privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

chaosppe, in Have I Been Pwned adds 71 million emails from Naz.API stolen account list
@chaosppe@lemmy.world avatar

I’ve checked the list on mine, those are some really really old passwords… Must’ve been a long time ago.

bfg9k,
@bfg9k@lemmy.world avatar

How were you able to search the list? I can’t find it anywhere

chaosppe, (edited )
@chaosppe@lemmy.world avatar
bfg9k,
@bfg9k@lemmy.world avatar

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

notannpc, in There’s a Multibillion-Dollar Market for Your Phone’s Location Data – The Markup

Shit, that’s easy. It’s in my pocket. They can have that nugget of info for free.

optissima,

They’re taking it all for free

Kiwi_Girl,
@Kiwi_Girl@lemmy.blahaj.zone avatar

Left or right?

notannpc,

Now that’ll cost ya

corvus, in Debate: Go vs Rust (Toolchain Privacy Practices)
@corvus@lemmy.ml avatar

You want a debate posting homepage links? At least take the time to post a brief summary of the main points concerning the issues for each language. At the very least the actual links where the information is located.

RuikkaaPrus,
@RuikkaaPrus@lemmy.ml avatar

You’re right. Maybe I should have put more information about it. The idea was perhaps to find out what information the Lemmy community could share. I would like to be as experienced as other community members, but I’m not very expert yet :(

gregorum, in Have I Been Pwned adds 71 million emails from Naz.API stolen account list

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

PM_Your_Nudes_Please,

Take the opportunity to switch to a password manager, which will allow for unique passwords.

Shamot, in Android and iOS settings for better security and privacy
@Shamot@jlai.lu avatar

What’s the problem with 2G?

INeedMana, (edited )
@INeedMana@lemmy.world avatar

I can’t find better source ATM but basically its encryption is not good enough anymore

ForgottenFlux,

I’m not the writer of the article, but here’s an answer you can find on running a quick search.

According to this article from the Electronic Frontier Foundation (EFF):

What is 2G and why is it vulnerable?

2G is the second generation of mobile communications, created in 1991. It’s an old technology that at the time did not consider certain risk scenarios to protect its users. As years have gone, many vulnerabilities have been discovered in 2G and it’s companion SS7.

The primary problem with 2G stems from two facts. First, it uses weak encryption between the tower and device that can be cracked in real time by an attacker to intercept calls or text messages. In fact, the attacker can do this passively without ever transmitting a single packet. The second problem with 2G is that there is no authentication of the tower to the phone, which means that anyone can seamlessly impersonate a real 2G tower and your phone will never be the wiser.

Cell-site simulators sometimes work this way. They can exploit security flaws in 2G in order to intercept your communications. Even though many of the security flaws in 2G have been fixed in 4G, more advanced cell-site simulators can take advantage of remaining flaws to downgrade your connection to 2G, making your phone susceptible to the above attacks. This makes every user vulnerable—from journalists and activists to medical professionals, government officials, and law enforcement.

INeedMana, in Android and iOS settings for better security and privacy
@INeedMana@lemmy.world avatar

I think this article is so-so. For example

  • Display: Screen timeout: Shortest duration you are comfortable with
  • Wallpaper & style: Set your lock screen to something generic and non-personal (no family photos, etc)
    (…)
  • Security & Privacy: Device Unlock: Screen lock: Strong password preferred, followed by PIN, then Pattern.
  • Security & Privacy: Device Unlock: Screen lock settings: Enhanced PIN privacy: Enabled
  • Security & Privacy: Device Unlock: Screen lock settings: Lock after screen timeout: Shortest duration you are comfortable with

These don’t affect “the amount of tracking and data collection these devices perform”. Might be good ideas in themselves, but bundling these with options that really diminish the amount of data broadcasted, washes the picture out IMO

ForgottenFlux,

The settings you’ve highlighted do improve device security against common threats, such as those posed by nosy people who find the device unattended, as I’ve mentioned in the post.

