28
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 17 Dec 2023
28 points (88.9% liked)
Privacy
32177 readers
348 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
We often talk about threat models here in the privacy community. But I just want to illustrate how different threat models can be.
There is a universe of difference between worrying about what a district attorney can use in criminal court based on evidence rules for drug-related charges that could put somebody away for 5 to 10 years in prison.
And worrying about a totalitarian murder squad picking up your friends and family and torturing them just in case they know something. When members of your cell disappear based on suspicion no evidence required.
These threat models are massively different, doing anything that even raises suspicion gets people killed... I'm not saying it invalidates our online discussions, but when the stakes are higher what people actually use, and experiment with, and are willing to put up with changes.
And by raises suspicion, I'm not just talking about an intelligence officer, I'm talking about algorithms just saying oh this account's interesting let's target it. Just like Israel is currently doing right now, to automatically identify hamas-based targets of interest. We have no idea what's going into that algorithm, it might be hey this phone has briar installed let's bomb it