communism

joined 8 months ago
[–] [email protected] 2 points 23 hours ago

Unless law enforcement is out to get ya

Seems like a huge oversight in privacy communities, which are frequented by people with state actor level threat models.

[–] [email protected] 1 points 2 days ago

If only the user has the key then there's no real concern with the data being handed over

[–] [email protected] 2 points 2 days ago (2 children)

Sure, but tracking period data can be very helpful for people. For a threat model of abortion criminalisation (or maybe trans healthcare criminalisation with treatments stopping periods, or really any kind of restrictions on medical autonomy), encryption at rest of locally stored period data is perfectly sufficient. They are not going to send military intelligence agencies after a random person having an abortion. It is actually a relatively low threat model, like equivalent to buying drugs online or something like that.

[–] [email protected] 4 points 2 days ago

I wonder how many average users would be bothered to export their period database and transfer to a new phone every time they get a new phone. I do that when I get a new phone (not often, I use my phones till they break/are literally unusable and unfixable), but I've had real trouble getting other people to do these kinds of things.

[–] [email protected] 4 points 3 days ago

That's true. I use user profiles on GrapheneOS and have to have each profile count as its own device in Mullvad, when obviously I'm not going to be using them simultaneously.

[–] [email protected] 2 points 3 days ago

How are you trying to using WG? I had issues with wg quick up or whatever it is, not bothered to check, but adding wireguard connections as NetworkManager interfaces works flawlessly for me.

[–] [email protected] 6 points 1 week ago (1 children)

Even if they owned the whole LF, the Linux Foundation does not develop systemd lol

[–] [email protected] 47 points 1 week ago (3 children)

How is that inconsiderate? That's just informal

(Using "bi" to mean "bisexual", I mean, not "business intelligence" lol)

[–] [email protected] 1 points 1 week ago

Well I know that, that's kind of the point of any encryption at rest that isn't also E2EE. I am the server admin in this case so I trust my own pinky promise that I'm encrypting emails at rest.

[–] [email protected] 3 points 2 weeks ago

Yeah you should turn it off, Mullvad's DNS servers already give you DNS privacy. I forget which DNS servers Firefox's DoH uses, but it will use some other DNS servers for Firefox with DoH enabled, which presumably you don't want if you went out of your way to set your DNS servers to Mullvad's.

[–] [email protected] 4 points 2 weeks ago

Fuuuuck there goes my plan to get this monkey to write Hamlet within the lifetime of the universe...

[–] [email protected] 2 points 2 weeks ago

Thanks for all the links!

 

I was interested in hosting my own mail server that provides a similar level of privacy for users as Protonmail, ie the server admin cannot read any emails, even those which are not E2EE with PGP. Is there a self-hostable solution to this?

I'm aware the server admin can't read emails that were sent encrypted using the user's PGP key, but most emails I get are automated emails from companies/services/etc without the option to upload a public key to send the user encrypted email. If you're with a service like Protonmail, the server admin still cannot read even these emails.

 

I've been reading through Signal's government requests and couldn't find a similar section on Mullvad's website. I'd be curious to read about them if there are any. It would seem unlikely to me that Mullvad has never received any kind of court order for information about a user.

 

There are other FOSS real-time voice changers for Linux, but the others I found either seemed to have fewer features, be less polished, or be abandoned.

I'm not really a voice expert or anything so I'm not sure what aspects of voice a, like, forensic voice analyst or something would look at. I've just changed the pitch and I sound different enough that I wouldn't recognise the voice, which is good enough for me. Open to suggestions as to what effects would give the most privacy in terms of making it harder to identify your voice (while still being intelligible)

Also, for people's reference, if you want mic input to be changed for all apps, go to three dots > Preferences > General > Audio > Process All Input Streams and enable.

 

I sometimes get linked google docs links and would like to view them without visiting a google site directly.

 

Digital privacy seems quite straightforward, because your digital devices are environments you more or less can have complete control over if you want to. But when you're out and about, it's a much more uncontrolled environment. There are cameras everywhere.

I wear face masks everywhere for a combo of protecting myself from illness and privacy. But the limitation is social acceptability. If anything good came out of covid it's the normalisation of face masks, but you are far from unidentifiable if your only face covering is a covid mask. We're lucky that sunglasses and hoodies on their own are fairly normal, but all of the above in combination would draw attention to you. And it's definitely not socially acceptable to walk around in a balaclava.

The other thing is forensic data. If you don't wear gloves, you'll leave fingerprints everywhere, and hair too. I suppose wearing gloves is not particularly seen as weird or suspicious, but it just seems like there are a lot of considerations and challenges with preventing the state from knowing your every move when you leave the house.

What considerations do you make for IRL privacy, if any?

(Not particularly interested in "I don't care about IRL privacy so I don't do anything"—that's fine and your choice, but ofc this question is aimed towards those who do care)

 

I've gotten prepaid sims for things but obviously that's not really a feasible method for your main life phone.

view more: next ›