help-circle
rss
Warning to new tutamail users, your account could be temporary
I made my first and only account with tutamail and within 48 hours it was disabled due to abuse. It really bothered me because I had forwarded now deleted emails for storage, updated many accounts including my doctors with the new tuta email. The next time I try to login it tells me that my password is wrong or can't login. I waisted my time trying to change the password and when I contacted support they send me this: > Hi there, > > > Thank you for your email. > > Your account was flagged as an abusive signup by our system and it was therefore suspended. We have reviewed this case and we cannot make an exception. Please understand that we block some signups based on many different criteria in order to ensure the quality of our service. > > Please feel free to register a different account. Why the hell would I make another one? I signed up my one account the same day that I discovered them. I used a VPN, as if that's anything new. "I can make another account" really? So they can delete it again? Obviously I should have tested their client before going all in. Who cares about privacy when random assholes can just wipe my data or read my emails. I needed to vent. Fuck you tutamail
fedilink

I just halted a job interview process - due to self respect.
I don't usually have sufficient motivation to post much on any social media platform. This is rare for me. I am putting this out in the world in part hoping for some validation, in part hoping it sparks some kind of social action to save some semblance of privacy and dignity in this modern world. Warning: this is long. I just wrote an email to a recruiter withdrawing my interest in pursuing a job (it's a recruiter hired by the hiring company). I am a software engineer with decades of experience who has been unemployed for almost a year with almost no interviews. I'm hungry for paying work. Yet. I did this. Below is the email I wrote, and it is hopefully self explanatory. I think my career might be over - especially if the kind of process I experienced is now the standard for hiring. I want nothing to do with it. I wrote this after multiple days of trying to set up my system for the "assessment". I ended up having to install Windows 11 (I'm a Linux guy) because the assessment environment simply didn't work. I tried FireFox, disabled plugins, tried two versions of Chrome - neither would work. It apparently had to be the Google version. I upgraded an old version of Win 10 (because Microsoft pretty much forced it). Got it to work on Firefox for Windows. Twice, mid-way through the assessment, it reset itself to square one. I didn't try a third time. This assessment software monitored my face and would raise an alarm if I looked away. It controlled my microphone. It required full access to every aspect of the browser and had me do an alt-tab partway through this "test" in order to ensure I wasn't using any other software. Insulting. Invasive. My equipment. My home. ---- the email ----8<---- First, I appreciate your understanding and that you gave me what information you have on how this software works. Now, the hard part. My disappointment will show in the text, and it is not directed at you or your company. I'm inclined to cease pursuing this. I feel insulted by the process in the first place, but went through it understanding that we, as job seekers, have to accept compromises we would not otherwise accept because having a job is a fundamental requirement to literally survive and provide for our children. However, the more I'm expected to change my personal, owned equipment and software in an invasive fashion just so some stranger can have 100% surveillance on my activities in my home in order to be considered for a job interview, the more insulted I become. Granted, I'm unusual. I've dedicated myself to protecting my electronic privacy by installing malware and advertisement blockers on my phones, computers, tablets. I use VPN. I built my own home NAS because I am uncomfortable with placing all my personal, financial, and health records into "the cloud" (and being charged for the privilege). I am teaching myself how to use AI by downloading and running models in my home lab because I don't want to give out my privacy and income to strangers. I stopped using Windows at home years ago because I could not stand the way it was dictating to me how to run my computer and constantly seeking to part me from my money with distracting advertisements while siphoning everything about me back to their servers to better market to me. Worse, it was forcing me to buy new hardware in order to simply run the system after upgrades. Here I am, faced with a stark choice. Debase my values for the sake of the possibility of a job with a company that apparently doesn't consider applicants worthy of dignity, or remain unemployed - possibly forced to exit the career I love if everybody is doing this - and potentially fall into poverty. If they're doing this before they even talk to me, it tells me that as an employee I will have at minimum this same level of surveillance. Knowing this in the back of my mind will burn me out in under six months. Unfortunately, I don't think I could live with myself if I chose the first option, so I respectfully withdraw myself from this process. I'm a professional. I expect to be treated like one. If there are companies who are serious about hiring a professional, I'm all in. Please engage me. ------------
fedilink

What’s your favorite launcher for Android-based OS that values privacy?
Right now I'm using the default e/OS launcher of Fairphone 6, but wanted more options to clean up icons and set colors to desktop. I might try the Dragon launcher on FDroid.
fedilink


