RatoGBM

joined 1 year ago
[–] [email protected] 5 points 2 months ago* (last edited 2 months ago)

Thanks, exactly what I wanted to know. This explains a lot.

There had to be some reasoning behind it after all.

[–] [email protected] -1 points 2 months ago

So the email and username have no cryptographic purpose, they are just there for convenience.

Thanks I guess...

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (3 children)

So the email and name will be plaintext in the public key/signatures?

memorable link to the public key’s owner.

Ok, just strange how the key generator insists on specifying them. Encryption usually doesn't like extra metadata.

[–] [email protected] 6 points 2 months ago* (last edited 2 months ago)

From my knowledge VPNs hide your IP from the destination, and the destination from your ISP.

Fingerprinting is mostly about the browser you use.

For VPN any VPN should do (eg. Mullvad VPN $5/month) and for Browser just have a non-big tech browser with ad-blockers and tracking protection (eg. Mullvad Browser or other Firefox/fork with good config).

Or Tor

Also, how serious is the "not getting tracked" need? It sounds like you are getting hunted by the social media site? Wouldn't that need full OPSEC mode with Tails and Whonix like the real darknet hackers?

For the VM, I can't help you much. There should be tones of cloud hosting providers out there, just a Linux VM on another guy's computer after all.

PS: I am a newbie just repeating stuff I heard before like a parrot.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

Some random notes app on F-droid probably has what you need. (Notes apps because "Diary" gives mostly medical/habit trackers/loggers)

Also check IzzyOnDroid repo (select "Writing" category or just search for "Diary"), it has more "modern" apps in my impression.

You will need to scroll through quite a few to find one you like. Just don't get yourself into choice dilemma, pick one that looks decent and start using it.

-27
submitted 2 months ago* (last edited 2 months ago) by [email protected] to c/[email protected]
 

Cunningham Law (backfired terribly)

Can someone please explain why PGP is needs all of these? All explanations of public key encryption mention any email embedded emails.

And I probably don't completely understand what PGP is, so please give me a good article or video on it.

[–] [email protected] 8 points 2 months ago* (last edited 2 months ago)

How to tell someone is reading Sapiens.

Still, insane that "science/technology improvements" did not improve happienes at all. Just shifted the standards.

 

Death Note Anonymity analysis by Gwern.

I think it would be valuable to read for people here, especially newbies and "privacy bros" to understand how ~~privacy~~ (anonymity) actually works.

Given a perfect weapon, can you commit a perfect crime?

The answer is surprisingly close to no.

Everything you do bleeds information.

A perfect crime is one that wasn't even noticed. If a perfect crime gets noticed it immediately reveals the following: you are smart and you have the knowledge and weapons to commit a perfect crime, and in a murder you must have had a motive, instantly ruling out 99% of the human population.

On the web you can be tracked using almost anything: browser window size, word choice, times you are online, internet connection delay, negative qualities like not giving your language will exclude the majority of people who do.

In fact, just this post alone is sufficient to narrow me down to less than a million (maybe even a few thousand) people.

Edit: This is actually about anonymity, privacy is slightly different, but I think this is still relevant to privacy.

[–] [email protected] 17 points 8 months ago (5 children)

I lived in Russia, and in History class I was taught that Stalin singlehandedly showed up to save those poor helpless Europeans from bloody nazis, because it was the right thing to do.

When I loved in Europe, it were the Jewish partisans who won WW2 through brain drain on Germany, and the stupid Nazis killed themselves.

In the US I found out that the thing in Europe was typical Medieval European Kingdoms in a fight, and the real high-tech stuff was in the Pacific.

Now as a programmer, I know who truly won WW2: it was our legendary bro Alan all along.

 

Make posters like these and spread it to parents in your community, I think this will have a lot of impact.

Poster text: Reddit is exploiting "your children" to generate content for their platform and increase their profits. And then something about how Lemmy is better.