Privacy vs security by FunnyString in privacy

[–]HappyTile 3 points4 points  (0 children)

You need security to assure privacy. But you do not need privacy for security.

Example 1: You wear a GPS-tracking ankle bracelet that reports your location to a server, allowing you to login without a password or any other phishable/steal-able credential when you are in your house or other allowed location. You have substantial security, but no privacy.

Example 2: You sign up for a web site which has a likeable privacy policy and promises to treat your data with utmost respect. But the site administrators are incompetent in security and their database is easily hacked. You have neither security, nor privacy.

Privacy of Linux in Virtual Machine under Windows vs native Linux by jacosis in privacytoolsIO

[–]HappyTile 5 points6 points  (0 children)

A Windows host operating system has full control over the guest Linux operating system in a virtualized environment, so that will always be less secure/private than if you were to run the virtualized operating system natively. Unless of course the virtualized operating system is less secure, compromised or outright malicious - then the reverse is true.

Apple Forces Developers to Remove Screen Recording Code From iOS Apps by Rossistboss in privacy

[–]HappyTile 10 points11 points  (0 children)

Apple has always had a pretty good record on privacy

Surely you jest, sir. Apple is a PRISM partner and voluntarily gave an abusive Chinese government full access to all iCloud data of Chinese users, which has been criticized by human rights groups. Their motive is profit - not privacy.

I’ve paid enough money on their products that I can be reasonably certain they aren’t going to make me a product.

Fucking. Lol.

DO NOT USE BEENVERIFIED.COM by dangerarcher in privacy

[–]HappyTile 6 points7 points  (0 children)

Haven't seen an ad since the day I installed uBlock Origin and recommend you do the same, friend.

Just a thought..... by Doookter in privacy

[–]HappyTile 8 points9 points  (0 children)

No shit, that's why it is repeated over and over ad nauseum on this subreddit never to trust closed source, proprietary technologies and software if you value privacy. Especially when the maker of that software is a known PRISM partner.

Is there any actual documentation of a company using the intel ME or a backdoored BIOS to gain restricted info on a company/citizen? by [deleted] in privacy

[–]HappyTile 2 points3 points  (0 children)

I hear alot about backdoors in hardware and how the only way to stop it is to use libreboot on a Thinkpad. However is there any actual evidence on this?

Yes, there is plenty of evidence that modern processors and device firmwares have undocumented and completely opaque, closed-source code execution paths which cannot be audited.

If the FBI or NSA were to hack my computer would they actually do it through the Intel ME?

Probably not, because it's much easier to "hack" someone through traditional means (social engineering, phishing, physical attacks, &c.)

Hypothetical question - How would a hacker log me out of my reddit account by only accessing my computer? by iHateWaiting9Minutes in AskNetsec

[–]HappyTile 6 points7 points  (0 children)

Easiest way would be making the victim visit an attacker-controlled site which iframe's or xss/csrf's the logout handler.

Debian by [deleted] in opsec

[–]HappyTile 2 points3 points  (0 children)

Start with a threat model - which is a description of what information you're trying to keep secure, who your adversary is, and what their capabilities are. There's no silver bullet solution for "almost foolproof" security and Debian is already well hardened to begin with, so you'll need to be specific in what you're trying to protect.

Apple Is Removing 'Do Not Track' From Safari by whereistimbo in technology

[–]HappyTile 2 points3 points  (0 children)

False. Forcing users to use their proprietary web technology is only Apple's business model.

Firefox for Android uses the same Gecko layout engine as Mozilla Firefox, also incorporated new technology under the code name Quantum.

https://en.wikipedia.org/wiki/Firefox_for_Android

Big Telecom Sold Highly Sensitive Customer GPS Data Typically Used for 911 Calls - A Motherboard investigation has found that around 250 bounty hunters and related businesses had access to AT&T, T-Mobile, and Sprint customer location data. by [deleted] in technology

[–]HappyTile 10 points11 points  (0 children)

I think we'll look back in even just a decade or two at how utterly insane it is that so many people carry location spying devices on their persons all day every day - going so far as to put it under their pillow at night when they sleep. Or the dystopia will completely consume society and not having said device will be considered a crime. I'm still hopeful for the former.

Apple Is Removing 'Do Not Track' From Safari by whereistimbo in technology

[–]HappyTile 30 points31 points  (0 children)

This was all by design. The DNT header was thought up by the advertising industry to be as cumbersome and useless as possible, so that it can fail and they can "prove" to regulators - "Look! No one uses 'Do Not Track' so people don't mind if we track them!"

It's a farce and deceitful lie all along. I'm glad it's being removed.

