NaibofTabr

@NaibofTabr@infosec.pub

This profile is from a federated server and may be incomplete. Browse more on the original instance.

NaibofTabr, (edited )

Yes, it is damage control. That’s OK.

The whole point of spreading the word about an incident like this is to get public attention on it, and make the company realize that the way they’ve handled things was bad.

A letter like this indicates that they’ve realized they fucked up and they want to do things differently going forward. That doesn’t mean they’re suddenly trustworthy, but it does mean they can be negotiated with.

The correct response is to accept the offer of working together. We want to encourage companies to be cooperative and discourage insular, proprietary behavior. If you slap away the offered hand then you discourage future cooperation, and now you’re the roadblock to developing an open system.

When you start getting the results that you want, don’t respond with further hostility.

The desire to build a self-defense kit from Google and the Internet as it is today

(if you don’t want to go through all my strident words) Thus, after this rant, my question is: where do I start from to build my surviving kit and my right to be private and disclose personal information to who and when I want to. How I become the actual owner of my device?...

NaibofTabr,

I completely agree with your point of view. If you don’t control your technology, then your technology controls you.

You should know that it’s really incredibly difficult to actually establish privacy on internet connected devices. They are designed to share information. Security is often an afterthought and privacy is often directly opposed to the goals of the corporations. It is possible to get a fair amount of privacy, but it is not easy. It will cost a lot of time in learning and configuring things, money to buy specific devices with specific features, and the sacrifice of the convenience that comes with mainstream products (you will have to do a lot more for yourself). There is no quick solution, it is an endless struggle - but personally I think the learning process is extremely rewarding and the skills you gain will be very useful.

So, where to begin? I would recommend learning about the technology that underpins all of the data gathering - computer networking. In order to make real decisions about how to use the technology and how to secure it, you need to understand how it works. You won’t ever know if you are leaking data if you don’t understand how that data is collected and transmitted.

I would like to point you to Professor Messer’s Network+ training course, starting with the OSI model. This will help you learn the terminology of computer networking, and the concepts that underlie everything on the internet. If you get through the Network+ content, do Security+ also.

I also want to recommend the Selfhosted@lemmy.world community. A major goal of self hosting is separating your internet services from corporate control. This community is great place to learn and ask questions.

You should get a cheap computer (old, out of date hardware is completely fine) and install Linux on it so you can start learning how to use it (you’ll need this to get away from Microsoft and Apple, and more importantly to have some control over your computing environment).

You might also be interested in the Murena 2 smartphone. It has physical switches for turning off the microphone and camera and network connections, and it runs /e/os (a de-Googled Android version).

There’s also the Privacy, Security, and OSINT podcast.

I could write about other resources but this post has gotten long. Please feel free to ask me more about anything that interests you.

NaibofTabr,

Oh damn, I didn’t realize. All the episode links are dead. Well, shit.

I’ve still got a local copy of the last episode, , in my podcast app… but that’s it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #