1
21
2
40
3
54
4
14
submitted 2 weeks ago* (last edited 2 weeks ago) by Babalugats@lemmy.world to c/privacy@lemmy.world

Google image results are shit on purpose. They used to be better (long before AI). I am guessing that they use the pretence that it's all about porn. But they do it for tools, equipment, stereos etc.. to give bad results. Are they getting paid (yet) to return bad results?

Manipulating search results for profit is something that they already do, and targeted adverts. So it's not that much of a stretch. I was just wondering if it is acknowledged already.

5
11
As Easy As PGP (blog.rottenwheel.com)
6
3
submitted 2 weeks ago* (last edited 2 weeks ago) by Kalcifer@sh.itjust.works to c/privacy@lemmy.world

By "push server" I mean something like Ntfy.sh.


Cross-posts

7
50
So you want privacy? (en.wikipedia.org)
submitted 2 weeks ago by TCB13@lemmy.world to c/privacy@lemmy.world

The most severe restrictions to the general public are imposed within a 20-mile (32 km) radius of the Green Bank Observatory.[5] The Observatory polices the area actively for devices emitting excessive electromagnetic radiation such as microwave ovens, Wi-Fi access points and faulty electrical equipment and request citizens discontinue their usage. It does not have enforcement power[6] (although the FCC can impose a fine of $50 on violators[7]), but will work with residents to find solutions.

8
60

Months after a trove of personal data it had collected was stolen, US data broker National Public Data has filed for bankruptcy. In its filing the company admits that the number of people impacted by the data theft is much higher than previously reported.

Earlier this year personal data belonging to “hundreds of millions” of people was stolen from US data broker National Public Data. The company admitted to the scope of the theft in a bankruptcy filing. Several outlets are reporting on the story.

National Public Data indicated that the stolen data included names, addresses, email addresses, telephone numbers and social security numbers. National Public Data’s parent company Jerico Pictures admits that there are “hundreds of millions of potentially impacted individuals.” According to the news site TechCrunch, security experts estimate the number of stolen Social Security numbers to be around 270 million.

Of all the information stolen, the Social Security numbers are considered especially sensitive, because they can be used as proof of identity – meaning criminals could potentially use the information to commit identity theft.

9
23
submitted 3 weeks ago* (last edited 3 weeks ago) by Sunny@slrpnk.net to c/privacy@lemmy.world

Open source 2FA authenticator, with end-to-end encrypted backups

Auth provides end-to-end encrypted cloud backups so you don't have to worry about losing your tokens. Our cryptography has been externally audited.

Auth has an app for every platform. Mobile, desktop and web. Your codes sync across all your devices, end-to-end encrypted.

Auth also comes with Offline mode, tags, icons, pins, import/export and more

10
11
11
178

They are literally everywhere. I can't go any place without being watched. I just want some privacy. The most alarming part is that they put cameras on all entrances and exits so they can know who's entering or leaving. Why do they need to stalk me as I go about my day? The area I live in is overall pretty safe so I don't see the justification.

I have also noticed that some people actually feel safe where there are cameras. I get that people can get scared but I don't think creating a giant network of mass surveillance is the answer.

What is this dystopian future we have marched into.

12
70

Right of passage I suppose

13
15
submitted 4 weeks ago* (last edited 4 weeks ago) by Bluetreefrog@lemmy.world to c/privacy@lemmy.world

It was started by one of the grandfathers of computing/the web/the internet, but I'll be damned if I can remember what it was called and my DuckDuckGo-Foo is failing me today.

14
39

cross-posted from: https://lemmy.world/post/21142663

After federal police came to an employee’s house to ask questions, encrypted messaging company Session has decided to leave Australia and switch to a foundation model based in Switzerland.

15
15
submitted 1 month ago by dawid@lemmings.world to c/privacy@lemmy.world

it is a concern to me because there is no plan to do security audit despite people asked about ti in the past.

https://github.com/rustdesk/rustdesk/discussions/8392

https://github.com/rustdesk/rustdesk/discussions/4968

Not in their roadmap

https://github.com/rustdesk/rustdesk/discussions/918

people had concerns about the company:

https://www.reddit.com/r/rustdesk/comments/11nu94y/is_rustdesk_a_scam/

As HN: RustDesk Installs Chinese Root Certificates

https://news.ycombinator.com/item?id=39256493

16
137

As if anybody here needs a reason to be wary of what you do online, this essay shares how a foreign adversary used back doors that were intentionally put in place to spy on Americans and how the rest of the world probably has the same back doors.

I especially appreciate the phrase "nerd harder" and the quote, "The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia".

