privacy

This magazine is from a federated server and may be incomplete. Browse more on the original instance.

rho50, in How bad is TPM on a laptop for privacy?

Tl;dr: TPMs are very unlikely to make your privacy better or worse, but they could definitely be abused by a company like MS to make end users’ experiences worse. They could also be used for significant security and privacy gains… they’re a tool.

The TPM can be used to provide a cryptographic binding between aspects of your system’s configuration and a unique key which is resident within the TPM (a process called “attestation”). It can also generate secondary keys that are associated with the base key, and use those to do cryptographic operations like encryption/decryption and authentication.

Telemetry wise, the TPM’s only utility might be to “prove” that the data sent from your PC wasn’t tampered with. That said, I don’t think MS is actually doing that, and they don’t need to in order to be incredibly invasive in their telemetry.

The (imo) worst way in which a TPM might be abused in a user-hostile sense is to detect if the OS has been modified by the user, or if an installation isn’t legitimate, etc. That could be used to disable certain features if you try to install unauthorised software, dual boot Linux or whatever. This would be similar to the smartphones of today, which can for example disable access to banking apps if jailbroken/rooted.

TPMs (>2.0 at least) otherwise have the potential to realise a significant improvement in security and privacy for users, if used correctly. They can be used for encryption and credentials that are bound in hardware and therefore practically impossible to steal. And can detect hardware tampering and potentially foil Evil Maid attacks. Imagine if your login sessions for various websites were bound to your hardware, such that a dodgy extension could never steal your cookies.

wAkawAka,
@wAkawAka@lemmy.world avatar

Big thanks for detailed answer! My understanding is more clear now.

MayonnaiseArch, in Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form'
@MayonnaiseArch@beehaw.org avatar

The best thing is reading all of this with github.com/samhocevar/no-fucking-thanks

quaver,

This announcement doesn’t have anything to do with cryptocurrencies or nfts. I’m not sure if I like the idea yet either, but please don’t conflate it with all that other scammy nonsense.

0xD,

You should first try reading it at all.

MayonnaiseArch,
@MayonnaiseArch@beehaw.org avatar

I dont want to, I just said it looks interesting if you use that addon.

andruid,

While it is funny (honestly replacing any tech term with circlejerk in a tech article makes it sound so funny to me, I have the mind of a child), it’s not very relevent here.

TCB13, (edited ) in Deciding between Fairphone 5 and Pixel 8
@TCB13@lemmy.world avatar

Pixel because it supports GrapheneOS thus more secure and private.

Calyx isn’t as good as GrapheneOS, they do a lot of snitching on you (including to Google and Mozilla) and they overlook critical details such as this one allowing the OS to contact 3rd parties such as Qualcomm.

BearOfaTime,

How does DivestOS compare to Graphene in your opinion?

Divest is based on Lineage, which isn’t as secure as Graphene (by a significant margin), but my understanding is Divest has done some things to improve sscurity/privacy.

I realize since we’re talking a Pixel here, Graphene is the security/privacy answer. I have other phones in my “support circle” that can use Lineage or Divest, and I’d like to advise people appropriately.

jacktherippah,

DivestOS is the best option for someone who already has a non-Pixel device. For a Pixel, the developer of DivestOS himself recommends GrapheneOS.

TCB13,
@TCB13@lemmy.world avatar

I don’t have an opinion on DivestOS. Never used nor audited the thing so I can’t comment.

virtualbriefcase, (edited ) in Facebook on separate device

What, social lives? Get outta here with that nonsense and be a hobbit like the rest of us :)

Seriously though, if you’re thinking on a phone I’d reccomend just creating a second profile instead of getting a whole new device. The apps won’t be running when the profile is running, and as a bonus you can usually restrict the profile’s permissions. Also consider checking out web wrappers (e.g. frost) or PWAs.

On a desktop you can always just use the web version, bonus points if you auto clear cookies or have a separate profile.

Edit: if you already have a spare then that might work better than profiles.

cosmicrookie,
@cosmicrookie@lemmy.world avatar

I think that a spare device with disabled GPS and maybe even disabled microphone (can i do that?) would work best. Some of the features on Instagram can’t be accessed on a browser

TheButtonJustSpins, (edited ) in Deciding between Fairphone 5 and Pixel 8

Try Petal Maps; might be able to replace Google Maps for you. It also has traffic info.

pkill,

OsmAnd is better since Petal Maps is proprietary.

nottheengineer,

I already have Osmand and while it’s a great offline map, it can’t pick the fastest route for me every single day.

jlow,

Another alternative is OrganicMaps which people seem to like. I can’t stand then colors and it hasn’t as many features but it’s nice otherwise

voracitude, in Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form'

This is basically like Domain Keys-Identified Mail (DKIM) but for a specific email address, without needing to own a domain to set it up. I’m gonna call it “P(ersonal)KIM” for short.