Self-hosting in 2025 isn’t about privacy anymore - it’s about building resistance infrastructure
cross-posted from: https://lemmy.world/post/41387733 > I used to self-host because I liked tinkering. I worked tech support for a municipal fiber network, I ran Arch, I enjoyed the control. The privacy stuff was a nice bonus but honestly it was mostly about having my own playground. > That changed this week when I watched ICE murder a woman sitting in her car. > Before you roll your eyes about this getting political - stay with me, because this is directly about the infrastructure we're all running in our homelabs. > Here's what happened: A woman was reduced to a data point in a database - threat assessment score, deportation priority level, case number - and then she was killed. Not by some rogue actor, but by a system functioning exactly as designed. And that system? Built on infrastructure provided by the same tech companies most of us used to rely on before we started self-hosting. > Every service you don't self-host is a data point feeding the machine. Google knows your location history, your contacts, your communications. Microsoft has your documents and your calendar. Apple has your photos and your biometrics. And when the government comes knocking - and they are knocking, right now, today - these companies will hand it over. They have to. It's baked into the infrastructure. > Individual privacy is a losing game. You can't opt-out of surveillance when participation in society requires using their platforms. But here's what you can do: build parallel infrastructure that doesn't feed their systems at all. > When you run Nextcloud, you're not just protecting your files from Google - you're creating a node in a network they can't access. When you run Vaultwarden, your passwords aren't sitting in a database that can be subpoenaed. When you run Jellyfin, your viewing habits aren't being sold to data brokers who sell to ICE. > I watched my local municipal fiber network get acquired by TELUS. I watched a piece of community infrastructure get absorbed into the corporate extraction machine. That's when I realized: we can't rely on existing institutions to protect us. We have to build our own. > This isn't about being a prepper or going off-grid. This is about building infrastructure that operates on fundamentally different principles: > > Communication that can't be shut down: Matrix, Mastodon, email servers you control > File storage that can't be subpoenaed: Nextcloud, Syncthing > Passwords that aren't in corporate databases: Vaultwarden, KeePass > Media that doesn't feed recommendation algorithms: Jellyfin, Navidrome > Code repositories not owned by Microsoft: Forgejo, Gitea > > Every service you self-host is one less data point they have. But more importantly: every service you self-host is infrastructure that can be shared, that can support others, that makes the parallel network stronger. > Where to start if you're new: > > Passwords first - Vaultwarden. This is your foundation. > Files second - Nextcloud. Get your documents out of Google/Microsoft. > Communication third - Matrix server, or join an existing instance you trust. > Media fourth - Jellyfin for your music/movies, Navidrome for music. > > If you're already self-hosting: > > Document your setup. Write guides. Make it easier for the next person. > Run services for friends and family, not just yourself. > Contribute to projects that build this infrastructure. > Support municipal and community network alternatives. > > The goal isn't purity. You're probably still going to use some corporate services. That's fine. The goal is building enough parallel infrastructure that people have actual choices, and that there's a network that can't be dismantled by a single executive order. > I'm working on consulting services to help small businesses and community organizations migrate to self-hosted alternatives. Not because I think it'll be profitable, but because I've realized this is the actual material work of resistance in 2025. Infrastructure is how you fight infrastructure. > We're not just hobbyists anymore. Whether we wanted to be or not, we're building the resistance network. Every Raspberry Pi running services, every old laptop turned into a home server, every person who learns to self-host and teaches someone else - that's a node in a system they can't control. > They want us to be data points. Let's refuse. > > What are you running? What do you wish more people would self-host? What's stopping people you know from taking this step?
fedilink

Short Story: “For the Children” – A look at the dystopia of total surveillance
I have been following the talk about Chat Control in the European Union and similar regulations elsewhere. Many people are still not aware of these developments, and I believe a fiction story can reach more people than a technical explanation ever could. This is my short story about the logical conclusion of these laws. Please let me know what you think and share it with those who might benefit from seeing where this path leads. --- **For the Children** I feel the cold on my face. The only part of my body that is not covered by cloth. In this temperature you need to have good insulation or you will not be able to get far. And we have to get far. The whole path is 10 miles long and we are almost halfway there. We went as far as possible with the car, but the forest here is too dense and the snow too deep. It looks beautiful. But it is hard for me to recognize this beauty for more than a few seconds. I look behind me and see the footsteps that I am leaving behind. Around twenty meters behind me is Elena. I know she is there, but because of the snow and fog, she looks like a black dot on a white paper. I can't see her face, but from her body language she does not look tired. We are already late, so I know I have to walk in front of her to keep up the pace. I have lived in the Union my whole life. More than thirty years. I still remember the last trip I made out of it, about five years ago. It feels like yesterday in some way. But so much has changed since then. It happened gradually. It was supposed to be a land of freedom and liberty. We always looked at other countries and felt disdain for their political systems. In school they always taught us that we are the promised land for other people and a beacon of democracy in this world. I do believe that it was actually like this in the past. But it all started to change with the acceptance of laws that seemed very innocent at first. The first thing the Union did was pass the so-called "Child Abuse Protection Law". It required all internet companies to scan every message passing through their platforms. Not even that much has been talked about it. They said it had to be done to catch all human traffickers. They said it was *for the children*. It didn't make much of a difference for the regular person yet. Some people complained about it, and there were some protests in the larger cities. But soon after they accepted it, nobody was talking about it anymore. We thought that was the end of it. Then, they blocked access to some of the foreign websites. Some social media platforms that were deemed to be extreme and some news websites. Most of us just installed a VPN, thinking we were smart. Last year, all the unofficial VPNs were banned. The only one that was allowed was the official VPN of the Union. They said some hackers used connections with the outside world to share fake news about the Union. But we knew that the reason they did it was to be able to look at everything that goes in and out. A few months ago another rule was accepted. Now, every device that can connect to the internet has to be registered with the government. The government justified this by claiming that drug dealers used old burner phones for communication. Now every phone has to have a registered user, otherwise it is denied access to the internet. This means that the authorities now monitor every conversation and post on the internet all the time. Everyone is trapped in the system, and there is no way for someone to escape it. Well, actually, there is one way left. The only way to communicate with the outside world now is a satellite phone. It connects directly to orbiting satellites, which grants unmonitored access to the global internet. With it, the user can communicate privately to the outside world. The only problem is that they are very hard to get. But lucky for me, I have one. It has been in my backpack since we started walking this morning. Without stopping, I move my backpack to the front and open the zipper. I pull out a satellite phone. I can't take my gloves off because it is so cold. So I type with my bulky glove one letter after another: "All good. T-1 hour." I press send. I look back at Elena. "Just a little further, then we switch!" I shout through the wind. "Okay," I hear her voice through the cloth that covers her mouth. The phone will send a message when it connects to the satellites. It should take around a minute, and Jack will receive the message. It takes noticeably more time than a regular internet connection. He is probably already there. Waiting for us. I have known Jack since childhood. He always challenged authority. In school he debated teachers who hated his nonconformity, and later became obsessed with privacy, warning us how online surveillance works and how our digital lives are tracked. It could be tiring to talk to him, which was why our friend group meetings became less and less common. I was never as extreme as him, but always took his side when we were debating topics among friends, though I would push back when it was just the two of us. So when they first started talking about the messaging scanning law, he was the first one I knew to talk about it. I remember a conversation between me, Jack, and some of our other friends whom we knew from college. "What do you hide on your phone that you are so concerned about, Jack?" Brian asked Jack in the pub. "It's not about having secrets," Jack snapped back immediately. "It's about where this can lead. You wouldn't want a government agent sitting in the corner of this room, recording us just in case one of us mentions something illegal, would you, Brian?" "But as long as you are not doing anything wrong, you don't have to fear it," Brian dismissed nonchalantly. "It's about the way the system is designed if they decide at any time they want to censor you, nothing will be stopping them," said Jack. Brian seemed unwilling to engage further. He didn't have a good reply, or at least didn't want to think of one. "Anyway, what are you going to do about it?" he asked. A moment of silence followed. "I'll fight it as best I can," he said. "But if all else fails, I'll leave the Union. I tell you, this is a slippery slope. It will get much worse from here." "If you really leave the Union just because someone might read what you write to your friends in a group chat, you're even crazier than I thought," Brian laughed. The rest of the night passed with lighter talk. And he was really that crazy. At least it seemed crazy at the time. We had long conversations about it. He was convincing me to take Elena with me, and that we all should leave. But I couldn't at the time. Although I agreed with him, I really thought it would not be that bad. Or at least I hoped so. But soon after they accepted the law, he left abroad and never returned. Leaving the Union is pretty much impossible now. It is not because of a heavily guarded border, but because of the immense power the Union holds over its neighbors. If a neighboring country identifies a person from the Union, they must return them or risk losing vital trade agreements. For these governments, we are not people. We are just a threat to their economy, where a fugitive is nothing more than a risk to them. Occasionally, you hear of someone who tried to escape but was handed back and no one heard from them again. "Stop, I'm getting tired. Can you carry him?" Elena's voice cuts through the wind. I turn around and see her walking behind me, making small steps uphill. "Of course," I say and stop. "He has been sleeping this whole time," she says and opens up her poncho. His eyes squeeze as the snowy white scenery flashes before him. Our little Max, so small and vulnerable, bundled against the cold, our precious little secret. I look at Elena who has tears in her eyes. I know we could spend hours gazing at our beloved child, memorizing every tiny feature of his, if we had time. But we don't. "Give him to me, we have to carry on," I say. She unravels Max from the poncho with which he was attached to her. I tie him to my chest and cover him with another blanket to keep him warm. I kiss Elena on the forehead. "You go first," I say. She nods and takes the lead. She was so strong in the past few days. I know that these were the saddest days of her life. The same is true for me. It was a hard decision we had to make. But once we made it there was no turning back. It all started about a year before Max was born. Elena's father was a relatively popular journalist who worked his entire life for the national program. He was always critical of the government and of the politicians, even before things began to change. So when the Union first started censoring news in the media, he was writing articles about it wherever they would let him publish them. He talked about how the censoring is not only done by the law but also pushed through bureaucratic incentives that you have to follow. Social norms change and some things are labeled as inappropriate. He said that the problem would not be that people would be punished for speaking, but that because of fear of punishment they would never speak at all. Shortly after he began his exposé mission, he was completely blacklisted. No outlet would touch his work. His editor refused to even discuss the facts, only muttering, "If I run this, the Union will label us a 'High-Risk Platform' we’ll lose digital banking access by morning." Overnight, his internet accounts vanished and even his bank account was frozen. The official reason was that he was "spreading hate by spreading misinformation". Almost no major media covered it. And he was not the only case, many who spoke out at that time suffered the same fate. On platforms where free speech was still possible, it was a much talked about topic and people warned about where this can lead. If you search for his name now, there is only one side of the story. For me, this was the breaking point. Elena felt immense stress at that time. I only felt anger. Anger that we let that happen. I know we probably couldn't have done much anyway. But at least we should have tried. "When we have a baby, he can’t have a life like this.” When Elena said those words, it was the first time this idea was spoken out loud. We were planning to have a baby for a while. But because of the conditions, we knew that it would not be a good life. Elena's dad getting blacklisted changed her. Ever since she said that sentence that winter afternoon, we have been talking about it almost every day. We knew we would have a child, but it became clear to us that the conditions would get a lot worse. At that time, I still spoke to Jack through an encrypted messaging platform on the internet. Then no satellite phone was needed. I told him that we wanted to have a child completely off the grid and that we wanted him to live outside of the Union. At that time, it was already obvious to us that we would not be able to go with him. The regulation was already too strict for traveling. Jack was not hesitant one bit when I told him we wanted him to take care of our child. During the years he lived abroad, he met a girl there, and they were both open to this "adoption". "We have to put all our electronic devices in a box when we’re at home,” I told Elena some time before Max was born. "We can't risk the existence of Max being recorded anywhere.” We were already very careful not to leave any trace anywhere. But him being actually present in the real world meant an even greater challenge. I was buying all the baby equipment from a black market on the other side of town, trying to buy it in bulk, so I minimized all the possibilities that someone would catch on to something. We were very precise about covering all the tracks because we knew that if anyone found out about it even years later, we could be in trouble. We did not even really know how much the authorities actually monitored our data. We burned all the trash that could have been associated with Max and padded all the walls with foam to make it impossible for anyone near the house to hear him cry. I remember one night, Max had a fever and a cough that wouldn't stop. We sat in the dark, clutching him, terrified that a neighbor might hear us. We couldn't even take him to a doctor because every clinic required an ID scan just to enter the waiting room. "I can't believe this is the last week we three are all together," Elena sobbed. I was crying too. We were looking at the pictures we had taken of the three of us. The good old analog Polaroid photos would be the only physical evidence that Max had ever existed. The forest is beginning to thin out. I increase my tempo so that I can catch up with Elena. She reaches out her hand to me. I grab it and squeeze it. She squeezes back. "We are almost there," I say, trying to hold back tears. Elena nods, eyes fixed ahead through the fog. "He’ll run through forests like this one day,” she whispers. "Laughing. Free. That’s all that matters.” We walk like this for about a mile. It seems like an eternity. We know we had to do it. As parents, we have an obligation to provide the best life *for the children*. A fence around two meters tall appears through the fog. The border between the Union and the outside world. We see Jack already waiting there beside the fence. He has sawed a small opening in it, just large enough for Max. We didn't want to make it visible. My dear friend, who I have not seen for so long, and we will not even have time to have a short conversation. He lifts his hand as a sign of greeting. I wave back. Max will only remember us through stories Jack will tell him. He will only have a few analog pictures that will remind him of where he truly came from. But at least he will be able to live a free life. For us, the people in the Union, this is a long forgotten idea. --- Note: I self-hosted a formatted web version and PDF of this story here for easier reading or sharing: https://gigaprojects.online/post/1
fedilink

