1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
App\Entity\Entry {#1796
+user: Proxies\__CG__\App\Entity\User {#1395 …}
+magazine: App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1876 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1976 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1817
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1939 …}
+votes: Doctrine\ORM\PersistentCollection {#1932 …}
+reports: Doctrine\ORM\PersistentCollection {#1978 …}
+favourites: Doctrine\ORM\PersistentCollection {#1368 …}
+notifications: Doctrine\ORM\PersistentCollection {#2426 …}
+badges: Doctrine\ORM\PersistentCollection {#2439 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#1854
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
App\Entity\Entry {#1796
+user: Proxies\__CG__\App\Entity\User {#1395 …}
+magazine: App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1876 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1976 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1817
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1939 …}
+votes: Doctrine\ORM\PersistentCollection {#1932 …}
+reports: Doctrine\ORM\PersistentCollection {#1978 …}
+favourites: Doctrine\ORM\PersistentCollection {#1368 …}
+notifications: Doctrine\ORM\PersistentCollection {#2426 …}
+badges: Doctrine\ORM\PersistentCollection {#2439 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#1854
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1796
+user: Proxies\__CG__\App\Entity\User {#1395 …}
+magazine: App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1876 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1976 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1817
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1939 …}
+votes: Doctrine\ORM\PersistentCollection {#1932 …}
+reports: Doctrine\ORM\PersistentCollection {#1978 …}
+favourites: Doctrine\ORM\PersistentCollection {#1368 …}
+notifications: Doctrine\ORM\PersistentCollection {#2426 …}
+badges: Doctrine\ORM\PersistentCollection {#2439 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#1854
date: 2024-01-17 18:20:10.0 +01:00
}
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4050
+user: App\Entity\User {#3998 …}
+entry: App\Entity\Entry {#1796
+user: Proxies\__CG__\App\Entity\User {#1395 …}
+magazine: App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1876 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1976 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1817
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1939 …}
+votes: Doctrine\ORM\PersistentCollection {#1932 …}
+reports: Doctrine\ORM\PersistentCollection {#1978 …}
+favourites: Doctrine\ORM\PersistentCollection {#1368 …}
+notifications: Doctrine\ORM\PersistentCollection {#2426 …}
+badges: Doctrine\ORM\PersistentCollection {#2439 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#1854
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#264}
+image: null
+parent: null
+root: null
+body: """
> Similarly, proprietary software can be secure despite being closed-source.\n
\n
That depends entirely on your threat model and the kind of relationship you have with the software vendor. Software might be proprietary and closed source but e.g. you might be the only customer and did get to engage an auditor which could see the source code. Or it might be off-the-shelf software made in a country trying to spy on your company or country. In some of those cases it literally can not be secure for your threat model.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705517231 {#4059
date: 2024-01-17 19:47:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4048 …}
+nested: Doctrine\ORM\PersistentCollection {#4046 …}
+votes: Doctrine\ORM\PersistentCollection {#4044 …}
+reports: Doctrine\ORM\PersistentCollection {#4042 …}
+favourites: Doctrine\ORM\PersistentCollection {#4010 …}
+notifications: Doctrine\ORM\PersistentCollection {#4014 …}
-id: 317327
-bodyTs: "'auditor':51 'case':83 'close':10,35 'closed-sourc':9 'code':57 'compani':76 'could':53 'countri':70,78 'custom':44 'depend':13 'despit':7 'e.g':38 'engag':49 'entir':14 'get':47 'kind':21 'liter':85 'made':67 'might':31,40,60 'model':18,93 'off-the-shelf':62 'proprietari':2,33 'relationship':23 'secur':6,89 'see':54 'shelf':65 'similar':1 'softwar':3,28,30,66 'sourc':11,36,56 'spi':73 'threat':17,92 'tri':71 'vendor':29"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/7689827"
+editedAt: null
+createdAt: DateTimeImmutable @1705517231 {#3995
date: 2024-01-17 19:47:11.0 +01:00
}
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\EntryComment {#4050
+user: App\Entity\User {#3998 …}
+entry: App\Entity\Entry {#1796
+user: Proxies\__CG__\App\Entity\User {#1395 …}
+magazine: App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1876 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1976 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1817
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1939 …}
+votes: Doctrine\ORM\PersistentCollection {#1932 …}
+reports: Doctrine\ORM\PersistentCollection {#1978 …}
+favourites: Doctrine\ORM\PersistentCollection {#1368 …}
+notifications: Doctrine\ORM\PersistentCollection {#2426 …}
+badges: Doctrine\ORM\PersistentCollection {#2439 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#1854
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#264}
+image: null
+parent: null
+root: null
+body: """
> Similarly, proprietary software can be secure despite being closed-source.\n
\n
That depends entirely on your threat model and the kind of relationship you have with the software vendor. Software might be proprietary and closed source but e.g. you might be the only customer and did get to engage an auditor which could see the source code. Or it might be off-the-shelf software made in a country trying to spy on your company or country. In some of those cases it literally can not be secure for your threat model.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705517231 {#4059
date: 2024-01-17 19:47:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4048 …}
+nested: Doctrine\ORM\PersistentCollection {#4046 …}
+votes: Doctrine\ORM\PersistentCollection {#4044 …}
+reports: Doctrine\ORM\PersistentCollection {#4042 …}
+favourites: Doctrine\ORM\PersistentCollection {#4010 …}
+notifications: Doctrine\ORM\PersistentCollection {#4014 …}
-id: 317327
-bodyTs: "'auditor':51 'case':83 'close':10,35 'closed-sourc':9 'code':57 'compani':76 'could':53 'countri':70,78 'custom':44 'depend':13 'despit':7 'e.g':38 'engag':49 'entir':14 'get':47 'kind':21 'liter':85 'made':67 'might':31,40,60 'model':18,93 'off-the-shelf':62 'proprietari':2,33 'relationship':23 'secur':6,89 'see':54 'shelf':65 'similar':1 'softwar':3,28,30,66 'sourc':11,36,56 'spi':73 'threat':17,92 'tri':71 'vendor':29"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/7689827"
+editedAt: null
+createdAt: DateTimeImmutable @1705517231 {#3995
date: 2024-01-17 19:47:11.0 +01:00
}
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\EntryComment {#4050
+user: App\Entity\User {#3998 …}
+entry: App\Entity\Entry {#1796
+user: Proxies\__CG__\App\Entity\User {#1395 …}
+magazine: App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
}
+image: Proxies\__CG__\App\Entity\Image {#1876 …}
+domain: Proxies\__CG__\App\Entity\Domain {#1976 …}
+slug: "Common-misconceptions-about-privacy-and-security"
+title: "Common misconceptions about privacy and security"
+url: "https://www.privacyguides.org/en/basics/common-misconceptions/"
+body: """
Summary:\n
\n
The [article](https://www.privacyguides.org/en/basics/common-misconceptions/) debunks several common misconceptions related to software security and privacy:\n
\n
**“Open-source software is always secure” or “Proprietary software is more secure”**\n
\n
First, it clarifies that whether software is open-source or proprietary does not directly impact its security. Open-source software can be more secure due to transparency and third-party audits, but there is no guaranteed correlation. Similarly, proprietary software can be secure despite being closed-source.\n
\n
**“Shifting trust can increase privacy”**\n
\n
Second, the concept of “shifting trust” is discussed, emphasizing that merely transferring trust from one entity to another does not ensure complete security. Instead, users should combine various tools and strategies to protect their data effectively.\n
\n
**“Privacy-focused solutions are inherently trustworthy”**\n
\n
Third, focusing only on privacy policies and marketing claims of privacy-focused solutions can be misleading. Users should prioritize technical safeguards, such as end-to-end encryption, over trusting providers based on their stated intentions alone.\n
\n
**“Complicated is better”**\n
\n
Lastly, the complexity of privacy solutions is addressed, encouraging users to focus on practical, achievable methods rather than unrealistic, convoluted approaches.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 4
+favouriteCount: 31
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1705525391 {#1817
date: 2024-01-17 22:03:11.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#1939 …}
+votes: Doctrine\ORM\PersistentCollection {#1932 …}
+reports: Doctrine\ORM\PersistentCollection {#1978 …}
+favourites: Doctrine\ORM\PersistentCollection {#1368 …}
+notifications: Doctrine\ORM\PersistentCollection {#2426 …}
+badges: Doctrine\ORM\PersistentCollection {#2439 …}
+children: []
-id: 31247
-titleTs: "'common':1 'misconcept':2 'privaci':4 'secur':6"
-bodyTs: "'/en/basics/common-misconceptions/)':6 'achiev':184 'address':177 'alon':166 'alway':22 'anoth':103 'approach':190 'articl':3 'audit':63 'base':161 'better':169 'claim':137 'clarifi':32 'close':79 'closed-sourc':78 'combin':112 'common':9 'complet':107 'complex':172 'complic':167 'concept':88 'convolut':189 'correl':69 'data':120 'debunk':7 'despit':76 'direct':44 'discuss':93 'due':56 'effect':121 'emphas':94 'encourag':178 'encrypt':157 'end':154,156 'end-to-end':153 'ensur':106 'entiti':101 'first':30 'focus':124,130,141,181 'guarante':68 'impact':45 'increas':84 'inher':127 'instead':109 'intent':165 'last':170 'market':136 'mere':96 'method':185 'misconcept':10 'mislead':145 'one':100 'open':18,38,49 'open-sourc':17,37,48 'parti':62 'polici':134 'practic':183 'priorit':148 'privaci':16,85,123,133,140,174 'privacy-focus':122,139 'proprietari':25,41,71 'protect':118 'provid':160 'rather':186 'relat':11 'safeguard':150 'second':86 'secur':14,23,29,47,55,75,108 'sever':8 'shift':81,90 'similar':70 'softwar':13,20,26,35,51,72 'solut':125,142,175 'sourc':19,39,50,80 'state':164 'strategi':116 'summari':1 'technic':149 'third':61,129 'third-parti':60 'tool':114 'transfer':97 'transpar':58 'trust':82,91,98,159 'trustworthi':128 'unrealist':188 'user':110,146,179 'various':113 'whether':34 'www.privacyguides.org':5 'www.privacyguides.org/en/basics/common-misconceptions/)':4"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1705598410
+visibility: "visible "
+apId: "https://lemmy.world/post/10833312"
+editedAt: null
+createdAt: DateTimeImmutable @1705512010 {#1854
date: 2024-01-17 18:20:10.0 +01:00
}
}
+magazine: App\Entity\Magazine {#264}
+image: null
+parent: null
+root: null
+body: """
> Similarly, proprietary software can be secure despite being closed-source.\n
\n
That depends entirely on your threat model and the kind of relationship you have with the software vendor. Software might be proprietary and closed source but e.g. you might be the only customer and did get to engage an auditor which could see the source code. Or it might be off-the-shelf software made in a country trying to spy on your company or country. In some of those cases it literally can not be secure for your threat model.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1705517231 {#4059
date: 2024-01-17 19:47:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@ForgottenFlux@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#4048 …}
+nested: Doctrine\ORM\PersistentCollection {#4046 …}
+votes: Doctrine\ORM\PersistentCollection {#4044 …}
+reports: Doctrine\ORM\PersistentCollection {#4042 …}
+favourites: Doctrine\ORM\PersistentCollection {#4010 …}
+notifications: Doctrine\ORM\PersistentCollection {#4014 …}
-id: 317327
-bodyTs: "'auditor':51 'case':83 'close':10,35 'closed-sourc':9 'code':57 'compani':76 'could':53 'countri':70,78 'custom':44 'depend':13 'despit':7 'e.g':38 'engag':49 'entir':14 'get':47 'kind':21 'liter':85 'made':67 'might':31,40,60 'model':18,93 'off-the-shelf':62 'proprietari':2,33 'relationship':23 'secur':6,89 'see':54 'shelf':65 'similar':1 'softwar':3,28,30,66 'sourc':11,36,56 'spi':73 'threat':17,92 'tri':71 'vendor':29"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://sh.itjust.works/comment/7689827"
+editedAt: null
+createdAt: DateTimeImmutable @1705517231 {#3995
date: 2024-01-17 19:47:11.0 +01:00
}
} |
|
Show voter details
|
9 |
DENIED
|
edit
|
App\Entity\Magazine {#264
+icon: null
+name: "privacyguides@lemmy.one"
+title: "privacyguides"
+description: """
*In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.*\n
\n
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.\n
\n
---\n
\n
You can subscribe to this community from any Kbin or Lemmy instance:\n
\n
- [Subscribe on Kbin.social](https://kbin.social/m/privacyguides@lemmy.one)\n
- [Subscribe on Lemmy.one](https://lemmy.one/c/privacyguides)\n
- [Subscribe on Lemmy.ml](https://lemmy.ml/c/privacyguides@lemmy.one)\n
- [Subscribe on Beehaw.org](https://beehaw.org/c/privacyguides@lemmy.one)\n
\n
[Learn more…](https://lemmy.one/post/355)\n
\n
---\n
\n
Check out our website at [privacyguides.org](https://www.privacyguides.org) before asking your questions here. We’ve tried answering the common questions and recommendations there!\n
\n
Want to get involved? The website is [open-source on GitHub](https://github.com/privacyguides/privacyguides.org), and your help would be appreciated!\n
\n
---\n
\n
**This community is the “official” Privacy Guides community on Lemmy, which can be [verified here](https://www.reddit.com/r/PrivacyGuides/comments/13x7oe3/who_wants_to_try_out_lemmy_privacyguideslemmyone/). Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.**\n
\n
---\n
\n
**Moderation Rules:**\n
\n
1. We prefer posting about open-source software whenever possible.\n
2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, [make a suggestion on our forum first](https://discuss.privacyguides.net/c/site-development/suggestions/6).\n
3. No soliciting engagement: Don’t ask for upvotes, follows, etc.\n
4. Surveys, Fundraising, and Petitions must be **pre**-approved by the mod team.\n
5. Be civil, no violence, hate speech. Assume people here are posting in good faith.\n
6. Don’t repost topics which have already been covered here.\n
7. News posts must be related to privacy and security, and **your post title must match the article headline exactly.** Do not editorialize titles, you can post your opinions in the post body or a comment.\n
8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.\n
9. **No help vampires:** This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.\n
10. No misinformation: Extraordinary claims must be matched with **evidence.**\n
11. Do not post about VPNs or cryptocurrencies which are not listed on [privacyguides.org](https://www.privacyguides.org/en/tools/). See Rule 2 for info on adding new recommendations to the website.\n
12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. **We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.**\n
\n
---\n
\n
Additional Resources:\n
\n
- [EFF: Surveillance Self-Defense](https://ssd.eff.org/)\n
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/)\n
- [Jonah Aragon](https://www.jonaharagon.com) ([YouTube](https://youtube.com/@jonaharagon))\n
- [r/Privacy](https://www.reddit.com/r/Privacy)\n
- [Big Ass Data Broker Opt-Out List](https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List)
"""
+rules: null
+subscriptionsCount: 1
+entryCount: 259
+entryCommentCount: 2490
+postCount: 5
+postCommentCount: 29
+isAdult: false
+customCss: null
+lastActive: DateTime @1729537882 {#274
date: 2024-10-21 21:11:22.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#252 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#248 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#237 …}
+entries: Doctrine\ORM\PersistentCollection {#195 …}
+posts: Doctrine\ORM\PersistentCollection {#153 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#215 …}
+bans: Doctrine\ORM\PersistentCollection {#132 …}
+reports: Doctrine\ORM\PersistentCollection {#118 …}
+badges: Doctrine\ORM\PersistentCollection {#96 …}
+logs: Doctrine\ORM\PersistentCollection {#86 …}
+awards: Doctrine\ORM\PersistentCollection {#75 …}
+categories: Doctrine\ORM\PersistentCollection {#62 …}
-id: 39
+apId: "privacyguides@lemmy.one"
+apProfileId: "https://lemmy.one/c/privacyguides"
+apPublicUrl: "https://lemmy.one/c/privacyguides"
+apFollowersUrl: "https://lemmy.one/c/privacyguides/followers"
+apInboxUrl: "https://lemmy.one/inbox"
+apDomain: "lemmy.one"
+apPreferredUsername: "privacyguides"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1729576084 {#268
date: 2024-10-22 07:48:04.0 +02:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1696630878 {#270
date: 2023-10-07 00:21:18.0 +02:00
}
} |
|
Show voter details
|