1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\Entry {#3825
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#3870 …}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 19
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705512547 {#3818
date: 2024-01-17 18:29:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#3876 …}
+votes: Doctrine\ORM\PersistentCollection {#3888 …}
+reports: Doctrine\ORM\PersistentCollection {#3814 …}
+favourites: Doctrine\ORM\PersistentCollection {#3816 …}
+notifications: Doctrine\ORM\PersistentCollection {#3819 …}
+badges: Doctrine\ORM\PersistentCollection {#3821 …}
+children: []
-id: 31250
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705553047
+visibility: "visible "
+apId: "https://lemmy.world/post/10833789"
+editedAt: null
+createdAt: DateTimeImmutable @1705512547 {#3810
date: 2024-01-17 18:29:07.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\Entry {#3825
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#3870 …}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 19
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705512547 {#3818
date: 2024-01-17 18:29:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#3876 …}
+votes: Doctrine\ORM\PersistentCollection {#3888 …}
+reports: Doctrine\ORM\PersistentCollection {#3814 …}
+favourites: Doctrine\ORM\PersistentCollection {#3816 …}
+notifications: Doctrine\ORM\PersistentCollection {#3819 …}
+badges: Doctrine\ORM\PersistentCollection {#3821 …}
+children: []
-id: 31250
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705553047
+visibility: "visible "
+apId: "https://lemmy.world/post/10833789"
+editedAt: null
+createdAt: DateTimeImmutable @1705512547 {#3810
date: 2024-01-17 18:29:07.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\Entry {#3825
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#3870 …}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 0
+favouriteCount: 19
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705512547 {#3818
date: 2024-01-17 18:29:07.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#3876 …}
+votes: Doctrine\ORM\PersistentCollection {#3888 …}
+reports: Doctrine\ORM\PersistentCollection {#3814 …}
+favourites: Doctrine\ORM\PersistentCollection {#3816 …}
+notifications: Doctrine\ORM\PersistentCollection {#3819 …}
+badges: Doctrine\ORM\PersistentCollection {#3821 …}
+children: []
-id: 31250
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705553047
+visibility: "visible "
+apId: "https://lemmy.world/post/10833789"
+editedAt: null
+createdAt: DateTimeImmutable @1705512547 {#3810
date: 2024-01-17 18:29:07.0 +01:00
}
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
App\Entity\Entry {#3826
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#3827 …}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 32
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1726234460 {#3823
date: 2024-09-13 15:34:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#3828 …}
+votes: Doctrine\ORM\PersistentCollection {#3830 …}
+reports: Doctrine\ORM\PersistentCollection {#3832 …}
+favourites: Doctrine\ORM\PersistentCollection {#3834 …}
+notifications: Doctrine\ORM\PersistentCollection {#3836 …}
+badges: Doctrine\ORM\PersistentCollection {#3838 …}
+children: []
-id: 31248
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598594
+visibility: "visible "
+apId: "https://lemmy.world/post/10833434"
+editedAt: null
+createdAt: DateTimeImmutable @1705512194 {#3824
date: 2024-01-17 18:23:14.0 +01:00
}
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
App\Entity\Entry {#3826
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#3827 …}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 32
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1726234460 {#3823
date: 2024-09-13 15:34:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#3828 …}
+votes: Doctrine\ORM\PersistentCollection {#3830 …}
+reports: Doctrine\ORM\PersistentCollection {#3832 …}
+favourites: Doctrine\ORM\PersistentCollection {#3834 …}
+notifications: Doctrine\ORM\PersistentCollection {#3836 …}
+badges: Doctrine\ORM\PersistentCollection {#3838 …}
+children: []
-id: 31248
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598594
+visibility: "visible "
+apId: "https://lemmy.world/post/10833434"
+editedAt: null
+createdAt: DateTimeImmutable @1705512194 {#3824
date: 2024-01-17 18:23:14.0 +01:00
}
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
App\Entity\Entry {#3826
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#3827 …}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
