imposter ads are created. >Malwarebytes noted that the advertiser's identity is verified by Google, showing another weakness in the ad platform that threat actors abuse. >When the download is executed, it will launch the DeerStealer information-stealing malware, which steals credentials, cookies, and other information stored in your web browser. >Users looking to download software are recommended to avoid clicking on promoted results on Google Search, use an ad blocker, or bookmark the URLs of software projects they typically use. >Before downloading a file, ensure that the URL you're on corresponds to the project's official domain. Also, always scan downloaded files with an up-to-date AV tool before executing.

200
21
privacyguides
Privacy Guides ForgottenFlux 2 months ago 100%
Meta settles Texas privacy lawsuit for $1.4 billion over allegations that the tech giant illegally used facial recognition technology to collect biometric data of millions without their consent apnews.com

>Filed in 2022, the Texas lawsuit said that Meta was in violation of a state law that prohibits capturing or selling a resident’s biometric information, such as their face or fingerprint, without their consent. >The company announced in 2021 that it was shutting down its face-recognition system and delete the faceprints of more than 1 billion people amid growing concerns about the technology and its misuse by governments, police and others. >Texas filed a similar lawsuit against Google in 2022. Paxton’s lawsuit says the search giant collected millions of biometric identifiers, including voiceprints and records of face geometry, through its products and services like Google Photos, Google Assistant, and Nest Hub Max. That lawsuit is still pending. >The $1.4 billion is unlikely to make a dent in Meta’s business. The Menlo Park, California-based tech made a profit of $12.37 billion in the first three months of this year, Its revenue was $36.46 billion, an increase of 27% from a year earlier.

50
7
privacyguides
Privacy Guides CaptObvious 2 months ago 100%
Private Security Camera

I find that I need a security camera for my back yard. Do you folks recommend any particular makes & models? It should avoid the cloud but record locally. I'm somewhat handy with Linux and a RaspberryPi, if that helps. Thanks!

33
25
privacyguides
Privacy Guides ForgottenFlux 2 months ago 100%
KOSA passes Senate | ACLU: This bill would not keep kids safe, but instead threaten young people’s privacy, limit minors’ access to vital resources, and silence important online conversations for all arstechnica.com

>The Kids Online Safety Act (KOSA) easily passed the Senate today despite critics' concerns that the bill may risk creating more harm than good for kids and perhaps censor speech for online users of all ages if it's signed into law. >KOSA received broad bipartisan support in the Senate, passing with a 91–3 vote alongside the Children’s Online Privacy Protection Action (COPPA) 2.0. Both laws seek to control how much data can be collected from minors, as well as regulate the platform features that could harm children's mental health. >However, while child safety advocates have heavily pressured lawmakers to pass KOSA, critics, including hundreds of kids, have continued to argue that it should be blocked. >Among them is the American Civil Liberties Union (ACLU), which argues that "the House of Representatives must vote no on this dangerous legislation." >If not, potential risks to kids include threats to privacy (by restricting access to encryption, for example), reduced access to vital resources, and reduced access to speech that impacts everyone online, the ACLU has alleged. >The ACLU recently staged a protest of more than 300 students on Capitol Hill to oppose KOSA's passage. Attending the protest was 17-year-old Anjali Verma, who criticized lawmakers for ignoring kids who are genuinely concerned that the law would greatly limit their access to resources online. >"We live on the Internet, and we are afraid that important information we’ve accessed all our lives will no longer be available," Verma said. "We need lawmakers to listen to young people when making decisions that affect us."

50
0
privacyguides
Privacy Guides ForgottenFlux 2 months ago 100%
Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say techcrunch.com

>In a new academic paper, researchers from the Belgian university KU Leuven detailed their findings when they analyzed 15 popular dating apps. Of those, Badoo, Bumble, Grindr, happn, Hinge and Hily all had the same vulnerability that could have helped a malicious user to identify the near-exact location of another user, according to the researchers. >While neither of those apps share exact locations when displaying the distance between users on their profiles, they did use exact locations for the “filters” feature of the apps. Generally speaking, by using filters, users can tailor their search for a partner based on criteria like age, height, what type of relationship they are looking for and, crucially, distance. >To pinpoint the exact location of a target user, the researchers used a novel technique they call “oracle trilateration.” >The good news is that all the apps that had these issues, and that the researchers reached out to, have now changed how distance filters work and are not vulnerable to the oracle trilateration technique. >Neither Badoo, which is owned by Bumble, nor Hinge responded to a request for comment.

54
2
privacyguides
Privacy Guides ForgottenFlux 2 months ago 100%
US border agents must get warrant before cell phone searches, federal court rules techcrunch.com

>A federal district court in New York has ruled that U.S. border agents must obtain a warrant before searching the electronic devices of Americans and international travelers crossing the U.S. border. >The ruling on July 24 is the latest court opinion to upend the U.S. government’s long-standing legal argument, which asserts that federal border agents should be allowed to access the devices of travelers at ports of entry, like airports, seaports and land borders, without a court-approved warrant. >“The ruling makes clear that border agents need a warrant before they can access what the Supreme Court has called ‘a window into a person’s life,’” Scott Wilkens, senior counsel at the Knight First Amendment Institute, one of the groups that filed in the case, said in a press release Friday. >The district court’s ruling takes effect across the U.S. Eastern District of New York, which includes New York City-area airports like John F. Kennedy International Airport, one of the largest transportation hubs in the United States. >Critics have for years argued that these searches are unconstitutional and violate the Fourth Amendment, which protects against unwarranted searches and seizures of a person’s electronic devices. >In this court ruling, the judge relied in part on an amicus brief filed on the defendant’s behalf that argued the unwarranted border searches also violate the First Amendment on grounds of presenting an “unduly high” risk of a chilling effect on press activities and journalists crossing the border. >With several federal courts ruling on border searches in recent years, the issue of their legality is likely to end up before the Supreme Court, unless lawmakers act sooner.

129
2
privacyguides
Privacy Guides hellfire103 2 months ago 100%
Custom ROM for Android Tablet

cross-posted from: https://lemmy.ca/post/26065429 > Hey, all. I just bought a Samsung Galaxy Tab A7, and I would like to install a custom Android ROM on it. After a bit of research, my two options are LineageOS and Murena (aka /e/OS). > > Does one have any advantages over the other? Or is it simply a matter of preference?

6
1
privacyguides
Privacy Guides diy 2 months ago 90%
Crypto questions

1. When using Kraken to buy Monero, aren't you concerned about potential data breaches that could lead to identity theft? 2. How secure is Kraken when it comes to protecting user information? 3. If you use a no-KYC exchange like CakeWallet, aren't you worried about potential government investigations? I'd like to get your thoughts on these options I live in a EU member country

9
1
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 98%
I just learned about The Work Number, what are other methods of employee, medical, or financial data collection can I opt out of?

I tried looking for lists but didn't find any. The Work Number is US-specific and where your employers input your salary data for future employers to see. You can opt out here: https://employees.theworknumber.com/employee-data-freeze/.

58
4
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 100%
Anything wrong with using my real name in email aliases with organizations I have to communicate using my real identity anyway?

One example would be state disability programs, they already need my real name and identity to work with me. Are there any downsides to sharing a simplelogin alias containing my real name vs no containing my real name? I just think it would be easier record keeping for them.

30
6
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 100%
If you use Simplelogin with your iCloud email, how has your mileage been?

I just tried changing my email on studentaid.gov to a simplelogin alias (using SL is a habit at this point) and I got notifications that emails from it were bounced while trying to verify the email change with sent codes. I looked it up and found a bunch of Reddit posts about issues with SL and iCloud.

13
2
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 95%
Alternatives to Google Maps' timeline feature on iOS?

I want to keep a timeline of the places I go like Google Maps can, and export it to mac for my diary*. The maps app doesn't have to be great, it just needs to keep a timeline in the background, I would still use Apple Maps as my main navigation app. *(ideally I can automatically export it somehow, perhaps with the Shortcuts and Scriptable app but just tell me any apps with a timeline and export feature)

20
11
privacyguides
Privacy Guides buskill 2 months ago 100%
Presenting our DIY Dead Man Switch @ DEF CON 32 www.buskill.in

We're happy to announce that [BusKill is presenting at DEF CON 32](https://www.buskill.in/defcon32/). **What: Open Hardware Design for BusKill Cord When: 2024-08-10 12:00 - 13:45 Where: W303 – Third Floor – LVCC West Hall** | [![BusKill goes to DEF CON 32 (Engage)](https://www.buskill.in/wp-content/uploads/sites/8/defcon32_featuredImage1.jpg)](https://www.buskill.in/defcon32/) | |:--:| | [BusKill is presenting at DEF CON 32](https://www.buskill.in/defcon32/) | via [@Goldfishlaser@lemmy.ml](https://lemmy.ml/u/Goldfishlaser) # What is BusKill? BusKill is a laptop kill-cord. It's a USB cable with a magnetic breakaway that you attach to your body and connect to your computer. | [![What is BusKill? (Explainer Video)](https://github.com/BusKill/buskill-app/raw/master/docs/images/buskill_explainer_video_20211210.gif?raw=true)](https://www.buskill.in/#demo) | |:--:| | *Watch the [BusKill Explainer Video](https://www.buskill.in/#demo) for more info [youtube.com/v/qPwyoD_cQR4](https://www.youtube.com/v/qPwyoD_cQR4)* | If the connection between you to your computer is severed, then your device will lock, shutdown, or shred its encryption keys -- thus keeping your encrypted data safe from thieves that steal your device. # What is DEF CON? DEF CON is a yearly hacker conference in Las Vegas, USA. | [![DEF CON Documentary](https://media.defcon.org/DEF%20CON%2020/DEF%20CON%2020%20documentary/DEF%20CON%2020%20Documentary%201080p%20x264.mp4)](https://www.buskill.in/defcon32/) | |:--:| | *Watch the [DEF CON Documentary](https://www.youtube.com/watch?v=3ctQOmjQyYg) for more info [youtube.com/watch?v=3ctQOmjQyYg](https://www.youtube.com/watch?v=3ctQOmjQyYg)* | # What is BusKill presenting at DEF CON? I ([goldfishlaser](https://github.com/goldfishlaser)) will be presenting **Open Hardware Design for BusKill Cord** in a Demo Lab at DEF CON 32. **What: Open Hardware Design for BusKill Cord When: Sat Aug 10 12PM – 1:45PM Where: W303 – Third Floor – LVCC West Hall** Who: Melanie Allen ([goldfishlaser](https://github.com/goldfishlaser)) [More info](https://forum.defcon.org/node/249627) ## Talk Description BusKill is a Dead Man Switch triggered when a magnetic breakaway is tripped, severing a USB connection. I’ve written OpenSCAD code that creates a 3D printable file for plastic parts needed to create the magnetic breakaway. Should anyone need to adjust this design for variations of components, the code is parameterized allowing for easy customization. To assemble a BusKill Dead Man Switch cord you will need: 1. a usb-a extension cord, 2. a usb hard drive capable of being attached to a carabiner, 3. a carabiner, 4. the plastic pieces in this file, 5. a usb female port, 6. a usb male, 7. 4 magnets, 8. 4 pogo pins, 9. 4 pogo receptors, 10. wire, 11. 8 screws, 12. and BusKill software. | [![Image of the Golden BusKill decoupler with the case off](https://www.buskill.in/wp-content/uploads/sites/8/3d-print-2024-05_gold-300x225.jpg)](https://www.buskill.in/defcon32/) | |:--:| | Golden DIY BusKill Print | Full BOM, glossary, and assembly instructions are included in the [github repository](https://github.com/BusKill/usb-a-magnetic-breakaway). The room holds approx. 70 attendees seated. I’ll be delivering 3 x 30 min presentations – with some tailoring to what sort of audience I get each time. ## Meet Me @ DEF CON If you'd like to find me and chat, I'm also planning to attend: - ATL Meetup (DCG Atlanta Friday: 16:00 – 19:00 \| 236), - Hacker Kareoke (Friday and Sat 20:00-21:00 \| 222), - Goth Night (Friday: 21:00 – 02:00 \| 322-324), - QueerCon Mixer (Saturday: 16:00-18:00 \| Chillout 2), - EFF Trivia (Saturday: 17:30-21:30 \| 307-308), and - Jack Rysider’s Masquerade (Saturday: 21:00 – 01:00 \| 325-327) I hope to print many fun trinkets for my new friends, including some BusKill keychains. | [![Image shows a collection of 3D-printed bottle openers and whistles that say "BusKill"](https://www.buskill.in/wp-content/uploads/sites/8/defcon32_swag1-300x225.jpg)](https://www.buskill.in/defcon32/) | |:--:| | Come to my presentation @ DEF CON for some free BusKill swag | By attending DEF CON, I hope to make connections and find collaborators. I hope during the demo labs to find people who will bring fresh ideas to the project to make it more effective.

18
2
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 100%
Have you ever caught a marketing or spam email sent using one of your email aliases?

That's a use case for aliases, catching if any company or service gives out your email to be abused by advertisers and whatnot. I tried looking for stories but didn't find any, I wonder if you have any to share.

33
20
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 100%
Any Reddit frontends with logins?

I want to be logged in so I can do most things on Reddit like post and comment. I want it to be a web frontend rather than an app because I keep many tabs on Reddit open in my browser while doing research on things (like digital privacy for instance!). I did some searching and didn't find any currently working frontends with login support.

8
3
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 100%
PrivacyGuides@Lemmy.one: What are benefits for using privacy friendly frontends for apps like Reddit and YouTube compared to accessing them and using UBlock Origin?

It seems like the main benefit of such frontends is the lack of trackers and fingerprinting, but what if the browser, like Firefox, already did that with UBlock Origin and fingerprinting protection?

37
18
privacyguides
Privacy Guides TheTwelveYearOld 2 months ago 100%
Can I get help with getting my discuss.privacyguides.net account taken off hold?

It’s now been two weeks since I created an account and tried making a post, but immediately so I got a message saying my account is on hold. I tried emailing Jonah Aragon who’s listed on the site, and messaging the mods on the forum, but still haven’t heard back.

6
4
privacyguides
Privacy Guides ForgottenFlux 2 months ago 100%
As mind-reading technology improves, Colorado passes first-in-nation law to protect privacy of our thoughts www.cbsnews.com

>After all, the privacy of our mind may be the only privacy we have left.

89
3
privacyguides
Privacy Guides ForgottenFlux 3 months ago 100%
Now The EU Council Should Finally Understand: No One Wants “Chat Control” www.eff.org

>The EU Council has now passed a 4th term without passing its controversial message-scanning proposal. The just-concluded Belgian Presidency failed to broker a deal that would push forward this regulation, which has now been debated in the EU for more than two years. > >For all those who have reached out to sign the “Don’t Scan Me” petition, thank you—your voice is being heard. News reports indicate the sponsors of this flawed proposal [withdrew it because they couldn’t get a majority](https://netzpolitik.org/2024/victory-for-now-no-majority-on-chat-control-for-belgium/) of member states to support it. > >Now, it’s time to stop attempting to compromise encryption in the name of public safety. EFF has [opposed](https://www.eff.org/deeplinks/2022/06/eus-new-message-scanning-regulation-must-be-stopped) this legislation from the start. Today, [we’ve published a statement](https://edri.org/wp-content/uploads/2024/07/Statement_-The-future-of-the-CSA-Regulation.pdf), along with EU civil society groups, explaining why this flawed proposal should be withdrawn. > >The scanning proposal would create “detection orders” that allow for messages, files, and photos from hundreds of millions of users around the world to be compared to government databases of child abuse images. At some points during the debate, EU officials even suggested using AI to scan text conversations and predict who would engage in child abuse. That’s one of the reasons why some opponents have labeled the proposal “chat control.” > >There’s [scant public support](https://edri.org/our-work/press-release-poll-youth-in-13-eu-countries-refuse-surveillance-of-online-communication/) for government file-scanning systems that break encryption. Nor is there [support in EU law](https://www.eff.org/deeplinks/2024/03/european-court-human-rights-confirms-undermining-encryption-violates-fundamental). People who need secure communications the most—lawyers, journalists, human rights workers, political dissidents, and oppressed minorities—will be the most affected by such invasive systems. Another group harmed would be those whom the EU’s proposal claims to be helping—abused and at-risk children, who need to securely communicate with trusted adults in order to seek help. > >The right to have a private conversation, online or offline, is a bedrock human rights principle. When surveillance is used as an investigation technique, it must be targeted and coupled with strong judicial oversight. In the coming EU council presidency, which will be led by Hungary, leaders should drop this flawed message-scanning proposal and focus on law enforcement strategies that respect peoples’ privacy and security. > >Further reading: >- [EFF and EDRi Coalition Statement on the Future of the CSA Regulation](https://edri.org/wp-content/uploads/2024/07/Statement_-The-future-of-the-CSA-Regulation.pdf)