How can IT folk help politicans to understand?

17
85

cross-posted from: https://lemmy.world/post/20620106

48-page report urges FTC, FCC to investigate connected TV industry data harvesting.

The companies behind the streaming industry, including smart TV and streaming stick manufacturers and streaming service providers, have developed a "surveillance system" that has "long undermined privacy and consumer protection," according to a report from the Center for Digital Democracy (CDD) published today and sent to the Federal Trade Commission (FTC). Unprecedented tracking techniques aimed at pleasing advertisers have resulted in connected TVs (CTVs) being a "privacy nightmare," according to Jeffrey Chester, report co-author and CDD executive director, resulting in calls for stronger regulation.

18
85
submitted 1 month ago* (last edited 1 month ago) by jawa21@lemmy.sdf.org to c/privacy@lemmy.world

Make sure that you tell your registrar that you want to be anonymous.

Edit: wow I missed the phone number censor. I guess that proves my point even farther.

19
43
20
17

cross-posted from: https://lemmy.world/post/20402370 or https://lemm.ee/post/43793474

Technically, I have some online activity I could try to refer to for work purposes, but it would mean sharing content tied to usernames/profiles I think of more as casual and personal. I could delete those profiles and move the relevant work to usernames/profiles I'm willing to share, but then I'm less likely to use those as much for portfolio building as I wouldn't want to contribute/do things online under a more public-facing profile, or link my personal ones to said profile.

Any which way I think about it involves crossing private/public streams I'd prefer to keep uncrossed, but I'm thinking I may be overlooking some compromises that could work, so what might those be?

21
38
22
248
submitted 2 months ago by lemmee_in@lemm.ee to c/privacy@lemmy.world

On Monday a new version of the globally unprecedented EU bill aimed at searching all private messages and chats for suspicious content (so-called chat control or child sexual abuse regulation) was circulated and leaked by POLITICO soon after. According to the latest proposal providers would be free whether or not to use ‘artificial intelligence’ to classify unknown images and text chats as ‘suspicious’. However they would be obliged to search all chats for known illegal content and report them, even at the cost of breaking secure end-to-end messenger encryption. The EU governments are to position themselves on the proposal by 23 September, and the EU interior ministers are to endorse it on 10 October. Messenger providers Signal and Threema have already announced that they will never agree to incorporate such surveillance routines into their apps and would rather shut down operations in the EU.

23
19
submitted 2 months ago by lemmee_in@lemm.ee to c/privacy@lemmy.world

Law enforcement agencies in Germany have monitored Tor servers for months to identify individual users. The agencies managed to identify a server of the ransomware group Vanir Locker that the group operated from within the Tor network.

The group announced that it would release copied data from one of its latest coups on the server. Law enforcement agents managed to identify the location of the server by using a technique that is called Timing Analysis.

Reporters from ARD, a publicly financed broadcasters, were able to view documents that confirmed four successful identifications in a single investigation, according to reports. Agencies used the technique to identify members of a child abuse platform.

24
25
submitted 2 months ago by noodlejetski@lemm.ee to c/privacy@lemmy.world

cross-posted from: https://lemm.ee/post/42694373

Leak on latest #ChatControl attempt (in German): https://netzpolitik.org/2024/interne-dokumente-sperrminoritaet-gegen-chatkontrolle-wackelt/ +++ Only AUT, DEU, EST, LUX, POL, SVN were critical – no blocking minority! +++ BEL, CZE, FIN, ITA, NLD, PRT, SWE undecided +++ EU legal experts confirm violation of our fundamental rights +++ Only 5 days to next discussion +++

Help pressure our governments into defending our #privacy of correspondence and secure #encryption now: https://www.patrick-breyer.de/en/take-action-to-stop-chat-control-now/

25
5

This is straightforward with browser addons like uBlock Origin where you can add and choose blocklists, but I did searches for doing so system wide and using a VPN but didn’t find clear answers. I could use a DNS service that provides blocklists but isn’t it best practice to leave DNS to the VPN provider? I looked up blocklists and VPNs but didn’t find relevant results.

On Android, I didn’t find any apps that let you filter blocklists and using your own VPN other than Rethink, but the blocklists feature requires using Rethink’s DNS.

So what’s the best way to filter ads and trackers on both 3rd party apps and on OS’s like Android (specific Samsung phones) while still using a VPN?

view more: next ›

Privacy

4027 readers
1 users here now

A community for Lemmy users interested in privacy

Rules:

  1. Be civil
  2. No spam posting
  3. Keep posts on-topic
  4. No trolling

founded 1 year ago
MODERATORS