this post was submitted on 12 Nov 2024
272 points (98.9% liked)

Privacy

32159 readers
529 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] RagnarokOnline@programming.dev 50 points 2 weeks ago (1 children)

A lot of practical steps, which is nice to see in an article like this.

[–] sunzu2@thebrainbin.org 19 points 2 weeks ago

That iphone drama might actually lead to proper interest from normie core?

[–] tekato@lemmy.world 30 points 2 weeks ago (2 children)

I doubt somebody running from a government is taking their tips from wired.com

[–] stembolts@programming.dev 9 points 2 weeks ago (1 children)

You're right, ha, I'm totally not.. they, I mean they are totally not! You got it guy! Everyone listen to this guy! I'd go as far as to say anyone reading this article is innocent of ALL crimes!

[–] zqps@sh.itjust.works 3 points 2 weeks ago

People commenting however...

Don't challenge me

[–] surph_ninja@lemmy.world 26 points 2 weeks ago (3 children)

Too bad private email access is essentially dead. Any service not requiring another email or phone number to sign up gets quickly shut down. A casualty in the war on whistleblowers.

[–] uncrme@lemmy.world 11 points 2 weeks ago (1 children)

email is never private, if its that sensitive it just shouldn't go on the internet

[–] adespoton@lemmy.ca 5 points 2 weeks ago

Exactly; email is digital post cards and always has been.

Of course, that means I can encrypt a message and use someone else’s email account to send it :)

[–] xapr@lemmy.sdf.org 9 points 2 weeks ago (1 children)

You can sign up for Proton mail without providing email or phone number, as far as I recall.

[–] surph_ninja@lemmy.world 1 points 1 week ago (24 children)

Nope. Try doing it through a Tor node.

[–] refalo@programming.dev 2 points 1 week ago (1 children)
load more comments (1 replies)
load more comments (23 replies)
[–] sunzu2@thebrainbin.org 5 points 2 weeks ago (15 children)
[–] ComradeMiao@lemmy.world 2 points 2 weeks ago

Not in my experience

load more comments (14 replies)
[–] dingdongitsabear@lemmy.ml 25 points 1 week ago

anyone dunking on the article, this is pretty far away from a how-to-lilst; it's more of a "think about these things if you haven't up until now" and as such a net positive. wrong community for it, though.

[–] shortwavesurfer@lemmy.zip 11 points 2 weeks ago (2 children)

I'm glad they mentioned Monero in the article, but sad that they mentioned it alongside Zcash since Zcash is not private by default and not many people opt into the privacy and Zcash has shown willingness to be bad to their users by helping exchanges. Primarily because they are run by the Electric Coin Company, which is registered in the United States, and therefore they have to obey the laws of the United States. So, Zcash is not a good option.

[–] toastal@lemmy.ml 1 points 1 week ago (1 children)

Shielded addresses & transactions are private using zero-knowledge proofs like Monero. You can also have transparent addresses & transactions like how Bitcoin operates on Zcash as well which is true. But there isn’t a default, some wallets autoshield by default making your comment misinformation.

[–] shortwavesurfer@lemmy.zip 2 points 1 week ago (3 children)

Some wallets shielding their transactions by default is still not nearly as strong as everything being shielded by default at the protocol level, but they couldn't have that because then they would not be on exchanges.

load more comments (3 replies)
[–] EngineerGaming@feddit.nl 1 points 1 week ago (1 children)

I also have not seen Zcash accepted as payment nowhere nearly as frequently as Monero.

[–] Mettled@reddthat.com 8 points 2 weeks ago (4 children)

Switch phone service to VoIP, cancel cell service, all tracking capabilities is gone.

[–] G7dX5kWz9V2R@reddthat.com 17 points 2 weeks ago (1 children)

A lot of organizations now block VOIP numbers thanks to stringent KYC laws.

[–] Mettled@reddthat.com 4 points 2 weeks ago (2 children)

It is possible to get a real cell number from a big name carrier and then port the number to VoIP company to use VoIP service with an original cell number.

[–] EngineerGaming@feddit.nl 4 points 2 weeks ago* (last edited 2 weeks ago) (1 children)

In a lot of places, cell carriers enforce KYC too though.

load more comments (1 replies)
[–] refalo@programming.dev 2 points 1 week ago (1 children)

Maybe, but if anything bad happens to originate from that number, the port history is still visible and now they have a suspect.

load more comments (1 replies)
[–] LEVI@feddit.org 16 points 2 weeks ago

That's just wrong when you're dealing with the government

[–] terminhell@lemmy.dbzer0.com 15 points 2 weeks ago (7 children)

Iirc any cell phone is still capable of dialing 911(or equivalent) even without a sim. So id imagine carrier towers and gps could still find it. You'd basically have to keep the device in a ferriday bag. Which complicates actually using it.

[–] shortwavesurfer@lemmy.zip 14 points 2 weeks ago

That is correct. Any cell phone sold in the United States by law is supposed to be able to dial 911 no matter whether they have a SIM card inserted or not and no matter whether they have service on a SIM card or not and also no matter whether one specific carrier in your area has no signal it will use the others instead. You may be a Verizon customer, but if you dial 911 and an AT&T tower picks up the call first, the AT&T network will serve that call instead.

[–] adespoton@lemmy.ca 11 points 2 weeks ago* (last edited 2 weeks ago)

One clarification: carrier towers can still find a phone; GPS is passive; your phone locates itself in relation to the GPS satellites.

Most phones are also broadcasting WiFi MAC IDs and Bluetooth MACs, plus hardware and capability strings over Bluetooth. And then any apps you’ve got loaded may also be calling home with your location unless you have that disabled and rotate your ad ID regularly.

[edit] also worth pointing out that even if you turn a smartphone “off” it still pings the local cell towers with its IMEI regularly. Surprised me the first time I witnessed that.

load more comments (5 replies)
[–] EngineerGaming@feddit.nl 8 points 2 weeks ago (5 children)

You're just shifting trust though - may be good in some cases, but not universal. Aldo does nothing about the cell tower connections tracking the location.

load more comments (5 replies)
load more comments
view more: next ›