Recent comments in /f/Privacy
bengalthe3rd wrote
Reply to Surf the web safely with Kicksecure OS by kicksecure
I use linux mint 22
guidry wrote
Reply to Google Account Without Real Phone Number by 0x45
i saw online read only phone once, or VOIP swap number possibility. but maybe we can also share fake account. Would need some for a cloud GPU PAAS project using google collab as a showcase
aaa wrote
Reply to Google Account Without Real Phone Number by 0x45
Pretty sure you don't need a number when signing up on a chromebook, never tried it myself but heard of people buying cheap ones just to create gmails.
codrus wrote
I forget what it is called, but AMD has their own version as well.
blueraspberryesketimine wrote
Reply to comment by righttoprivacy in Hardware Backdoors: Intel Management Engine by righttoprivacy
The management engine cannot be completely disabled in intel chips that ship with it because some of the things it handles are required for the chip to actually work. Really, you are better served by getting a chip without a management engine. Most AMD chips have their own version of the intel management engine, so they aren't safe. ARM boards are usually a little safer but not all. All of the Apple chips have a technology very similar to management engine built in. I don't know about the RISC-V boards but they are borderline trash so far anyway so they aren't a great escape route either.
righttoprivacy OP wrote (edited )
Reply to comment by Saint_Cuthbert in Hardware Backdoors: Intel Management Engine by righttoprivacy
Personally, I've been using older models allowing at least majority neutering of Intel management engine.
coreboot Thinkpads come to mind.
My personal machines are not the "full ME removal", but vast majority partitions, leaving just what is needed to bring up hardware.
Outside this, there are more "modern" options out there from companies, albeit not removed in same way (disabled under HAP bit and others). Some prefer Arm.
But everyone has a different use cases. I want to be able to use Qubes as an option at times, and some older models are not capable of this. T430 (i5-3320M and greater CPU) and later mostly have the right virtualization options for it.
I see UEFI / BIOS being #1 concern along with some network cards that work along with it. Some for AMT.
It is a shame there aren't more options out there.
Saint_Cuthbert wrote
I have heard about Intel putting backdoors in their chips. Is there a good alternative? The puri.sm librum computers theoretically wouldn't be safe, since I believe that they use intel chips.
TronNerd82 wrote
Better time than ever for me to finally ditch my iPhone for a Librem 5, I guess.
syndie OP wrote
Reply to A Guide to Installing and Using Syndie by syndie
I hope my guide helps you.
sovereign OP wrote (edited )
Reply to comment by Saint_Cuthbert in Congress is Unconstitutionally Criminalizing Privacy (USA) by sovereign
I Agree with you.
Saint_Cuthbert wrote
Reply to comment by sovereign in Legal Plunder: Indiana Police Prey On Packages Transiting Huge FedEx Hub by sovereign
Or maybe they're the ones who have something to hide, lol.
sovereign OP wrote
Reply to comment by Saint_Cuthbert in Legal Plunder: Indiana Police Prey On Packages Transiting Huge FedEx Hub by sovereign
That they do!
Saint_Cuthbert wrote
That would be a violation of "illegal search and seizure." Nowadays, they assume guilty until proven innocent.
Saint_Cuthbert wrote
Criminalize privacy. Criminalize arm-bearing. Criminalize free speech. If these people were God, they would have no need to do so to maintain control, but the fact that they try shows how vulnerable they truly are.
ManMan wrote
Reply to Cars have become computers on wheels — and police have easy access to their data by righttoprivacy
If I ever need a new car for whatever reason I am going to rip all that shit out.
ManMan wrote
Sounds like a good idea, but it cannot be done effectively without tracking people A LOT.
chatrouge wrote (edited )
You have your entire name on your github, afterwards clicking on your github account lets me go to your LinkedIn... It's surprising how much you can find about someone just by searching their name or LinkedIn link.
Your code uses HTTP GET for its messaging, instead of post. I assume it is to make it easier for people who are listening to copy packages and just spam them. The software does not even have a simple checksum or any way to even remotely attempt to see if it is tampered. Why not have a P2P or Swarm like software. I am not trusting you with my privacy Umut.
This is at best a hobby project that you should keep to yourself. Horrible opsec btw.
sujoro35 wrote
open up borders crime goes up people getting desperate Offer totalarian surveillance Offer accepted and even demanded fat lazy cat begins to smile
righttoprivacy wrote (edited )
Reply to The Internet of Bodies by Saint_Cuthbert
Relatable Noah Yuval Harari quote:
“and covid is critical because this is what convinces people to accept to legitimize total biometric surveillance. If we want to stop this epidemic we need not just to monitor people we, need to monitor what's happening under the skin.” Yuval Noah Harari
"Total."
cancername wrote
Reply to The Tor Project responded to claims that law enforcement can deanonymize Tor users by righttoprivacy
Tor staff wrote some neat blog posts explaining the attack:
Saint_Cuthbert wrote
Reply to The Tor Project responded to claims that law enforcement can deanonymize Tor users by righttoprivacy
Lesson learned: don't trust your life to anything that anonymizes or claims to anonymize you. Someone may always be watching.
Saint_Cuthbert wrote (edited )
Reply to Billionaire Thinks Aloud: Mass Surveillance AI Can Keep Citizens On Best Behavior by righttoprivacy
This is a rather erroneous notion to think that surveillance will improve behavior. During the covid lockdowns in 2020, New York required citizens to send them pictures of people who were violating quarantine. Needless to say, it wasn't very effective.
NotQball wrote
Reply to Anon File Upload - A tool for uploading/downloading files anonymously with client-side encryption by Super_gamer46861
2GB max. Any feedback?
NotQball wrote
Your i2p skills look great. I would have added Postman links to the book.
The actual content is recycled crap: XMPP, Retroshare for i2p would have made better sense.
In a lot of cases professionals from Vulkan use pay phones and the Spok network (subscription and equipment). I did have more complicated equipment. Live Long and Prosper!
JupiterMarket wrote
Reply to Google Account Without Real Phone Number by 0x45
Buy a cheap prepaid sim?