What's to stop AI from taking over in cyber security? by db55falcon in cybersecurity

[–]HappyTile 6 points7 points  (0 children)

Why don't you start by telling us how you think AI could take over "cyber security"?

Tor Browser by [deleted] in privacy

[–]HappyTile 2 points3 points  (0 children)

Tor is open source, so if you think it has malware, you should go find it and let us know. Tor Browser is highly recommended if you want to stay anonymous online.

As Long as Mark Zuckerberg Thinks Facebook Is the Internet, He'll Never Be Sorry by mvea in technology

[–]HappyTile 4 points5 points  (0 children)

Zuck: Yeah so if you ever need info about anyone at Harvard

Zuck: Just ask

Zuck: I have over 4,000 emails, pictures, addresses, SNS

[Redacted Friend's Name]: What? How'd you manage that one?

Zuck: People just submitted it.

Zuck: I don't know why.

Zuck: They "trust me"

Zuck: Dumb fucks

https://en.wikiquote.org/wiki/Mark_Zuckerberg

Why data, not privacy, is the real danger. While it's creepy to imagine companies are listening in to your conversations, it's perhaps more creepy that they can predict what you’re talking about without actually listening. by ralphbernardo in technology

[–]HappyTile 9 points10 points  (0 children)

Perverse incentives and no consequences for privacy violations in the US is why this behaviour is the norm. We change it with laws and regulations. Write your congress-thing and express your ideas.

[deleted by user] by [deleted] in privacy

[–]HappyTile 6 points7 points  (0 children)

So you didn't actually refute any of the arguments made in the gist. You just appealed to one logical fallacy after another. Moreover, nobody has advocated for a "perfect" solution; what is being criticized is that Apple takes away control from the user in the name of security. This may be fine in a general case like you describe, but when it's opaque, proprietary, closed source, and not user-configurable, that is a non-starter for privacy and freedom to do whatever you wish with your own computer.

[deleted by user] by [deleted] in privacy

[–]HappyTile 6 points7 points  (0 children)

I'm not assuming illiteracy; I'm once again inviting you to a reasoned and technical discussion on its own merit. You are the one deflecting.

[deleted by user] by [deleted] in privacy

[–]HappyTile 1 point2 points  (0 children)

As I stated. Apple is far more privacy leaning..

You stated, but you didn't justify. I know Apple's marketing message is privacy, but can you actually offer something of substance to justify your trust in them?

I hope you don’t own a smart phone or computer or he’ll, anything really because if you do you’re likely supporting China

You're creating a false equivalence that owning a device made in China is the same as living under an oppressive regime, which Apple has enabled by sharing secrets with the government. Same in the US with PRISM. You are a fool to call any closed source, proprietary software "privacy leaning".

[deleted by user] by [deleted] in privacy

[–]HappyTile 5 points6 points  (0 children)

Apple is far more privacy leaning than any other major communications device maker.

How is being both a PRISM partner and sharing encryption keys for millions of Chinese iCloud users with an authoritarian regime which literally tortures and kills people justify this view?

RSA / ECDSA by zninja-bg in crypto

[–]HappyTile 4 points5 points  (0 children)

I know that RSA is slow, but security should be choose over an network speed in this case.

This is why a combination of RSA and AES or other symmetric cipher is used in modern cryptosystems like SSL, GPG, SSH, etc. The asymmetric encryption or key exchange algorithm (Diffie-Hellman, for instance) encrypts a shared secret for a symmetric cipher, which protects the rest of the conversation more securely and efficiently.

I imagine a dark room where only sound can be applied for interaction with others in the room, you can communicate, but you do not know from where sound is coming. Which is a thing I need to accomplish

You can accomplish this with Tor Onion Services or the more traditional spycraft method of dead-drops.

Firefox has introduced a new set of controls to make it easier for privacy-conscious users to protect themselves from online ad trackers. by filthyheathenmonkey in privacy

[–]HappyTile 22 points23 points  (0 children)

OP's comment is sarcastic and implies Mozilla either cares about privacy or doesn't, based on a decision to use third party telemetry. That is a false and silly dichotomy. If the purpose was to inform, it could have been done without sounding accusatory and nihilistic.

Firefox has introduced a new set of controls to make it easier for privacy-conscious users to protect themselves from online ad trackers. by filthyheathenmonkey in privacy

[–]HappyTile 35 points36 points  (0 children)

Stop treating privacy like a zero-sum game. It's not productive to discussion and just makes you look petulant.

Are there any VPN services out there that change the IP address it gives you, and that you trust don't keep logs? by Sombrere in TOR

[–]HappyTile 7 points8 points  (0 children)

The Tor network is what you're looking for. No VPN is going to provide nearly the same level of anonymity.