Recent comments in /f/Privacy

santorihelix wrote

It's pretty sad that most schools require Zoom despite them being pieces of shit. I don't really get why. It's not like Zoom has amazing functionalities that trump over stuff like Jitsi. I've been using Jitsi for a while now and I've literally lost zero functionality. I just send the students the meeting link and they open it on their browser and voila.

1

santorihelix wrote

Tor Browser. I like not having to think about the stuff you mentioned. If you don't want to route over Tor for some reason, I'd suggest SecBrowser. It's Tor Browser without the Tor routing. With this, while having security, you don't even have to worry about fingerprinting since it's the same as regular Tor and you won't be making yourself unique with the addons you'd need to install on other browsers.

2

icychkn wrote

I moved from Firefox to Palemoon a while back and use it with a few extensions, including Secret Agent. Quite nice for poisoning any fingerprinters. It's Firefox with a few settings for privacy set by default.

The only issue I have with it is it's default homepage points to https://palemoon.start.me/start which is powered by startme.com. But that's easily changed.

Palemoon Homepage: https://www.palemoon.org

Secret Agent Homepage: https://www.dephormation.org.uk/?page=81

2

sudoer777 wrote

I'm using uBlock Origin, uMatrix, Cookie AutoDelete, Privacy Badger, Privacy Possum, Multi Account Containers, Facebook Container, Temporary Containers, ClearURLs, LocalCDN, Invidition, Redirector (for redirecting to Teddit). My setup is overkill lol

2

Rambler wrote

Good question.

I think most people are aware of the privacy aspects, at least subconsciously. Even those who are just your normal, every day, average internet users who have zero technical background make jokes about, "Wow, I was talking about this with a friend and now I'm seeing ads for it everywhere." So, in a sense, they're aware but they they think it's coincidental or not a big deal that they're receiving targeted ads. Some, may even find it convenient.

For fun, here is a list of some large data breaches in the recent years that would impact your normal, every day internet user:

(List below made from https://www.upguard.com/blog/biggest-data-breaches )

  • CAM4, an adult streaming website, data breach with 10.88 billion records including: Full names, Email addresses, Sexual orientation, Chat transcripts, Email correspondence transcripts, Password hashes, IP addresses, Payment logs.

  • Yahoo. The data breach of 2017 with an impact of over 3 billion users. An investigation revealed that users' passwords in clear text, payment card data and bank information were not stolen. Nonetheless, this remains one of the largest data breaches of this type in history.

  • Aadhaar data breach of 2017 impacted over 1.1 billion people. This massive data breach was the result of a data leak on a system run by a state-owned utility company. The breach allowed access to private information of Aadhaar holders, exposing their names, their unique 12-digit identity numbers, and their bank details.

  • First American Financial Corp. In May 2019, First American Financial Corporation reportedly leaked 885 million users' sensitive records that date back more than 16 years, including bank account records, social security numbers, wire transactions, and other mortgage paperwork.

  • Verifications.io data breach. In February 2019, email address validation service verifications.io exposed 763 million unique email addresses in a MongoDB instance that was left publicly facing with no password. Many records also included names, phone numbers, IP addresses, dates of birth and genders.

  • Facebook, impacting 540 million users.. In April 2019, the UpGuard Cyber Risk team revealed two third-party Facebook app datasets had been exposed to the public Internet. One, originating from the Mexico-based media company Cultura Colectiva, weighs in at 146 gigabytes and contains over 540 million records detailing comments, likes, reactions, account names, FB IDs and more.

So, you asked:

You think this topic will be important for general public in years to come? Why?

It absolutely should be. 110% should be. But some people just don't care. A lot of the, "Well I have nothing to hide" crowd will willingly give away their information and not be absolutely outraged when it's misused or made available to the public through negligence or through malicious intent (or a combo of both).

3

nameless121 wrote

You dont have to. But personally I will just simply comply because it is far more convenient and less time consuming than fighting the law enforcement over such a minor issue especially when you know that you have done nothing illegal. The purpose of me encrypting my data is to prevent it from falling into criminals' hand, not to give law enforcements a hard time when they are trying to strike my name off the suspect list.

2

rianav_a wrote (edited )

There were a couple other cases like this (one in the UK IIRC): https://arstechnica.com/tech-policy/2020/02/man-who-refused-to-decrypt-hard-drives-is-free-after-four-years-in-jail/

The dissenting opinion was interesting, I wonder if this got kicked upstairs or did the prosecutors have other fish to fry.

1

xaen wrote

Key Disclosure Law

within the united states your passwords are protected by the 5th amendment.

fyi at the border it's more of a grey area and they are trying to coerce and compel you to including some possible notion of holding the device for a week or so to inspect it before returning it. You still do not legally need give them the password or entry into the device.

keep in mind, fingerprints and other biometrics are not passwords and for a long time were not protected in the same way. In 2019 it was ruled in Cali to get the same protection, but I'm not sure how far that runs Link

3

santorihelix wrote (edited )

From what I gather, judges usually rule key disclosure when the government already knows the information in the device and it's not for getting new evidence but making the evidence available to the court. In any case I don't think the cops can just lawfully request your key, like they can't search your house without a warrant on normal occasions. My question is what happens if you forgot your password for real? Is there any possibility for them to deny that you forgot it except rubber-hose cryptanalysis?

Source: https://en.wikipedia.org/wiki/Key_disclosure_law#United_States

2