144
2
privacyguides
Privacy Guides ForgottenFlux 3 months ago 100%
Hack of Age Verification Company Shows Privacy Danger of Social Media Laws www.eff.org

>We’ve said it before: online age verification is incompatible with privacy. Companies responsible for storing or processing sensitive documents like drivers’ licenses are likely to encounter data breaches, potentially exposing not only personal data like users’ government-issued ID, but also information about the sites that they visit. > >This threat is not hypothetical. This morning, 404 Media reported that a major identity verification company, AU10TIX, left login credentials exposed online for more than a year, allowing access to this very sensitive user data. > >A researcher gained access to the company’s logging platform, “which in turn contained links to data related to specific people who had uploaded their identity documents,” including “the person’s name, date of birth, nationality, identification number, and the type of document uploaded such as a drivers’ license,” as well as images of those identity documents. Platforms reportedly using AU10TIX for identity verification include TikTok and X, formerly Twitter. > >Lawmakers pushing forward with dangerous age verifications laws should stop and consider this report. Proposals like the federal Kids Online Safety Act and California’s Assembly Bill 3080 are moving further toward passage, with lawmakers in the House scheduled to vote in a key committee on KOSA this week, and California's Senate Judiciary committee set to discuss AB 3080 next week. Several other laws requiring age verification for accessing “adult” content and social media content have already passed in states across the country. EFF and others are challenging some of these laws in court. > >In the final analysis, age verification systems are surveillance systems. Mandating them forces websites to require visitors to submit information such as government-issued identification to companies like AU10TIX. Hacks and data breaches of this sensitive information are not a hypothetical concern; it is simply a matter of when the data will be exposed, as this breach shows. > >Data breaches can lead to any number of dangers for users: phishing, blackmail, or identity theft, in addition to the loss of anonymity and privacy. Requiring users to upload government documents—some of the most sensitive user data—will hurt all users. > >According to the news report, so far the exposure of user data in the AU10TIX case did not lead to exposure beyond what the researcher showed was possible. If age verification requirements are passed into law, users will likely find themselves forced to share their private information across networks of third-party companies if they want to continue accessing and sharing online content. Within a year, it wouldn’t be strange to have uploaded your ID to a half-dozen different platforms. > >No matter how vigilant you are, you cannot control what other companies do with your data. If age verification requirements become law, you’ll have to be lucky every time you are forced to share your private information. Hackers will just have to be lucky once.

208
11
privacyguides
Privacy Guides Upstream7564 3 months ago 100%
Are there any guides, tutorials or similar on how to use Steam more privately?

cross-posted from: https://discuss.tchncs.de/post/18038249 > Are thwre guides, tutorials or similar on how to use Steam more privately? > > I'm at a point where I'd like to play certain games, but I dislike that they're exclusively available on consoles and Steam for Desktop. Steam's Privacy Policy and Terms of Service raise concerns about my personal security and privacy. I'm looking for advice on how to improve my privacy while using Steam. > > Thank you in advance! > > (I will use Steam on Linux)

19
6