cross-posted from: [lemmy.world/post/10833312](https://lemmy.world/post/10833312)\n
\n
> Summary:\n
> \n
> The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
> \n
> **“Open-source software is always secure” or “Proprietary software is more secure”**\n
> \n
> First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
> \n
> **“Shifting trust can increase privacy”**\n
> \n
> Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
> \n
> **“Privacy-focused solutions are inherently trustworthy”**\n
> \n
> Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
> \n
> **“Complicated is better”**\n
> \n
> Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 3
+favouriteCount: 32
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1726234460 {#3823
date: 2024-09-13 15:34:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#3828 …}
+votes: Doctrine\ORM\PersistentCollection {#3830 …}
+reports: Doctrine\ORM\PersistentCollection {#3832 …}
+favourites: Doctrine\ORM\PersistentCollection {#3834 …}
+notifications: Doctrine\ORM\PersistentCollection {#3836 …}
+badges: Doctrine\ORM\PersistentCollection {#3838 …}
+children: []
-id: 31248
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':13 '/post/10833312](https://lemmy.world/post/10833312)':7 'achiev':191 'address':184 'alon':173 'alway':29 'anoth':110 'approach':197 'articl':10 'audit':70 'base':168 'better':176 'claim':144 'clarifi':39 'close':86 'closed-sourc':85 'combin':119 'common':16 'complet':114 'complex':179 'complic':174 'concept':95 'convolut':196 'correl':76 'cross':2 'cross-post':1 'data':127 'debunk':14 'despit':83 'direct':51 'discuss':100 'due':63 'effect':128 'emphas':101 'encourag':185 'encrypt':164 'end':161,163 'end-to-end':160 'ensur':113 'entiti':108 'first':37 'focus':131,137,148,188 'guarante':75 'impact':52 'increas':91 'inher':134 'instead':116 'intent':172 'last':177 'lemmy.world':6 'lemmy.world/post/10833312](https://lemmy.world/post/10833312)':5 'market':143 'mere':103 'method':192 'misconcept':17 'mislead':152 'one':107 'open':25,45,56 'open-sourc':24,44,55 'parti':69 'polici':141 'post':3 'practic':190 'priorit':155 'privaci':23,92,130,140,147,181 'privacy-focus':129,146 'proprietari':32,48,78 'protect':125 'provid':167 'rather':193 'relat':18 'safeguard':157 'second':93 'secur':21,30,36,54,62,82,115 'sever':15 'shift':88,97 'similar':77 'softwar':20,27,33,42,58,79 'solut':132,149,182 'sourc':26,46,57,87 'state':171 'strategi':123 'summari':8 'technic':156 'third':68,136 'third-parti':67 'tool':121 'transfer':104 'transpar':65 'trust':89,98,105,166 'trustworthi':135 'unrealist':195 'user':117,153,186 'various':120 'whether':41 'www.privacyguides.org':12 'www.privacyguides.org/en/basics/common-misconceptions/)':11"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598594
+visibility: "visible "
+apId: "https://lemmy.world/post/10833434"
+editedAt: null
+createdAt: DateTimeImmutable @1705512194 {#3824
date: 2024-01-17 18:23:14.0 +01:00
}
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5326
+user: App\Entity\User {#5274 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: null
+root: null
+body: """
> Similarly, proprietary software can be secure despite being closed-source.\n
\n
That depends entirely on your threat model and the kind of relationship you have with the software vendor. Software might be proprietary and closed source but e.g. you might be the only customer and did get to engage an auditor which could see the source code. Or it might be off-the-shelf software made in a country trying to spy on your company or country. In some of those cases it literally can not be secure for your threat model.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705517231 {#5335
date: 2024-01-17 19:47:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5324 …}
+nested: Doctrine\ORM\PersistentCollection {#5322 …}
+votes: Doctrine\ORM\PersistentCollection {#5320 …}
+reports: Doctrine\ORM\PersistentCollection {#5318 …}
+favourites: Doctrine\ORM\PersistentCollection {#5286 …}
+notifications: Doctrine\ORM\PersistentCollection {#5290 …}
-id: 317327
-bodyTs: "'auditor':51 'case':83 'close':10,35 'closed-sourc':9 'code':57 'compani':76 'could':53 'countri':70,78 'custom':44 'depend':13 'despit':7 'e.g':38 'engag':49 'entir':14 'get':47 'kind':21 'liter':85 'made':67 'might':31,40,60 'model':18,93 'off-the-shelf':62 'proprietari':2,33 'relationship':23 'secur':6,89 'see':54 'shelf':65 'similar':1 'softwar':3,28,30,66 'sourc':11,36,56 'spi':73 'threat':17,92 'tri':71 'vendor':29"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/7689827"