If this is implemented correctly it’ll be a few clicks to set up and then just work in the background to make it harder to impersonate you via email, even if you have a free email address.

pkill, in Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form'

Who cares about their honeypot

toomanyjoints69,

We now have an unalterable record of exactly who you are for your anonymous email address. For your privacy.

ichbinjasokreativ, in How bad is TPM on a laptop for privacy?

You confuse TPMs with Microsoft’s proprietary pluton processor, which is now being forced into consumer grade CPUs from AMD and Intel.

pkill, in Deciding between Fairphone 5 and Pixel 8

Pixel has superior hardware security afaik

Gradually_Adjusting, in Was forced to use a third party to fill a rental application. The application failed and now they're demanding significantly more sensitive information than what I ever provided before they'll comply. In UK. This can't be legal?
@Gradually_Adjusting@lemmy.world avatar

That’s wild.

Tangentially, fuck a TV license.

AdvicePleaseThankyou, (edited )

It is, had a proper look and also definitely not what they're meant to be doing:
https://ico.org.uk/for-the-public/your-right-to-get-your-data-deleted/#:~:text=The%20organisation%20should%20delete%20your,impossible%20or%20involve%20disproportionate%20effort.

I replied saying no, and told them again to delete my data.

Gradually_Adjusting,
@Gradually_Adjusting@lemmy.world avatar

A little firmness is all. Good on ya

drre, in Was forced to use a third party to fill a rental application. The application failed and now they're demanding significantly more sensitive information than what I ever provided before they'll comply. In UK. This can't be legal?

i guess it’s related to the following; exercising your rights under gdpr requires the other party to be able to identify you. that’s why they need this information. if you want to (potentially) fuck with them: first ask for a listing of all the information they have about you, before asking for deleting your data. this listing must contain the request itself. if your request is missing, they are likely breaking compliance rules.

AdvicePleaseThankyou,

first ask for a listing of all the information they have about you, before asking for deleting your data. this listing must contain the request itself. if your request is missing, they are likely breaking compliance rules.

I'm not quite understanding, do you mind breaking that down for me?

Piecemakers3Dprints,
@Piecemakers3Dprints@lemmy.world avatar

1.) Ask for a listing of all the information they have about you.

2.) If your aforementioned Deletion request (see title) is missing from that list, they are likely breaking compliance rules.

3.) …

4.) Profit!

drre,

one of your rights under gdpr is that you are entitled (free of charge) to a listing of all the data the other party has about you.

when you ask them about this listing this request itself becomes data the party has about you. it should therefore he included in the listing. (it is self referential, but that’s how it is).

if the information that you requested such a listing is missing from the data they provide in response to you request, they are in breach of gdpr rules. from them on you might want to file a complaint.

( I’ve no idea whether this would result in any meaningful compensation, if at all. but at least it should keep them busy.)

AdvicePleaseThankyou, in Was forced to use a third party to fill a rental application. The application failed and now they're demanding significantly more sensitive information than what I ever provided before they'll comply. In UK. This can't be legal?

Their reply:

The reason that we ask for ID is to safeguard your personal data by verifying that the request is genuine before proceeding with deleting your personal data. This process is consistent with guidance published by the Information Commissioner’s Office. (https://ico.org.uk/your-data-matters/your-right-to-get-your-data-deleted/)

The purpose of this process is to prevent someone unauthorised from requesting deletion of your data, for example where there are shared email addresses, or someone has access to your account or email address, or where someone is spoofing your email address. Please see our Privacy Policy (xxxxxx) for more information about personal data we collect store and process.

Please be assured that when you send ID to our dedicated ID email address, this is automatically and permanently deleted from our systems within 7 days. We do not continue to store or process your ID beyond this time or use it for any other purpose other than to verify your identity to action your erasure request.

If you would prefer not to send ID via email, you can post copies to our address and upon receipt from our team we will then securely dispose of the copies. Please send these to:
Data Protection Team,
xxxx
xxx
xx

I hope the above explains our rationale and allays any concerns you may have. If you have any further questions please do not hesitate to ask.

Chais, in Deciding between Fairphone 5 and Pixel 8
@Chais@sh.itjust.works avatar

With the Fairphone you get more than just a replaceable battery. You get replaceable nearly everything. Also they do their best to ethically source the materials. In terms of ROMs there is also Iodé, also based on LOS, and if you go with a FP4 instead Ubuntu Touch.

TheAnonymouseJoker, (edited ) in Deciding between Fairphone 5 and Pixel 8
@TheAnonymouseJoker@lemmy.ml avatar

Fairphone. Pixel is garbage. Fairphone gives you 3-5 years more security updates, and is thus more secure than Pixel.

AdvicePleaseThankyou, in Was forced to use a third party to fill a rental application. The application failed and now they're demanding significantly more sensitive information than what I ever provided before they'll comply. In UK. This can't be legal?

Considering the information I'm asking them to delete, yes.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #