|
| ronnier wrote:
| I don't care about being anon, but I don't want all my info
| sitting in databases, so I've made done the following and trying
| to evolve over time and fix gaps that I currently have. This is
| things I've done...
|
| * Use Brave browser with ublock origins and privacy badger
|
| * Use pihole + unbound to resolve my own DNS and do not use
| google
|
| * Run wireguard on my home network that I connect to when I'm out
| and need to use wifi
|
| * Be anti-google as much as possible. I'm still in the process of
| this, i'll switch my domain based email off of google soon
|
| * Be anti-facebook and delete all accounts (whatsapp and insta
| included)
|
| * Be anti-reddit
|
| * Be anti-cloud and host everything internally as much as
| possible (except for encrypted backups, say for video cam
| footage)
|
| * All of my home automation is local and blocked from the
| internet. If I want access, I'll connect to my VPN.
|
| * Use signal with disappearing chats to communicate with my
| friends.
|
| Still a lot to do, but it's a start...
| hammock wrote:
| I believe Brave browser has fallen out of favor but I'm not an
| expert on why
| ronnier wrote:
| Interesting. Please let me know if you have a better
| alternative. Ideally I'd like to just run chromium but then I
| have to build it myself or use some build by some untrusted
| person so I've decided I'll trust Brave for now...
| xvector wrote:
| Aside from Tor Browser, Firefox with arkenfox/user.js is
| ideal for privacy [1].
|
| Chromium-based browsers like Brave are ideal for security
| [2].
|
| An ideal solution for privacy and security would be running
| Firefox+user.js in Qubes OS [3], or for even more
| anonymity, Tor Browser in Qubes-Whonix [4]. However, even
| this isn't bulletproof, and a 3 letter agency can still
| determine who you are with techniques like keystroke
| deanonymization [5] or other techniques [6] like traffic
| analysis. Tor is also not reliable for anonymity because
| the project is kind of a shitshow [7], so there's really
| nothing you can do to truly hide.
|
| [1]: https://github.com/arkenfox/user.js
|
| [2]: https://madaidans-insecurities.github.io/firefox-
| chromium.ht...
|
| [3]: https://www.qubes-os.org/
|
| [4]: https://www.whonix.org/wiki/Qubes
|
| [5]: https://www.whonix.org/wiki/Keystroke_Deanonymization
|
| [6]: https://www.whonix.org/wiki/Warning
|
| [7]: https://www.hackerfactor.com/blog/index.php?/archives/
| 906-To...
| cellis wrote:
| As careful as some of the things he suggests are...if you're
| truly wanted by a state-level actor or sufficiently motivated
| attacker, you won't be able to hide by simply using VPN and Tor.
| Especially if you're running something with many transactions
| like AlphaBay. You would need to obfuscate quite a bit more:
|
| - if you're using VPN traffic but most people "around" you
| aren't, you're a suspicious node; your ISP could easily flag you
| to your government. If you use wifi at a common point you're
| likely to be flagged and there isn't an easy way other than
| keeping on the move. But moving often is another anomalous event,
| and it's very difficult to do even for Drug Lords ( El Chapo ) or
| Terrorists that it behooves to do. This puts you in a sort of
| _Zugzwang_ , to borrow a chess term.
|
| - there's always leakage, for instance, in the way you talk with
| people in the real world. At some point you send enough
| communication for sophisticated frequency analysis.
|
| - and there are other patterns of usage that could be used to
| identify you, like searches or even keyboard frequency on
| anonymized accounts can be de-anonymized by very specific markers
| ( ML works! ).
|
| - off ramps for crypto aren't very good. If you're in e.g.
| Brazil, haha, yeah, good luck spending bitcoin or any other
| crypto and going unnoticed. Mixers and tumblers will eventually
| leak and you'll be caught.
|
| - you're very vulnerable to social engineering by people you do
| business with. one slip where you stop communicating in a
| transactional mode of communication and that's a weak link in
| your armor.
|
| In the end, the FBI only has to be right once, and you have to be
| right every time.
| weq wrote:
| Scamming is BOOMING. We are talking entire developing countries
| getting onboard. The noise ratio is very high on all these
| services. There are hundreds of "alphabays" running RIGHT now
| with millions of people using them, right now. This isnt 2013,
| those big take-downs of high profile sites did nothing but
| diversify, fracture the community.
|
| Sure, if u piss off the wrong agent and they spend a few years
| on the case you may get busted. But the vast majority?
| xvector wrote:
| > keyboard frequency on anonymized accounts can be de-
| anonymized
|
| Whonix uses Kloak to mitigate this [1], but unfortunately it
| isn't available in Qubes-Whonix.
|
| > Mixers and tumblers will eventually leak
|
| Don't use mixers and tumblers, use Monero and/or Monero atomic
| swaps.
|
| But, you are right that it is futile to maintain defense
| against a determined 3 letter agency.
|
| [1]:
| https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak
| 323 wrote:
| What you said and much more.
|
| For example, you buy a burner phone, but the place you bought
| it from, even if a second hand shop, had a security camera.
| Maybe they also record IMEI's before selling phones.
|
| Or you carry your burner phone together with your real phone.
| Or alternatively, you leave one at home when using the other.
| Both of these things can be linked by a sufficiently determined
| actor (FBI/NSA level).
|
| Or they track you to using a public square WiFi one day. Again,
| cameras are everywhere.
|
| If they got your real name, no matter how, it's game over. You
| will be surveilled and they will find proof to link you. This
| is why all those posts "if only DPR used this kind of
| encryption or dead-men-switch" are ridiculous. Once they knew
| his real name it was just a matter of time and building a case.
| cellis wrote:
| I would say that if you're caught and ... _somehow_ manage to
| delete all the evidence linking you ( you have device
| explosives or, idk, 2048 bit encryption ), you _may_ be able
| to escape, but come on, who are we kidding: the FBI has like
| a 99.96% conviction rate and that 's without even going to
| into the "parallel construction" or other conspiratorial
| lines of attack.
| 323 wrote:
| I don't think the FBI would be that dumb to arrest you
| before they have solid proof.
| ogisan wrote:
| You're absolutely right. It is not enough to use anonymity
| tools, you also have to make sure everything else around you
| doesn't compromise your anonymity. Made me think of a Harvard
| bomb threat incident where the student posting a fake bomb
| threat (through Tor) to avoid final exams was the only person
| using Tor on campus at the time, which trivially identified
| him.
|
| https://theprivacyblog.com/blog/anonymity/why-tor-failed-to-...
| klysm wrote:
| Many anonymity tools have the k-anonymity property. It's
| really unfortunate for k to be 1.
| 323 wrote:
| This is the big problem of crypto coin mixers. 99% of their
| users are trying to launder illegal bitcoin.
| blowski wrote:
| It's a bit like Schneier's Law. You can put in place
| protections that you personally cannot workaround, but that
| doesn't mean someone with sufficient means and motivation would
| also be blocked.
| 14 wrote:
| This reminds me of a time I was having a yelling match with a guy
| on reddit and he started calling me names. I google searched his
| username and he had used it across multiple sites, several being
| porn sites, and he also posted his reddit user name on his
| Facebook and a Facebook search I found his real name and pictures
| of him. When I called him by his real name and linked a picture
| of him he immediately changed his tune. In the end he and I both
| laughed and thought it was funny and he was more curious how I
| found all those thing. I told him he used the same username
| across multiple sites including Facebook. He said he was a lot
| younger and didn't think of those things when he originally did
| it. I removed any post where I used his name and tried not to dox
| him for others to see.
| Barrin92 wrote:
| It's good advice. The problem with anonymity in an environment of
| ubiquitous surveillance is that it's paradoxical. The point of
| anonymity is achieving freedom, but staying anonymous expends
| energy and makes you a target, so you can't actually do any
| things that anonymity was supposed to get you.
|
| If what you really want is sovereignty, which is what most people
| confuse anonymity with, the goal is to be like what Ernst Junger
| called the _anarch_ (in contrast to the _anarchist_ ), which is
| someone who complies and renders herself indifferent to
| authority, rather than standing out and drawing attention.
|
| A much better practice is to be as open as possible about the
| boring stuff, so you're not constrained and can do what everyone
| else does. Trying to be absolutist about anonymity is
| automatically like wearing a straitjacket.
| roughly wrote:
| > If what you really want is sovereignty, which is what most
| people confuse anonymity with, the goal is to be like what
| Ernst Junger called the anarch (in contrast to the anarchist),
| which is someone who complies and renders herself indifferent
| to authority, rather than standing out and drawing attention.
|
| This works right up until the thing you want to do - or the
| person you find yourself to be - is something authority is not
| indifferent to.
| chaxor wrote:
| > expending energy
|
| One thing I noticed out of many of the list items given in the
| post here:
|
| > Only use Tor > Always use a VPN > Never use Google -- only
| DuckDuckGo > Disable JavaScript on your browser > Watch all
| incoming and outgoing network calls regularly and scan for
| abnormalities > Encrypt your laptop and any external drives >
| End-to-end encrypted communication only > Don't use Gmail --
| use ProtonMail > Never pay with cards. Use cryptocurrencies. >
| Turn off all location services from your laptop and phone
|
| Is that these can actually be solved with technology in a way
| that these are the _default_ and popular behavior (as TLS 1.3
| is in HTTPS). So it 's important that we realize that these
| technologies (or something like them) are important and
| _desired by everyone_ , but just need a bit of development to
| work. Https and signal are great examples. Many of my parents
| and grandparents are on signal now, because it's better than
| most other apps (whatscrap, Facebook msg, imsg, etc). Is the
| Loki network and Session better? Sure. Of course. But
| grandparents aren't using it yet because not everyone they know
| is on it yet like signal, just the tech knowledgeable, or many
| of their grandchildren.
|
| But ultimately, _None of this should require any effort
| whatsoever_.
|
| The rest of the points about concealing your name or not is
| more obviously a choice by the user, as they have to provide it
| knowingly - so it's less of an issue because they're more
| likely aware of their choice.
|
| > Don't buy domain names I'm not sure I understand this one -
| anyone have an explanation?
| cure wrote:
| > Don't buy domain names I'm not sure I understand this one -
| anyone have an explanation?
|
| When you buy a domain name, you are supposed to supply
| accurate ownership information. If you do not, the registry
| can yank your domain when they discover that. Most registrars
| obfuscate/hide the information in their whois service, but
| they still need to have it to comply with the rules of the
| registry. That information can be subpoenaed.
|
| The purchase/renewal transaction(s) also leave a trail that
| can be followed.
| blakesterz wrote:
| "Ultimately, anonymity comes down to one thing: Control. You
| should educate yourself on data privacy and make sure that you
| know what data you're sharing and what is possibly out there."
|
| That's some REALLY good Solid advice.
| touisteur wrote:
| And be OK that sometimes some people don't want to interact
| with anonymous randos... Credentials are not everything, but
| they _are_ a filter on medias with large amounts of time-
| wasters...
| chillycurve wrote:
| I have been afraid of sharing my ideas, post history, etc. in a
| way that could be easily traced back to my identity for years. I
| made sure my accounts and usernames bore no personally
| identifiable tid-bits. I use a VPN religiously (that won't
| change).
|
| I've since decided that I am done with all that.
|
| I was afraid my employer might question my Reddit posting history
| (they wouldn't.) I was worried someone who Googled me would think
| my past self was dumb (who cares).
|
| Now my ideas are almost all public and growing more so by the
| day. I am working up the energy to start a personal blog, if
| anything just to document my ideas over time. I am adding my real
| name and email to my Github, HN, (not Reddit, yet, though it
| would not be hard to connect), IH, etc.
|
| I want someone to be able to Google me and find my best work.
|
| On the other hand, there are clearly cases and types of
| info/accounts that should remain private. I self-host as much as
| possible. I encrypt personal files before uploading. I have
| multiple Protonmail accounts. I use custom DNS, etc.
|
| Ideas should be public. Information is a case by case basis, but
| I generally care a lot less than I used to.
| chaxor wrote:
| What do you use as a custom DNS?
| mindvirus wrote:
| The article touches on a good point: one mistake and you're out.