+editedAt: null
+createdAt: DateTimeImmutable @1705517231 {#5271
date: 2024-01-17 19:47:11.0 +01:00
}
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\EntryComment {#5326
+user: App\Entity\User {#5274 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: null
+root: null
+body: """
> Similarly, proprietary software can be secure despite being closed-source.\n
\n
That depends entirely on your threat model and the kind of relationship you have with the software vendor. Software might be proprietary and closed source but e.g. you might be the only customer and did get to engage an auditor which could see the source code. Or it might be off-the-shelf software made in a country trying to spy on your company or country. In some of those cases it literally can not be secure for your threat model.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705517231 {#5335
date: 2024-01-17 19:47:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5324 …}
+nested: Doctrine\ORM\PersistentCollection {#5322 …}
+votes: Doctrine\ORM\PersistentCollection {#5320 …}
+reports: Doctrine\ORM\PersistentCollection {#5318 …}
+favourites: Doctrine\ORM\PersistentCollection {#5286 …}
+notifications: Doctrine\ORM\PersistentCollection {#5290 …}
-id: 317327
-bodyTs: "'auditor':51 'case':83 'close':10,35 'closed-sourc':9 'code':57 'compani':76 'could':53 'countri':70,78 'custom':44 'depend':13 'despit':7 'e.g':38 'engag':49 'entir':14 'get':47 'kind':21 'liter':85 'made':67 'might':31,40,60 'model':18,93 'off-the-shelf':62 'proprietari':2,33 'relationship':23 'secur':6,89 'see':54 'shelf':65 'similar':1 'softwar':3,28,30,66 'sourc':11,36,56 'spi':73 'threat':17,92 'tri':71 'vendor':29"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/7689827"
+editedAt: null
+createdAt: DateTimeImmutable @1705517231 {#5271
date: 2024-01-17 19:47:11.0 +01:00
}
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5326
+user: App\Entity\User {#5274 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: null
+root: null
+body: """
> Similarly, proprietary software can be secure despite being closed-source.\n
\n
That depends entirely on your threat model and the kind of relationship you have with the software vendor. Software might be proprietary and closed source but e.g. you might be the only customer and did get to engage an auditor which could see the source code. Or it might be off-the-shelf software made in a country trying to spy on your company or country. In some of those cases it literally can not be secure for your threat model.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705517231 {#5335
date: 2024-01-17 19:47:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5324 …}
+nested: Doctrine\ORM\PersistentCollection {#5322 …}
+votes: Doctrine\ORM\PersistentCollection {#5320 …}
+reports: Doctrine\ORM\PersistentCollection {#5318 …}
+favourites: Doctrine\ORM\PersistentCollection {#5286 …}
+notifications: Doctrine\ORM\PersistentCollection {#5290 …}
-id: 317327
-bodyTs: "'auditor':51 'case':83 'close':10,35 'closed-sourc':9 'code':57 'compani':76 'could':53 'countri':70,78 'custom':44 'depend':13 'despit':7 'e.g':38 'engag':49 'entir':14 'get':47 'kind':21 'liter':85 'made':67 'might':31,40,60 'model':18,93 'off-the-shelf':62 'proprietari':2,33 'relationship':23 'secur':6,89 'see':54 'shelf':65 'similar':1 'softwar':3,28,30,66 'sourc':11,36,56 'spi':73 'threat':17,92 'tri':71 'vendor':29"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/7689827"
+editedAt: null
+createdAt: DateTimeImmutable @1705517231 {#5271
date: 2024-01-17 19:47:11.0 +01:00
}
} |
|
Show voter details
|
17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
18 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
} |
|
Show voter details
|
19 |
DENIED
|
edit
|
App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
} |
|
Show voter details
|
20 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
} |
|
Show voter details
|
21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
22 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5483
+user: Proxies\__CG__\App\Entity\User {#5475 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "I’m curious since I’m using graphene. What have you encountered?"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705516854 {#5478
date: 2024-01-17 19:40:54.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5473 …}
+nested: Doctrine\ORM\PersistentCollection {#5471 …}
+votes: Doctrine\ORM\PersistentCollection {#5469 …}
+reports: Doctrine\ORM\PersistentCollection {#5485 …}
+favourites: Doctrine\ORM\PersistentCollection {#5487 …}