INeedMana,
@INeedMana@lemmy.world avatar

And I was commenting on the article. Which only has two lists and at the bottom

By enabling all of these settings, you are significantly reducing the amount of tracking and data collection these devices perform, but keep in mind that you are not completely eliminating it.

And I’m criticizing that

ForgottenFlux,

You make a valid point. As I’m not the writer of the article, perhaps it would be apt to convey your feedback to the writer.

cjf,

So if an iPhone gets stolen, would having Find My completely disabled actually be a bad thing if we’re trying to improve device security? I see that’s listed in the article.

Would this affect the ability to use the remote lock & wipe functionality?

ForgottenFlux,

The setting you’re mentioning i.e., Apple ID > Find My: Disable everything^1^ has superscript i.e., ^1^ attached to it. The superscript leads to the following note:

^1^: Some people prefer to leave “Find My iPhone” enabled as it allows them to remotely wipe the device if it gets lost. However, due to enabling the “Erase Data” setting, I don’t believe this is necessary. If it makes you feel better or if you have a specific use case for it, you can leave this feature on, but “Share My Location” should still be disabled (unless you use need to use it often) as this feature will report your location back to Apple regularly.

I’m not the writer of the article, but I think that this note makes it clear that you can configure this setting according to your threat model.

cjf,

Ah yes. I missed that bit. Thanks :)

jherazob, in New Advertisement and Internet connection permissions for Simple SMS Messenger on Google Play Store...
@jherazob@beehaw.org avatar

Tibor betrayed us and sold the Simple Apps suite to a sleazy adtech company a while ago, there were multiple posts on this suggesting replacements, then one of the most active devs forked it into Fossify, removing all the branding and references to the original, work is still ongoing on this, already some of the apps have been rereleased, here’s a handy matrix of the progress on the rerelease from somebody on Github

viking,
@viking@infosec.pub avatar

Wow, I never heard of that before. Is there any replacement for simple gallery, before they screw with it?

winkerjadams,

Did you click on the link in the comment you replied to?

viking,
@viking@infosec.pub avatar

Honestly no, since it was talking about the SMS messenger. I’ll have a look then.

Engywuck, in Active combat against surveillance instead of passive defense

Not to be a defeatist, but unless a significant share of internet users does this, the effect would be at most negligible.

OsrsNeedsF2P,

Not true. I run ad campaigns and pay upwards of 1$ a click most times. AdNauseum hurts like hell.

Please use it :)

Kir,

Love this answer

ArcticDagger,

Is it possible for you to somehow quantify traffic originating from AdNauseum? If so, how?

Shamot, in Active combat against surveillance instead of passive defense
@Shamot@jlai.lu avatar

This would help them to improve the algorithms and make it worse. An active defense could be to keep the ads visible and boycott the announcers, so that they lose more money when they pay for advertising.

Kir,

Adv effectiveness is a fraud anyway, so they wouldn’t care nor notice it.

Fleppensteijn, in Each Facebook User is Monitored by Thousands of Companies – The Markup
@Fleppensteijn@feddit.nl avatar

Years ago, Facebook kept nagging about privacy settings and almost pushed users to turn off all tracking etc.

Now, my Facebook always says there is no recent activity, downloading all data from FB shows they seem to have nothing on me. So are they just lying about what they share with who?

hangukdise,

Yeeeesssss

ReversalHatchery,

This is just my opinion, but why would they tell you the truth? It’s not like you can find out they are lying.

merde, in There’s a Multibillion-Dollar Market for Your Phone’s Location Data – The Markup

how to talk about this with the “I’ve got nothing to hide” crowd 🤷

interdimensionalmeme,

Just frame them for murder

Murdoc,

I’ve heard others suggest something like “then you won’t mind giving me your SSN/SIN, bank account details and PIN, all your e-mail and computer passwords…” and whatever else you can think of, and if they are still ok with that, then add “and I’ll post them on the internet.” I don’t know how well it works though as I haven’t had the chance to try it.
People who say this are assuming benign, rational actors, but there are plenty of predatory and irrational ones that will misuse your data. So a list of examples, general and specific, may help there.
Hmm, could we as a community compile such a list for people to use as a kit (assuming it hasn’t been done already)? Then when people get the opportunity to use it, they could provide feedback that can be used to improve the kit. E.g., which examples work best, which don’t, presentation methods, etc. Does this sound like something people would want, and/or want to contribute to? I know that I’d find it handy.

KarnaSubarna, (edited )
@KarnaSubarna@lemmy.ml avatar

This is how I explained it to one of my friends who is/was definitely a member of “I’ve got nothing to hide” club -

  • Suppose you are in a pay-to-use toilet minding your own Business.
  • That pay-to-use toilet is managed by a public/private entity called ToiletBook.
  • Suddenly you notice a (hidden) camera in the room.
  • When confronted, the owner confirms the only reason they took your picture to suggest you the perfect underwear based on your size. And, there is a legal guarantee that picture/data will never be used for any other purpose and only be processed by machine.
  • Will you still go to such toilet?

BTW, that friend stopped talking to me afterward; not sure why 🤔 (Edit: I should stop giving shitty examples to anyone, as it seems ) 🤐

Lemmyvisitor,

they left to patent ToiletBook

KarnaSubarna,
@KarnaSubarna@lemmy.ml avatar

😂

MNByChoice, in There’s a Multibillion-Dollar Market for Your Phone’s Location Data – The Markup

Always seemed the best way to stop this was to make someone important’s data public.

interdimensionalmeme,

Yes, just look what happen to tge free speech absolutist was refused buying silence from assassination coordinates guy.

doctortofu, in There’s a Multibillion-Dollar Market for Your Phone’s Location Data – The Markup
@doctortofu@reddthat.com avatar

And that’s why location is always off on all my devices, and gets turned on only when I want to search for something nearby or use navigation. Then it goes back off until the next time I need it.

floofloof, (edited )

Your location can still be triangulated from cell towers. But maybe fewer companies have access to that info.

cmeerw,

Also the location of known Wifi networks.

Land_Strider, in Each Facebook User is Monitored by Thousands of Companies – The Markup

While I don’t touch anything Meta (formerly Facebook) at any time, what is the explicit route of data gathering here?

From what I understand, these companies willingly give user data to Facebook, which then utilizes the data to: Use the provided information to match your Facebook user id with the other companies’ user id, so it can understand when you made an activity in the other companies’ sites, games etc. and show you stuff (ads only if you are naive, or propaganda through engineered post and ad visibility jf know at least about Cambridge Analytica) about it when you are in Facebook.

Is this the route user data follows and is utilized? If so, shouldn’t these mentioned other companies including Facebook’s and whatnot’s 3rd party tracking pixels n their own domains, and also sharing your data to themselves directly be the focus of privacy concerns as they “leak” your user data? Doesn’t the most of the blame fall on these other companies, or does the implied blame here that user data transfer is mutual and Facebook forwards these user data from company A to company B in the list, as well?

KarnaSubarna,
@KarnaSubarna@lemmy.ml avatar

It’s a sell and not leak of data. It’s actually called Server to Server (S2S) tracking.

tinuiti.com/blog/…/server-to-server-tracking/

revealbot.com/blog/facebook-conversions-api/

waratchess, (edited ) in The Boost android client for Lemmy is displaying these dark pattern ads pretending to be system notifications. What security/privacy conscious Lemmy clients do you recommend?

Voyager

It’s a FOSS privacy respecting Lemmy client.

It’s available on Android and IOS

You can also try it as a PWA: vger.app

labbbb,

Another one URL I use: wefwef.app

waratchess,

The OG

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #