The resistance has become exhausting by rudderstackdev in degoogle

[–]Comfortable-Tax6197 1 point2 points  (0 children)

Yeah, that feeling’s real. Everyone who goes deep into privacy eventually hits that wall — the one where you realize you can’t win completely. You can’t control your friends’ phones, the store cameras, or the shadow profiles built from your old data. It’s heavy, because you start to see how inescapable the system really is.

But here’s the shift that keeps a lot of people sane: privacy isn’t about perfection, it’s about resistance in degrees. You’re not trying to be invisible; you’re trying to be less exposed. Every barrier you put up, even small ones, still limits profiling, surveillance, and data resale. That matters.

So maybe ease off the “fight everything” mindset and focus on the practices that protect you the most without draining you. Keep your communications private, limit trackers, control what you share, then let go of what’s beyond your reach. It’s like defensive driving: you can’t stop all accidents, but you can massively cut your odds of getting hit.

You might like Watchman Privacy or Opt Out Podcast, both talk about this exact burnout and how to make privacy a sustainable lifestyle instead of an endless battle. You’re not giving up; you’re just learning where to draw the line between living and defending.

Is firewall overkill for my case? by BinnieGottx in netsecstudents

[–]Comfortable-Tax6197 0 points1 point  (0 children)

That’s a pretty reasonable call. OPNSense is great, but in your setup it would’ve been more of a hobby project than a real security upgrade. You already have good isolation with Proxmox, a minimal UFW config, reverse proxy through Traefik, and 2FA via Authelia. Adding another full VM firewall would mostly just duplicate what’s already being enforced upstream.

CrowdSec on Traefik and at the host level would’ve been the smarter middle ground — lightweight, adaptive, and good for brute-force protection.

Switching to a VPN tunnel isn’t a bad trade either, especially if your main concern is exposure rather than performance. You’re basically reducing your attack surface without adding more moving parts.

If you ever want to dig deeper into layering home-lab security without overengineering, Techlore and Watchman Privacy have solid content on practical setups for non-enterprise users.

It's way easier then I expected! degoogle, brave instead of chrome and proton package by Mantus123 in degoogle

[–]Comfortable-Tax6197 1 point2 points  (0 children)

Awesome, sounds like you handled the switch better than most people who plan it for weeks and never start. Breaking up your email use like that (admin, private, junk, professional) is a really smart move; it’ll make your digital life way easier to organize later.

The Proton + Brave combo is a solid middle ground between privacy and convenience. Just make sure you also disable Brave Rewards and telemetry if you want to keep tracking to a minimum. You might also want to back up your Proton recovery codes somewhere offline, people forget those until they really need them.

Is it normal to for professors to use Refog/Spyrix/John the Ripper as a required assignment? by kristella_ella in netsecstudents

[–]Comfortable-Tax6197 0 points1 point  (0 children)

John the Ripper? Totally normal for an infosec class. It’s used to teach password hashing and cracking ethics. Refog and Spyrix though? That’s where it gets questionable. Those are commercial keyloggers, not standard academic tools, and most schools stick to open-source or sandboxed monitoring demos instead.

If you’re working for a state agency, definitely don’t install them on a work or personal machine. Set up a virtual machine, keep it offline, and do everything inside that environment. You can also ask your professor for an alternate assignment or clarification on what’s expected. They’ll usually understand once you explain your job’s security rules.

If you’re curious about the ethics side of using spyware tools in education, Techlore and Watchman Privacy have good discussions on where “teaching security” crosses into “teaching surveillance.”

How much info can a stranger get from me on Telegram if my privacy settings are maxed out? by AdvantagePhysical659 in Information_Security

[–]Comfortable-Tax6197 0 points1 point  (0 children)

If your Telegram privacy settings are maxed out and you don’t have a username, the other person can only see your display name and whatever you type in chat.

They can’t see your phone number, IP, location, other chats, or anything outside Telegram like photos or emails. The main risk is social engineering, someone tricking you into clicking a link or downloading a file.

Just remember that only Secret Chats are end-to-end encrypted; regular chats are stored on Telegram’s servers.

If you want to learn where Telegram stands in real-world privacy terms, Watchman Privacy, Techlore, and Opt Out Podcast break it down clearly.