+notifications: Doctrine\ORM\PersistentCollection {#5489 …}
-id: 317312
-bodyTs: "'curious':3 'encount':12 'graphen':8 'm':2,6 'sinc':4 'use':7"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://midwest.social/comment/6303373"
+editedAt: null
+createdAt: DateTimeImmutable @1705516854 {#5481
date: 2024-01-17 19:40:54.0 +01:00
}
} |
|
Show voter details
|
23 |
DENIED
|
edit
|
App\Entity\EntryComment {#5483
+user: Proxies\__CG__\App\Entity\User {#5475 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "I’m curious since I’m using graphene. What have you encountered?"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705516854 {#5478
date: 2024-01-17 19:40:54.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5473 …}
+nested: Doctrine\ORM\PersistentCollection {#5471 …}
+votes: Doctrine\ORM\PersistentCollection {#5469 …}
+reports: Doctrine\ORM\PersistentCollection {#5485 …}
+favourites: Doctrine\ORM\PersistentCollection {#5487 …}
+notifications: Doctrine\ORM\PersistentCollection {#5489 …}
-id: 317312
-bodyTs: "'curious':3 'encount':12 'graphen':8 'm':2,6 'sinc':4 'use':7"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://midwest.social/comment/6303373"
+editedAt: null
+createdAt: DateTimeImmutable @1705516854 {#5481
date: 2024-01-17 19:40:54.0 +01:00
}
} |
|
Show voter details
|
24 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5483
+user: Proxies\__CG__\App\Entity\User {#5475 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "I’m curious since I’m using graphene. What have you encountered?"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705516854 {#5478
date: 2024-01-17 19:40:54.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5473 …}
+nested: Doctrine\ORM\PersistentCollection {#5471 …}
+votes: Doctrine\ORM\PersistentCollection {#5469 …}
+reports: Doctrine\ORM\PersistentCollection {#5485 …}
+favourites: Doctrine\ORM\PersistentCollection {#5487 …}
+notifications: Doctrine\ORM\PersistentCollection {#5489 …}
-id: 317312
-bodyTs: "'curious':3 'encount':12 'graphen':8 'm':2,6 'sinc':4 'use':7"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://midwest.social/comment/6303373"
+editedAt: null
+createdAt: DateTimeImmutable @1705516854 {#5481
date: 2024-01-17 19:40:54.0 +01:00
}
} |
|
Show voter details
|
25 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
26 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5506
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5483
+user: Proxies\__CG__\App\Entity\User {#5475 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "I’m curious since I’m using graphene. What have you encountered?"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705516854 {#5478
date: 2024-01-17 19:40:54.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5473 …}
+nested: Doctrine\ORM\PersistentCollection {#5471 …}
+votes: Doctrine\ORM\PersistentCollection {#5469 …}
+reports: Doctrine\ORM\PersistentCollection {#5485 …}
+favourites: Doctrine\ORM\PersistentCollection {#5487 …}
+notifications: Doctrine\ORM\PersistentCollection {#5489 …}
-id: 317312
-bodyTs: "'curious':3 'encount':12 'graphen':8 'm':2,6 'sinc':4 'use':7"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://midwest.social/comment/6303373"
+editedAt: null
+createdAt: DateTimeImmutable @1705516854 {#5481
date: 2024-01-17 19:40:54.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "Minor stuff. It leaves a tab open in vanadium after charging, there is no option to wipe all cache data automatically after exiting, there is not much granularity in what data is stored in cache or persistent storage, and there is no way to view the web source code easily."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705525391 {#5501
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
"@degen@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#5498 …}
+nested: Doctrine\ORM\PersistentCollection {#5495 …}
+votes: Doctrine\ORM\PersistentCollection {#5493 …}
+reports: Doctrine\ORM\PersistentCollection {#5507 …}
+favourites: Doctrine\ORM\PersistentCollection {#5509 …}
+notifications: Doctrine\ORM\PersistentCollection {#5511 …}
-id: 317588
-bodyTs: "'automat':21 'cach':19,35 'charg':11 'code':49 'data':20,31 'easili':50 'exit':23 'granular':28 'leav':4 'minor':1 'much':27 'open':7 'option':15 'persist':37 'sourc':48 'storag':38 'store':33 'stuff':2 'tab':6 'vanadium':9 'view':45 'way':43 'web':47 'wipe':17"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6784256"
+editedAt: null
+createdAt: DateTimeImmutable @1705525391 {#5504
date: 2024-01-17 22:03:11.0 +01:00
}
} |
|
Show voter details
|
27 |
DENIED
|
edit
|
App\Entity\EntryComment {#5506
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5483
+user: Proxies\__CG__\App\Entity\User {#5475 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "I’m curious since I’m using graphene. What have you encountered?"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705516854 {#5478
date: 2024-01-17 19:40:54.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5473 …}
+nested: Doctrine\ORM\PersistentCollection {#5471 …}
+votes: Doctrine\ORM\PersistentCollection {#5469 …}
+reports: Doctrine\ORM\PersistentCollection {#5485 …}
+favourites: Doctrine\ORM\PersistentCollection {#5487 …}
+notifications: Doctrine\ORM\PersistentCollection {#5489 …}
-id: 317312
-bodyTs: "'curious':3 'encount':12 'graphen':8 'm':2,6 'sinc':4 'use':7"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://midwest.social/comment/6303373"
+editedAt: null
+createdAt: DateTimeImmutable @1705516854 {#5481
date: 2024-01-17 19:40:54.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "Minor stuff. It leaves a tab open in vanadium after charging, there is no option to wipe all cache data automatically after exiting, there is not much granularity in what data is stored in cache or persistent storage, and there is no way to view the web source code easily."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705525391 {#5501
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
"@degen@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#5498 …}
+nested: Doctrine\ORM\PersistentCollection {#5495 …}
+votes: Doctrine\ORM\PersistentCollection {#5493 …}
+reports: Doctrine\ORM\PersistentCollection {#5507 …}
+favourites: Doctrine\ORM\PersistentCollection {#5509 …}
+notifications: Doctrine\ORM\PersistentCollection {#5511 …}
-id: 317588
-bodyTs: "'automat':21 'cach':19,35 'charg':11 'code':49 'data':20,31 'easili':50 'exit':23 'granular':28 'leav':4 'minor':1 'much':27 'open':7 'option':15 'persist':37 'sourc':48 'storag':38 'store':33 'stuff':2 'tab':6 'vanadium':9 'view':45 'way':43 'web':47 'wipe':17"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6784256"
+editedAt: null
+createdAt: DateTimeImmutable @1705525391 {#5504
date: 2024-01-17 22:03:11.0 +01:00
}
} |
|
Show voter details
|
28 |
DENIED
|
moderate
|
App\Entity\EntryComment {#5506
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833
+user: Proxies\__CG__\App\Entity\User {#1896 …}
+magazine: App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1905 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1951 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1794
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1931 …}
+votes: Doctrine\ORM\PersistentCollection {#1957 …}
+reports: Doctrine\ORM\PersistentCollection {#1970 …}
+favourites: Doctrine\ORM\PersistentCollection {#1927 …}
+notifications: Doctrine\ORM\PersistentCollection {#2442 …}
+badges: Doctrine\ORM\PersistentCollection {#2440 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#2434
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5483
+user: Proxies\__CG__\App\Entity\User {#5475 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5446
+user: Proxies\__CG__\App\Entity\User {#5454 …}
+entry: App\Entity\Entry {#1833}
+magazine: App\Entity\Magazine {#265}
+image: null
+parent: App\Entity\EntryComment {#5363 …}
+root: App\Entity\EntryComment {#5363 …}
+body: "Plus, not many are willing to compile or even try/have the skill to read in to the code. Even with something like Vanadium on GrapheneOS I’ve encountered eyebrow raising behaviors I do not like."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705513723 {#5451
date: 2024-01-17 18:48:43.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
]
+children: Doctrine\ORM\PersistentCollection {#5457 …}
+nested: Doctrine\ORM\PersistentCollection {#5459 …}
+votes: Doctrine\ORM\PersistentCollection {#5455 …}
+reports: Doctrine\ORM\PersistentCollection {#5462 …}
+favourites: Doctrine\ORM\PersistentCollection {#5464 …}
+notifications: Doctrine\ORM\PersistentCollection {#5466 …}
-id: 317188
-bodyTs: "'behavior':31 'code':18 'compil':7 'encount':28 'even':9,19 'eyebrow':29 'grapheneo':25 'like':22,35 'mani':3 'plus':1 'rais':30 'read':14 'skill':12 'someth':21 'try/have':10 'vanadium':23 've':27 'will':5"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6780483"
+editedAt: null
+createdAt: DateTimeImmutable @1705513723 {#5448
date: 2024-01-17 18:48:43.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "I’m curious since I’m using graphene. What have you encountered?"