| It doesn't even have to be your mistake - you didn't choose to
| put your SSN out there after all, yet here we are.
|
| This gave me a radical company idea, on the other end of the
| spectrum: spam as a service. Something that'll take your name,
| email, and other things and put it all over the internet in
| questionable and plausibly denial ways. That way, even when
| someone is trying to find things out about you, it'll be hard to
| find, and easy to deny. (I'm kidding of course).
| [deleted]
| _moof wrote:
| _> It doesn 't even have to be your mistake_
|
| This is the crucial piece. It doesn't matter how careful you
| are; everyone who knows you has to be careful too. I have a...
| well, I hesitate to use the word stalker, because that makes
| them sound more motivated than they really are. But someone on
| that spectrum, anyway. After a few years of being harassed I
| managed to elude them. Then they found me again. You know how?
| They pieced together two pieces of information posted publicly
| by other people. That's all it took.
| hammock wrote:
| This idea exists but doesn't always work.
|
| Example A: Apparent Nazi sympathizers planted inside the
| Canadian protests- some people thought they were provocateurs,
| others assumed they were legit and cast a negative light on the
| protests overall
|
| Example B: Hunter Biden's laptop (before it was acknowledged to
| be real). Saying he was a target for disinformation campaigns
| mostly worked
| Liiiii wrote:
| "Something that'll take your name, email, and other things and
| put it all over the internet in questionable and plausibly
| denial ways."
|
| What if instead of spamming the correct information out, spam
| slightly incorrect information out.
|
| Correct address, incorrect middle initial, wrong birth month,
| and a machine generated SSN would be from the right time
| period, area number, but with an incorrect group and serial
| number.
| adelie wrote:
| This is essentially the premise of Neal Stephenson's Fall or
| Dodge in Hell.
| [deleted]
| propesh wrote:
| Kidding aside, this is exactly how it will go down. Politician
| in a scrape of financial corruption or etc.? Deepfake s*x video
| or other viral blatant misinformation & obfuscation; what's the
| risk? Upside, no one knows what to believe. Exactly what
| various "countries" are doing. It will be extreme; to the point
| where, don't believe half of what you actually see.
| bee_rider wrote:
| It should be noted that this is a pretty bad end state.
| Reporting is already an extremely weak force for preventing
| corruption on the part of the powerful. Journalists entering
| a state of total uselessness is only going to make the
| problem bigger.
|
| In a realm of total bullshit the winners are the one who are
| best at lying. "I don't know what to believe and everyone
| involved is probably corrupt" is usually just an excuse to
| disengage and follow base instincts.
| bugBunny wrote:
| I guess none of these suggestions really work without the last
| one "Move to Brazil and live in the rainforest" :)
| hammock wrote:
| Even that didn't work for John McAfee
| LinuxBender wrote:
| To be fair he never lived in a rain forest. He was always
| around people and often managed to upset many of them.
| Damogran6 wrote:
| Name it something catchy...like equiphax
| HPsquared wrote:
| "equip hax"
| alliao wrote:
| Photos easily pinpoint you too, any pictures you upload + user
| name is pretty much game over
| nickstinemates wrote:
| The conclusion is a weird one, given the premise. The crux of the
| argument is basically true. Its an all or nothing proposition.
|
| Or you can lead a double life. One for your public persona, where
| you don't care at all about security, and your real persona,
| where you do. This has been my approach on the internet since
| basically it started and handles were a common thing.
| caslon wrote:
| With that in mind, you just might have posted this comment on
| the wrong account.
| ReactiveJelly wrote:
| > The crux of the argument is basically true. Its an all or
| nothing proposition.
|
| No, it's not.
|
| Every online account (that doesn't involve money or legal
| paperwork) can have its own name. Then you can decide whether
| to have _some_ accounts ultimately link back to your legal
| name, or all accounts, or none.
|
| > Or you can lead a double life. ... This has been my approach
| on the internet since basically it started and handles were a
| common thing.
|
| That's exactly what I'm doing, and neither of us are living in
| the Brazilian rainforest, so anonymity really is a spectrum.
| numpad0 wrote:
| > Then you can decide whether to have _some_ accounts
| ultimately link back to your legal name,
|
| No, _you_ don 't. Someone else could, if there is one with
| high enough affection to you. I think you'll have to think of
| bulk ingestion and on-prem processing to be sure your
| activities won't trace back to you.
| aqme28 wrote:
| I don't think it's all or nothing. Look at anonymous public
| personas like Banksy or Dril. People have tracked them down,
| and you can look up who they are if you try.
|
| But for the most part these people are anonymous, and get to
| enjoy some of the benefits of that.
| oh_sigh wrote:
| Alex Cazes had bad op-sec. His #2, DeSnake, didn't, and is still
| alive and well and has restarted his marketplace and gives
| anonymous interviews to media outlets:
|
| https://www.wired.com/story/alphabay-desnake-dark-web-interv...
| kwhitefoot wrote:
| The title is misleading, clickbait. The article is in fact about
| why it probably isn't necessary to be anonymous and even then
| says nothing particularly important.
| djur wrote:
| A title not precisely describing the premise and conclusion of
| the article is neither misleading nor clickbait. The article is
| about online anonymity. It could be "On being anonymous" or "To
| be anonymous"; "Be anonymous" is fine, too.
| sampo wrote:
| Maybe Eric S. Raymond's advice from 21 years ago is no longer
| true in today's internet:
|
| > Concealing your identity behind a handle is a juvenile and
| silly behavior characteristic of crackers, warez d00dz, and other
| lower life forms. Hackers don't do this; they're proud of what
| they do and want it associated with their real names. So if you
| have a handle, drop it. In the hacker culture it will only mark
| you as a loser.
|
| http://www.catb.org/~esr/faqs/hacker-howto.html#style
| YaBomm wrote:
| hkon wrote:
| Easily. It was advice for another time.
| vmception wrote:
| Exhibit A: Was Mary only _from_ Syracuse, or was Kash, kg.dev,
| using dating apps _in_ Syracuse
|
| well, I got tired of caring already, but maybe others havent.
| alfiedotwtf wrote:
| Good article!
|
| As an experiment, a few years ago I put my mobile phone number on
| my blog, and to date I've only received 2 anonmous messages on
| Signal but no calls besides recruiters.
|
| The old adage "No one is thinking about you as much as they are
| thinking about themselves" is true.
|
| While it's good to practice good security hygiene, be mindful of
| also being practical.
| ReactiveJelly wrote:
| Agreed. Anonymity is a spectrum. Just like personal finance, most
| people haven't even begun to assess what state they're in.
|
| You should not accept the state you're in without knowing what
| state that is. Most people should have more anonymity than
| they're giving themselves.
|
| "Defend your rights. Nobody else will do it for you."
|
| -- ReactiveJelly
| DantesKite wrote:
| There's a middle ground somewhere here, in between "Don't be a
| criminal" and "Don't be stupid."
|
| I don't think the lesson we should take from AlphaBay is "Take
| better privacy safeguards" but "Don't set up an illegal dark web
| operation."
| underwater wrote:
| I mix @realname and @pseudonym accounts. I'm generally pretty
| careful about what I post under my real name and less so under an
| alias.
|
| However, over time I drop enough clues that people could figure
| my real identity with a little work. That leaves me with the
| worst of both worlds. It seems safest to assume that your
| identity is always tied to everything you do online.
| can16358p wrote:
| I think with ML getting smarter and people posting (either with
| their identity or anonymously) more and more content, it will
| be trivial to crossmatch anonymously posted content to real
| identities by ML examining "styles" of text: from punctuation
| to sentence structure to vocabulary use, and it will have an
| accurate estimation of who that "anonymous" person is.
| kibwen wrote:
| This would be pretty easy to counter by having a tool that
| would analyze any comment you post and strip all the
| identifying marks out of it; no punctuation other than
| periods, no complex or compound sentences, all words replaced
| by equivalents from the list of the most common thousand
| English words, all voices and tenses normalized, no
| paragraphs, no capitalization, etc.
| numpad0 wrote:
| Notably missing aspect is precise time of events.
|
| Personas like someone who posts content during 08:34:40 -
| 09:23:23 except 08:43:30-08:55:23, never seems to be active
| during 22:00 - 06:00, can be narrowed down to something like a
| person commuting via bus route A from stop B to C changing to a
| train route from C to D through passageway E in the station.
|
| From there you can look for a man looking down at a phone, or
| couple information with other factors, or throw in a bait like a
| giant stinking dead fish or a rare and loud car in front of him
| and watch for responses he'd make. IMSI catchers and Bluetooth
| scanners can be useful as well if your adversaries are
| resourceful. Time and location of transmissions and time of
| receptions can be correlated, in theory.
|
| This type of attacks can't be mitigated on fast-paced social
| media at all; both posts and requests has to be queued and
| obfuscated for time.
| mhitza wrote:
| That's a bultin feature of messaging systems like I2P-bote
| (running on I2P darknet). It's been a while since experimenting
| with Bitmessage but I think they queue/batch messages as well.
| But for forum like software that's definitely true, can't
| easily have variable delayed posting.
|
| Another aspect that's important and often ignored, is writing
| style anonymization. You practically want an offline tool, that
| removes idiosyncrasies from the text you write and makes it
| sound as bland as possible.
|
| edit:
|
| A related story. Around 2010-2012 I was working for a company,
| and I was part of a somewhat managerial group. At one point we
| decided to pull in direct employee feedback in an anonymous
| free-text form. Due to their writing style being reflective on
| the way they spoke, it was possible to point exactly who wrote
| what message. Of course, few exceptions existed, I didn't
| personally know all the employees in the company.
| chayesfss wrote:
| Share accounts with others, widely. No reason not to unless
| you're trying to build up some type of e-cred with your other
| account.
| indigodaddy wrote:
| Feels like the article is slanting this Alex guy as a hero of
| sorts? I don't like the tone of the article and wish I hadn't
| clicked on it now..
| ChrisMarshallNY wrote:
| I'm sort of the opposite.
|
| I make sure that I can be found and attributed. I deleted my last
| anonymous account, a couple of years ago. In the Days of Yore, I
| was pretty much "Dick From the Internet." A real neckbeard troll.
|
| There's a lot of reasons that I do it. The biggest, is that I
| want to be in control of my narrative. I learned from a couple of
| folks that are _really good_ at curating their SEO results.
|
| Also, these days (for a change), I'm pretty well-behaved. Doing
| it this way, helps to keep it that way.
| srmarm wrote:
| Privacy is on a spectrum, but is also compounded by time and once
| the cats out the bag it can be impossible to turn back. In the
| example given of Alex Cazes he could change the from email but
| the damage was already done - there's no way to recall the emails
| already sent that led a trail back to him.
| upofadown wrote:
| The article states that _anonymity_ is on a spectrum. Privacy
| is a different issue. You can lead an entirely private but non-
| anonymous life.
| formerly_proven wrote:
| Be anonymous
|
| Become ungovernable
| jefftk wrote:
| The article presents a spectrum, dismisses both extremes, and
| advocates that people aim for the middle. The problem is, you may
| think you are hanging out in the middle, but you probably have
| much less privacy than you think you do. Even if you are making
| the right choices for today, you can't trust that the future will
| keep things private (advances in ML, ubiquitous surveillance) and
| you don't know that futures isn't here yet.
|
| Personally, I hang out at the fully open end of that spectrum.
| This has worked out pretty well for me; I don't think I've run
| into any downsides.
| psacawa wrote:
| > Don't buy domain names
|
| Can anyone explain this? Assuming your data isn't in the WHOIS
| record, why does this increase your exposure more than any other
| company knowing your name?
|
| A search shows up options for anonymous domain name services.
| ur-whale wrote:
| I would _strongly_ advise anyone who really wants to be anonymous
| on the internet such as a freedom activist in a totalitarian
| country, _not_ to follow the advice listed at the end of the
| article.
|
| Or rather: these are very basic and very naive recommendations,
| certainly good first steps, but absolutely nowhere near enough to
| guarantee strong anonymity on the internet.
|
| Remaining truly anonymous on the net is _extremely_ hard,
| especially in these days where ML can be used to statistically
| narrow down and pinpoint who wrote a specific piece of text only
| based on things like use of punctuation, vocabulary, sentence
| structure and style.
| kgeist wrote:
| >especially in these days where ML can be used to statistically
| narrow down and pinpoint who wrote a specific piece of text
| only based on things like use of punctuation, vocabulary,
| sentence structure and style.
|
| I think you can fight ML with ML - for example, use GPT-like
| algorithms generate text for you. But then you must also be
| careful about when you post - I remember some of the Russian
| trolls were exposed because their bursts of activity coincided
| with 9am-6pm Moscow time. So you have to use a random number
| generator decide when to appear online if you want to hide your
| location. There's always something which can narrow down their
| search. One small mistake and you are busted. They don't even
| need to pinpoint you exactly, if it's narrowed down to
| 1000-10000 people who meet the criteria, they already win
| because they have the capacity to go through the list one by
| one and eventually find you.
| Swenrekcah wrote:
| Would the solution be a digital version of the old newspaper
| cutout ransom letter?
|
| Generate via GPT-3 a text giving roughly the impression you
| want to make and then copy/paste sentences from online news
| media if you need the names of particular persons or events.
|
| Would be rather crude though, but less tedious than literally
| cutting and pasting letters was.
| kgeist wrote:
| I had a similar idea in a sibling post. But this only works
| if you basically have a secret alter ego which has nothing to
| do with your work/public persona, because otherwise they can
| match your favorite topics in those GPT-3 generated texts to
| your interests in real life, by factoring in also other
| little facts, like when you usually appear online, etc. It's
| probably enough to protect the average Joe but imho not
| enough to protect a targeted freedom activist, unless their
| activism is their alter ago and publicly they aren't known to
| be activists. Otherwise their every step is monitored in a
| typical dictatorship and it's not that hard for them to
| connect the dots who was the author of a certain message.
| m348e912 wrote:
| I don't know if dating app users understand that it doesn't take
| much information to find out who they really are. Sometimes all
| that's needed is a first name, profession, or university is
| enough if one of the three is somewhat unique for the area. If
| you're concerned about privacy on dating apps, you're better off
| being really vague about basic aspects of your life, or trying a
| bar instead :)
| Ansil849 wrote:
| > Don't use macOS or Windows -- only Linux
|
| > Move to Brazil and live in the rainforest
|
| Juvenile, snarky, irreverent and irrelevant advice I'd expect to
| read on a 12 year old's Reddit post.
| retrac wrote:
| > I don't know about you, but I don't want to do all of that.
| [...] I don't recommend being on either extreme of this
| spectrum.
|
| It's a list of extreme techniques for protecting ones' identity
| online. Of course, completely sanitizing your online presence
| is difficult, and probably unnecessary. I thought the two lists
| were a nice rhetorical framing - present a dilemma (total
| openness vs. total anonymity) and then wiggle out of it to a
| compromise.
| Ansil849 wrote:
| > It's a list of extreme techniques for protecting ones'
| identity online.
|
| The items I quoted do nothing to protect ones' identity
| online. Snark is only effective if relevant.
| RustyConsul wrote:
| holy cow! I literally laughed out loud when i read the
| rainforest remark. Chill out dude, you're reading something
| called 'Thoughts' by some random dude on the internet lol
| AitchEmArsey wrote:
| The closed nature of MacOS and Windows means that you have
| no guarantees (and no audit mechanism) to determine how
| much the machine is passing your data back to HQ. As the
| post very clearly states, most people don't need to care -
| but someone with extreme paranoia has only one obvious
| choice here.
|
| Your aggressive negativity is far less interesting than
| this blog, and serves no purpose whatsoever.
| i_am_proteus wrote:
| That might be why the next thing in the article is:
|
| >I don't know about you, but I don't want to do all of that.
| can16358p wrote:
| Linux part is perfecly valid IMO, though the rainforest was I
| think a bit deliberate exaggeration.
| fsflover wrote:
| Linux is definitely more anonymous than Windows/Mac, but if
| you seriously want to be anonymous, you should use Qubes with
| Whonix.
___________________________________________________________________
(page generated 2022-02-20 23:00 UTC) |