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1705516854 {#5478
date: 2024-01-17 19:40:54.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#5473 …}
+nested: Doctrine\ORM\PersistentCollection {#5471 …}
+votes: Doctrine\ORM\PersistentCollection {#5469 …}
+reports: Doctrine\ORM\PersistentCollection {#5485 …}
+favourites: Doctrine\ORM\PersistentCollection {#5487 …}
+notifications: Doctrine\ORM\PersistentCollection {#5489 …}
-id: 317312
-bodyTs: "'curious':3 'encount':12 'graphen':8 'm':2,6 'sinc':4 'use':7"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://midwest.social/comment/6303373"
+editedAt: null
+createdAt: DateTimeImmutable @1705516854 {#5481
date: 2024-01-17 19:40:54.0 +01:00
}
}
+root: App\Entity\EntryComment {#5363 …}
+body: "Minor stuff. It leaves a tab open in vanadium after charging, there is no option to wipe all cache data automatically after exiting, there is not much granularity in what data is stored in cache or persistent storage, and there is no way to view the web source code easily."
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705525391 {#5501
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
"@LWD@lemm.ee"
"@j4k3@lemmy.world"
"@degen@midwest.social"
]
+children: Doctrine\ORM\PersistentCollection {#5498 …}
+nested: Doctrine\ORM\PersistentCollection {#5495 …}
+votes: Doctrine\ORM\PersistentCollection {#5493 …}
+reports: Doctrine\ORM\PersistentCollection {#5507 …}
+favourites: Doctrine\ORM\PersistentCollection {#5509 …}
+notifications: Doctrine\ORM\PersistentCollection {#5511 …}
-id: 317588
-bodyTs: "'automat':21 'cach':19,35 'charg':11 'code':49 'data':20,31 'easili':50 'exit':23 'granular':28 'leav':4 'minor':1 'much':27 'open':7 'option':15 'persist':37 'sourc':48 'storag':38 'store':33 'stuff':2 'tab':6 'vanadium':9 'view':45 'way':43 'web':47 'wipe':17"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6784256"
+editedAt: null
+createdAt: DateTimeImmutable @1705525391 {#5504
date: 2024-01-17 22:03:11.0 +01:00
}
} |
|
Show voter details
|
29 |
DENIED
|
edit
|
App\Entity\Magazine {#265
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#275
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#253 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#249 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#238 …}
+entries: Doctrine\ORM\PersistentCollection {#196 …}
+posts: Doctrine\ORM\PersistentCollection {#154 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#216 …}
+bans: Doctrine\ORM\PersistentCollection {#133 …}
+reports: Doctrine\ORM\PersistentCollection {#119 …}
+badges: Doctrine\ORM\PersistentCollection {#97 …}
+logs: Doctrine\ORM\PersistentCollection {#87 …}
+awards: Doctrine\ORM\PersistentCollection {#76 …}
+categories: Doctrine\ORM\PersistentCollection {#63 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#269
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#271
date: 2023-10-07 00:21:18.0 +02:00
}
} |
|
Show voter details
|