Thoughts on Wero Pay
I know most people here are US, but I wanted to ask if anyone had experience with wero-wallet.eu? On the grounds of sovereignty, it's exiting. But it's already made so many wrong turns in terms of independence. - The app is only available in first-party app stores. Not even a closed-source direct download on their website. - It's fully in play integrity/Apples keychain. With no statements about alternatives. - They have openly announced that they treat custom-roms as rooting/jailbreaking and deem it unacceptably unsafe for running the app. - This will probably keep being the blanket statement it always is. Doubt even Graphene with it's attestation will be accepted. And for some reason non-mobile clients are of course out-of-scope. I wish there was at least a clear reasoning for what's safe/unsafe in this context. My fiat bank is blocking rooted devices, but for now tolerates all custom roms without relying on integrity API or a Google account if you don't try to use GPay. To my knowledge Paypal is completely ignorant about the runtime environment with no checks whatsoever. All the while, Wero seems to actively grasp for straws on reasons why you can't use it on any given phone. They even have special requirements for running on older devices (<A10).
fedilink

I just halted a job interview process - due to self respect.
cross-posted from: https://lemmy.world/post/41377452 >I don't usually have sufficient motivation to post much on any social media platform. This is rare for me. I am putting this out in the world in part hoping for some validation, in part hoping it sparks some kind of social action to save some semblance of privacy and dignity in this modern world. > > Warning: this is long. > > I just wrote an email to a recruiter withdrawing my interest in pursuing a job (it's a recruiter hired by the hiring company). I am a software engineer with decades of experience who has been unemployed for almost a year with almost no interviews. I'm hungry for paying work. Yet. I did this. Below is the email I wrote, and it is hopefully self explanatory. > > I think my career might be over - especially if the kind of process I experienced is now the standard for hiring. I want nothing to do with it. > > I wrote this after multiple days of trying to set up my system for the "assessment". I ended up having to install Windows 11 (I'm a Linux guy) because the assessment environment simply didn't work. I tried FireFox, disabled plugins, tried two versions of Chrome - neither would work. It apparently had to be the Google version. > > I upgraded an old version of Win 10 (because Microsoft pretty much forced it). Got it to work on Firefox for Windows. > > Twice, mid-way through the assessment, it reset itself to square one. I didn't try a third time. This assessment software monitored my face and would raise an alarm if I looked away. It controlled my microphone. It required full access to every aspect of the browser and had me do an alt-tab partway through this "test" in order to ensure I wasn't using any other software. Insulting. Invasive. My equipment. My home. > > ---- the email ----8<---- > > First, I appreciate your understanding and that you gave me what information you have on how this software works. Now, the hard part. My disappointment will show in the text, and it is not directed at you or your company. > > I'm inclined to cease pursuing this. I feel insulted by the process in the first place, but went through it understanding that we, as job seekers, have to accept compromises we would not otherwise accept because having a job is a fundamental requirement to literally survive and provide for our children. > > However, the more I'm expected to change my personal, owned equipment and software in an invasive fashion just so some stranger can have 100% surveillance on my activities in my home in order to be considered for a job interview, the more insulted I become. > > Granted, I'm unusual. I've dedicated myself to protecting my electronic privacy by installing malware and advertisement blockers on my phones, computers, tablets. I use VPN. I built my own home NAS because I am uncomfortable with placing all my personal, financial, and health records into "the cloud" (and being charged for the privilege). I am teaching myself how to use AI by downloading and running models in my home lab because I don't want to give out my privacy and income to strangers. > > I stopped using Windows at home years ago because I could not stand the way it was dictating to me how to run my computer and constantly seeking to part me from my money with distracting advertisements while siphoning everything about me back to their servers to better market to me. Worse, it was forcing me to buy new hardware in order to simply run the system after upgrades. > > Here I am, faced with a stark choice. Debase my values for the sake of the possibility of a job with a company that apparently doesn't consider applicants worthy of dignity, or remain unemployed - possibly forced to exit the career I love if everybody is doing this - and potentially fall into poverty. > > If they're doing this before they even talk to me, it tells me that as an employee I will have at minimum this same level of surveillance. Knowing this in the back of my mind will burn me out in under six months. > > > Unfortunately, I don't think I could live with myself if I chose the first option, so I respectfully withdraw myself from this process. I'm a professional. I expect to be treated like one. If there are companies who are serious about hiring a professional, I'm all in. Please engage me. > > > ------------
fedilink

![screenshot of text: The material does not say how Penlink obtains the smartphone location data in the first place. But surveillance companies and data brokers broadly gather it in two different ways. The first is from small bundles of code included in ordinary apps called software development kits, or SDKs. SDK owners then pay the app developers, who might make things like weather or prayer apps, for their users’ location data. The second is through real-time bidding, or RTB. This is where companies in the online advertising industry place near instantaneous bids to get their advert in front of a certain demographic. A side effect is that companies can obtain data about peoples’ individual devices, including their GPS coordinates. Spy firms have sourced this sort of RTB information from hugely popular smartphone apps. ](https://lemmy.ml/pictrs/image/02d5b39f-d2fd-404f-97fe-7b571eb2efee.png) via this 404 media article: https://www.404media.co/inside-ices-tool-to-monitor-phones-in-entire-neighborhoods/ paywall bypass: https://web.archive.org/web/20260108141914/https://www.404media.co/inside-ices-tool-to-monitor-phones-in-entire-neighborhoods/
fedilink

google now requires user data to be submitted by developers on android
![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Flemmy.zip%2Fpictrs%2Fimage%2F4a62f686-6cc8-4eb6-a486-7380dc121a98.avif) I saw this message on obtanium when trying to update arcanechat. Fuck my life I'm so pissed off right now.
fedilink

Everything now have Wireless - WiFi, Bluetooth… Ways it can be turned against us.
- Water Purifier, Ceiling Fan, Washing machine Dish Washer Fridge How do I disable them ? # It can be turned against us - Location Beacon Wire+Speaker - Audio Spying Customer Tracking Killing a product early to increase sales Selling Customer Habits Radiation
fedilink

Recommend a printer with open-source support.
Ideally I am looking for a printer with 1. opensource - Hardware, firmware, drivers, All OS support, 2. No Shenanigans like mixing up colors, wasting ink in storage, hidden codes 3. Easy to maintain and repair, 4. low ink cost 5. No Wifi or bluetooth
fedilink

How do we actually confront or evade “kirkification” and the flood of ai slop?
I have been thinking a lot about digital sovereignty lately and how quickly the internet is turning into a weird blend of surreal slop and centralized control. It feels like we are losing the ability to tell what is real because of how easy it is for trillionaire tech companies to flood our feeds with whatever they want. Specifically I am curious about what I call "kirkification" which is the way these tools make it trivial to warp a person's digital identity into a caricature. It starts with a joke or a face swap but it ends with people losing control over how they are perceived online. If we want to protect ourselves and our local communities from being manipulated by these black box models how do we actually do it? I want to know if anyone here has tried moving away from the cloud toward sovereign compute. Is hosting our own communication and media solutions actually a viable way to starve these massive models of our data? Can a small town actually manage its own digital utility instead of just being a data farm for big tech? Also how do we even explain this to normal people who are not extremely online? How can we help neighbors or the elderly recognize when they are being nudged by an algorithm or seeing a digital caricature? It seems like we should be aiming for a world of a million millionaires rather than just a room full of trillionaires but the technical hurdles like isp throttling and protocol issues make that bridge hard to build. Has anyone here successfully implemented local first solutions that reduced their reliance on big tech ai? I am looking for ways to foster cognitive immunity and keep our data grounded in meatspace.
fedilink


FoxyProxy: How to auto extract in different formats & merge, filter, test and apply to FoxyProxy set
1. Extract proxy from lists in different formats, like JSON, IP:Port:Country , and website tables. 2. Merge them into a single list 3. Filter them - only select country, protocol, and fields like anonymity 4. Test performance 5. Auto-change FoxyProxy's specific proxy setting
fedilink

The only legitimate thing I can think of would be if you want to voice activate your camera… but who tf would use that?
fedilink

How to decentralize the internet: A focus on data consolidation and user privacy
An interesting paper, which gives an overview on a few decentralization solutions while also pointing out their limitations. It aims at suggesting a reference framework for a decentralized internet, as was its purpose initially. Before the age of [Evildoers](https://www.google.com/). Before the age of [Zuckerberg](https://www.instagram.com/reel/DJuqDATOsQW/?l=1).
fedilink

Password manager for a small company
Hello everybody, I’m looking for a password manager that I can share with the three other associates in my company. I often hear people around here talk about KeePass and Bitwarden, but I found several different options for each and I’m not sure how to choose. I’m not that tech-savvy : our main focus is stone and low-carbon construction, and my personal passion is understanding what happens when a joint between stones fails... Our needs are : - We share several accounts that use a common email address. When a password is changed, it needs to be updated automatically for everyone. - We also have individual accounts. It’s not an issue if other associates can see those passwords, as they’re strictly for professional use. - We need the passwords to be synchronized across devices, so we’re willing to pay for a suitable solution. Any help is welcome ! **Edit :** First, thanks for all the answers. After reading all the contributions I realised that for the moment we need something that works out of the box as we don't have a freelancer to help us anymore. When we find one we will consider changing the password manager, and many other things ! I will try to make a table with the pro and cons of the various solutions I will study from now on and to post it here. So with all the insights my new criteria are : - various vaults (one shared, and individual ones), - Probably european, - Low maintenance : works out of the box, synchronised by the provider (for the moment) again, thanks a lot. I'll keep you updated **Edit 2 :** I made a comparison table of the solutions hosted by the provider analysed so far : | Name | Proton Pass | 1Password | Padloc | Bitwarden | Dashlane | Passbolt |-------------------------|---------------|----------------------|---------------|-------------------|----------|--------- | | Essentials | Business | Team | Team | | business | Shared vault | Yes | Yes | Yes | Yes | Yes | Yes | Company location | Switzerland | Canada | Germany | US | France | Luxembourg | Company server provider | Proton | Amazon | DigitalOcean | Microsoft Azure | Amazon | GCP (google) | Open source | Yes | Not clear | Yes | Yes | Partially| yes | Linux client | Yes | Yes | Yes | Yes | No | yes | Price / user | 4.99 € | 6.99 € | 3.49 € | 4.00 € | 6.00 € | 4.5€ To be clear, I don't use linux... yet. But I will probably not use it at work before a long time **Edit 3 :** I updated the table with passbolt. Passbolt enterprise is hosted in their own server, but the business version is hosted by google
fedilink

> A stealthy, minimalistic, custom build of Firefox for web scraping 🦊 Camoufox is an open source anti-detect browser for robust fingerprint injection & anti-bot evasion. I saw this browser on GitHub. Can it be used on a daily basis? How does it compare to Mullvad Browser or Librewolf?
fedilink

Does Google Trackers on a site/app means Google can see what you type on the website/what you do on
For an example, my country's government app contains Google Trackers on it. Does it mean Google can see my face scans on it/my full name on it?
fedilink

I don’t care how well your “AI” works - fiona fokus
> AI systems exist to reinforce and strengthen existing structures of power and violence. They are the wet dream of capitalists and fascists. Enormous physical infrastructure designed to convert capital into power, and back into capital. Those who control the infrastructure, control the people subject to it. While it sways away from the initial thesis of how the use of LLMs could be detrimental to our very being and expression of identity - at least that's how I interpret what they're saying - it ends in a fantastic claim on how AI is a tool of the ruling class. Worth a read!
fedilink

https://xcancel.com/GlobeEyeNews/status/2006995809632661935
fedilink


I normally don’t shitpost, but just look at this…
These are ALL the listening ports and live connections on a freshly installed Linux system, this being DietPi. I dare you to do a tcpdump or netstat or whatever on a fresh Windows installation. The ssh connection I *actively* chose to enable and the dhclient is a must have for hosts to dynamically get an IP address allotted, unless you set yours statically. *If you are struggling with privacy invading connections on your Windows system but don't feel like you can or want to switch to Linux, may I suggest https://safing.io/download/* ![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Fprogramming.dev%2Fpictrs%2Fimage%2F719bac44-ac20-4e01-8514-91e7c17830ff.jpeg)![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Fprogramming.dev%2Fpictrs%2Fimage%2F8c898454-dee8-4aed-8521-198deacc34fd.jpeg)
fedilink

Searching for Web browsers in the Aurora Store and checking for trackers I was really surprise that TOR Browser has 2 trackers according to Exodus. WTF!!!!
fedilink

https://media.ccc.de/v/39c3-a-post-american-enshittification-resistant-internet https://youtu.be/39jsstmmUUs EDIT: Swapped the YT link for their website.
fedilink

WhatsApp Clone… But Decentralized and P2P Encrypted
NOTE: This is still a work-in-progress and partially a close-source project. To view the open source version see [here](https://github.com/positive-intentions/chat). It has NOT been audited or reviewed. For testing purposes only, not a replacement for your current messaging app. I have open source examples of various part of the app and im sure more investigation needs to be done for all details of this project. USE RESPONSIBLY! Im aiming to create the "theoretically" most secure messaging app. This has to be entirely theoretical because its impossible to create the "most secure messaging app". Cyber-security is a constantly evolving field and no system can be completely secure. If you'd humor me, i tried to create an exhaustive list of features and practices that could help make my messaging app as secure as possible. Id like to open it up to scrutiny. [Demo](https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=story) (Im grouping into green, orange and red because i coudnt think of a more appropriate title for the grouping.) Green * P2P - so that it can be decentralized and not rely on a central server for exchanging messages. The project is using WebRTC to establish a p2p connection between browsers. * End to end encryption - so that even if the messages are intercepted, they cannot be read. The project is using an application-level [cascading cipher](https://www.reddit.com/r/crypto/comments/1oi4xqt/multiprotocol_cascading_roundrobin_cipher/) on top of the encryption provided by WebRTC. the key sub-protocols involves in the approach are [Signal](https://www.reddit.com/r/signal/comments/1orsjw2/signal_protocol_in_javascript/), MLS and AES. while there has been pushback on the cascading cipher, rest-assured that this is functioning on and application-level and the purpose of the cipher is that it guarantees that the "stronger" algoritm comes up on top. any failure will result in a cascading failure... ultimately redundent on top of the mandated WebRTC encryption. i would plan to add more protocols into this cascade to investigate post-quantum solutions. * Perfect forward secrecy - so that if a key is compromised, past messages cannot be decrypted. WebRTC already provides a reasonable support for this in firefox. but the signal and mls protocol in the cascading cipher also contribute resiliance in this regard. * Key management - so that users can manage their own keys and not rely on a central authority. there is key focus on having local-only encryption keys. sets of keys are generated for each new connection and resued in future sessions. * Secure signaling - so that the initial connection between peers is established securely. there are many approaches to secure signaling and while a good approach could be exchanging connection data offline, i would also be further improving this by providing more options. its possible to establish a webrtc connection without a connection-broker [like this](https://github.com/positive-intentions/chat/issues/6). * Minimal infrastructure - so that there are fewer points of failure and attack. in the Webrtc approach, messages can be sent without the need of a central server and would also work in an offline hotspot network. * Support multimedia - so that users can share animations and videos. this is important to provide an experience to users that makes the project appraling. there is progress made on the [ui component library](https://ui.positive-intentions.com/) to provide various features and functionality users expect in a messaging app. * Minimize metadata - so no one knows who’s messaging who or when. i think the metadata is faily minimal, but ultimately is reletive to how feature-rich i want the application. things like notification that a "user is typing" can be disabled, but its a common offering in normal messaging apps. similarly i things read-reciepts can be a useful feature but comes with metadata overhead. i hope to discuss these feature more in the future and ultimately provide the ability to disable this. Orange * Open source - moving towards a hybrid approach where relevent repositories are open source. * Remove registration - creating a messaging app that eliminates the need for users to register is a feature that i think is desired in the cybersec space. the webapp approach seems to offer the capabilities and is working. as i move towards trying to figure out monetization, im unable to see how registration can be avoided. * Encrypted storage - browser based cryptography is fairly capable and its possible to have important data like encryption keys encrypted at rest. this is working well when using passkeys to derive a password. this approach is still not complete because there will be improvements to take advantage of the filesystem API in order to have better persistence. passkeys wont be able to address this easily because they get cleared when you clear the site-data (and you lose the password for decrypting the data). * User education - the app is faily technical and i could use a lot more time to provide better information to users. the current website has a lot of technical details... but i think its a mess if you want to find information. this needs to be improved. * Offline messaging - p2p messaging has its limitations, but i have an idea in mind for addressing this, by being able to spin up a selfhosted version that will remain online and proxy messages to users when they come online. this is still in the early stages of development and is yet to be demonstrated. * Self-destructing messages - this is a common offering from secure messaging apps. it should be relatively simple to provide and will be added as a feature "soon". * Javascript - there is a lot of rhetiric against using javascript for a project like this because of conerns about it being served over the internet. this is undestandable, but i think [concerns can be mitigated](https://www.reddit.com/r/CyberSecurityAdvice/comments/1ev5kqn/is_this_a_secure_messaging_app/). i can provide a selfhostable static-bundle to avoid fetching statics from the intetnet. there is additional investigation towards using service workers to cache the nessesary files for offline. i would like to make an explicit button to "fetch latests statics". the functionality is working, but more nees to be done before rolling out this functionality. * Decentralized profile: users will want to be able to continue conversations across devices. It's possible to implement a p2p solution for this. This is an ongoing investigation. Red * Regular security audits - this could be important so that vulnerabilities can be identified and fixed promptly. security audits are very expensive and until there is any funding, this wont be possible. a spicier alternative here is an in-house security audit. i have made attempts to create such audits for the signal protocols and MLS. im sure i can dive into more details, but ultimately an in-house audit in invalidated by any bias i might impart. * Anonymity - so that users can communicate without revealing their identity is a feature many privacy-advocates want. p2p messages has nuanced trandoffs. id like to further investigate onion style routing, so that the origins can be hidden, but i also notice that webrtc is generally discourage when using the TOR network. it could help if users user a VPN, but that strays further from what i can offer as part of my app. this is an ongoing investigation. [Demo](https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=story) Aiming to provide industry grade security encapsulated into a standalone webapp. Feel free to reach out for clarity on any detailsor check out the following links: * Docs: https://positive-intentions.com/ * Reddit: https://www.reddit.com/r/positive//_intentions * Mastodon: https://infosec.exchange/@xoron IMPORTANT NOTE: It's worth repeating, this is still a work in progress and not ready to replace any existing solution. Provided for testing, demo and feedback purposes only.
fedilink

Have you been able to reconcile being very private and investing in fintech or buying online?
I’ve always been very private oriented: I started using linux-debian 20 years ago after discarding windows and apple. I rarely buy online but when I did, to be as private as possible I used to create an account using fake data by the e commerce platform I wanted, get my order and then ignore the account until I wanted yo use it again. Most of the times I used a vpn. This worked till the platform banned me. Now I’m thinking about investing in ETFs to build some capital for my retirement and platforms recommended to me like trade republic or scalable capital seem to be exclusively smartphone reliant. I wouldn’t use fake data to create accounts here, nor would it be possible (bank data involved). The trouble with smartphones: I don’t want to be that guy changing smartphones every 2 or even 4 or 8 years. Spending $200 to $800 for a phone for such a short period of time is just a dumb idea, but I don’t know if it would be safe to use my 2018 android 8 smartphone to invest in ETFs. This 2018 model is my first smartphone. It’s a second hand one somebody gave me because he thought I really needed it. I would have never bought a new smartphone on my own. However, unsupported models are not secure for investing and this model stopped being supported years ago. Another trouble I see: to use scalable capital or trade republic I’d have to download their app in my smartphone. Google is a company I don’t trust. Each time I needed to use something from their app database I got it using [aurora](https://f-droid.org/packages/com.aurora.store), but I’m afraid scalable capital will automatically ban me if I download their app from f-droid instead of doing it officially using google. Using google to create an account would mean giving them my real data, because otherwise I risk being labeled a scammer. Correct me if wrong. I’d love to invest using only a browser on a desktop.
fedilink


Proton Pass Alternatives
I personally love proton pass’s frontend app, but i don’t wanna host my data on proton’s servers(personal reasons). Is there any other password managers that support iOS, android, and browser extension, that is as good. (I tried bitwarden wasn’t good cuz on mobile I had to reenter master pass over and over. I tried keypassxc, but the frontend sucks and dealing with syncing between devices is a pain in the ass.) I appreciate everyone’s help!
fedilink

I bought a handheld computer, now Google says I’m not allowed to do whatever the hell I want to it
https://www.change.org/p/stop-google-from-limiting-apk-file-usage I hope that my rooted One UI 7 doesn't get the update through some backdoor in the Google Play Services package... Or the next time I unblock Google Play to update the very few paid apps that I use...
fedilink

Weird app paying you to scan receipts
So my cousin was here and saw a grocery receipt on the table and asked if I was using it and if he could take a picture of it, I was like what, why? So, there is this app that pays you some cents for receipt pictures and supposedly it pays you if it finds items that have cashback... shit sounds sketchy as fuck, I saw that on their app they sell credit cards and you can invest in some crap, but what I really found disturbing is this thing about them paying you to send them all your receipts... what the fuck are they doing with that info lol Crazy stuff, but I'm completely out of touch with cellphone things, is this crap normal??? I was quite shocked by it, and checking the company online, Méliuz, I just see stuff about it buying bitcoin.
fedilink

What are your thoughts on RCS messaging now that you can use it between Android and iOS?
I've found that my circle of contacts use the default messaging app for group chats even more now. I couldn't get them to use Signal but at least they're posting in the RCS group chat more instead of on Meta platforms.
fedilink

Serious Nation-State Level Pro Privacy Network Setup
But in all seriousness, this is a continuation of a previous post, namely: https://programming.dev/post/43003673 #### TLDR I wanted to contribute to decentralization and to fighting censorship from home. This is were the project is right now. I bought a shower rack, discarded its wheels and just attached it - with wires, ouch - to the underside of a shallow support table on which my TV stands. ![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Fprogramming.dev%2Fpictrs%2Fimage%2Fa0e672af-e984-4c01-a2e2-c87dfe725cd8.jpeg)![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Fprogramming.dev%2Fpictrs%2Fimage%2F898c6381-5a68-40b1-83ad-0b1460f4c65e.jpeg)![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Fprogramming.dev%2Fpictrs%2Fimage%2F3b494961-ef71-4f72-aa6d-207d31ab8302.jpeg) #### 1a I get my 1 Gbps connection from a pretty generous ISP. For one, they hand out static public IP addresses for free! Not that I understand what that would cost any ISP... #### 1b The connection is distributed with a gigabit switch - which by the way supports jumbo frames 🤙 - to two routers. #### 2a - router one This router is configured to route everything through a WireGuard interface (peers set to some Mullvad server, been "subscribed" for over six years now). Everything that goes through this router is encrypted. Too bad they still don't support DAITA on routers... I'm working on a workaround though, where I'm playing with the thought of forwarding traffic within a Linux machine through its DAITA-enabled Mullvad app, but that's another story... #### 3a - access point one This is where I access the internet whenever I need encryption. Both wirelessly and wired. Here you will find endpoints such as PCs, smartphones and my only one IoT - a vacuum. This is also where a PC is running an i2pd daemon to share some bandwidth and a Snowflake proxy to enable Tor for people that live in places that ban normal Tor connections. #### 2b and 3b - router and access point two Router two simply routes traffic between my unencrypted LAN and my ISP. Access point two is where I access my various servers residing on 4b. They are, for now, a Tor bridge. Upcoming: A Headscale "server"? Because the Tailscale control server is one of the few parts of Tailscale that isn't open source. #### Hardware and software * 1a - some ONT provided by the city * 1b - TL-SG105E * 2a,2b - Raspberry Pi 4 with OpenWrt * 3a - ASUS RT-AX58U with Asuswrt Merlin * 3b - ASUS RT-AX58U v2 with Asuswrt Merlin NG * 4b - Raspberry Pi 5 with Raspberry Pi OS Lite Good night
fedilink

cross-posted from: https://hexbear.net/post/7177319 > cross-posted from: https://news.abolish.capital/post/15995 > > > The House was debating a powerful National Security Agency spying program when Rep. Dan Goldman, D-N.Y., rose to side against privacy hawks. > > > > The spring 2024 debate was over forcing the feds to get a warrant to search foreign communications for intelligence on Americans. Doing so would cost crucial time, Goldman said, citing his own tenure as a federal prosecutor. > > > > > “I can say with confidence that requiring a warrant would render this program unusable.” > > > > “Based on that experience, I can say with confidence that requiring a warrant would render this program unusable and entirely worthless,” he said last year. “Even if it were possible, the time required to obtain a search warrant from a judge would frequently fail to meet the urgency posed by a terrorist or other national security threat.” > > > > Goldman’s argument won the day. > > > > Progressives had been rallying around the warrants provision but, under heavy pressure from the Biden administration, enough of them retracted their support and sided with Democrats like Goldman to doom the measure. It lost by a single vote. > > > > With his election victory last November, Donald Trump would inherit the warrantless surveillance powers. > > > > [![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Flemmy.zip%2Fapi%2Fv3%2Fimage_proxy%3Furl%3Dhttps%253A%252F%252Fhexbear.net%252Fapi%252Fv3%252Fimage_proxy%253Furl%253Dhttps%25253A%25252F%25252Ftheintercept.com%25252Fwp-content%25252Fuploads%25252F2024%25252F11%25252Fcopy-AP24255463092044-1-e1730826654422.jpg%25253Fw%25253D440%252526h%25253D440%252526crop%25253D1) > > > > Related > > ------- > > > > ### Trump Might Get Unfettered Surveillance Powers. How Did We Get Here?](https://theintercept.com/2024/11/05/trump-surveillance-power/) > > > > The April 2024 vote still stings for civil liberties advocates, who thought they could count on progressives as they sought to build a bipartisan coalition with libertarian-minded Republicans. Now they are girding for another battle next April, when the Foreign Intelligence Surveillance Act, or FISA, is up for reauthorization. > > > > The vote will happen in the [middle of a primary season](https://theintercept.com/collections/midterms-2026/) where many incumbents — including Goldman — are trying to burnish their progressive bona fides as they [face challenges from the left](https://theintercept.com/2025/11/13/democrats-midterms-primaries-government-shutdown/). Already, some Democrats on a key committee are citing the Trump administration’s approach to privacy to explain their renewed support for a warrant provision. > > > > Whether enough of them flip back could decide the future of one of the most controversial post-September 11 spying programs. > > > > In a statement to The Intercept, Goldman did not commit to supporting a warrant requirement. > > > > “Donald Trump’s blatant weaponization of the federal government makes accounting for potential abuses of power critically important,” Goldman said. “As we work through the FISA reauthorization process next year, I will be especially focused on those concerns, as I have been since Trump took office in January.” > > > > **Tie Goes to the Spy** > > ----------------------- > > > > The vote last year capped a monthslong period of intense lobbying pitting the Biden administration against privacy advocates. > > > > Congress passed Section 702 of the Foreign Intelligence Surveillance Act in 2008 to give its legal blessing to a massive spying program the administration of George W. Bush had already launched without authorization. > > > > [![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Flemmy.zip%2Fapi%2Fv3%2Fimage_proxy%3Furl%3Dhttps%253A%252F%252Fhexbear.net%252Fapi%252Fv3%252Fimage_proxy%253Furl%253Dhttps%25253A%25252F%25252Ftheintercept.com%25252Fwp-content%25252Fuploads%25252F2025%25252F10%25252F05_TrevonCole_Article-crop2-e1761923808181.jpg%25253Fw%25253D440%252526h%25253D440%252526crop%25253D1) > > > > Related > > ------- > > > > ### Episode Five: What Fourth Amendment?](https://theintercept.com/2025/11/05/collateral-damage-episode-five-fourth-amendment/) > > > > Under the law, the government was allowed to search through reams of surveillance conducted abroad for information on U.S. citizens and permanent residents. The Fourth Amendment did not apply, [supporters of the law said](https://www.penncerl.org/the-rule-of-law-post/why-the-fbis-querying-of-intelligence-collection-under-fisa-section-702-is-not-domestic-spying/), because those communications had been collected from wiretaps and hacks directed abroad by the cyber spies of the NSA. > > > > Critics said that even surveillance directed abroad inevitably hoovers up the emails and text messages of Americans. The FBI, for example, [conducted 200,000 “backdoor searches”](https://www.brennancenter.org/our-work/research-reports/fisa-section-702-backdoor-searches-myths-and-facts) of American communications in 2022 alone. > > > > In a [series](https://theintercept.com/2018/01/17/fisa-section-702-nsa-internet-surveillance-senate/) of [reauthorization battles](https://theintercept.com/2023/12/11/house-intelligence-committee-section-702-surveillance/), civil liberties advocates have squared off against [administrations from both parties](https://theintercept.com/2017/09/29/trump-administration-lobbying-hard-for-sweeping-surveillance-law/) trying to force government agencies, including the FBI, to get a warrant before they rooted through foreign surveillance for information on Americans. > > > > Advocates have won some procedural reforms but, on the biggest question of a warrant, they have fallen short every time. Last year, the House voted 212–212 on an amendment offered by a conservative Republican that would have added a warrant requirement. Under House rules, a tied vote fails. > > > > The party breakdown showed how much surveillance scrambles typical partisan divides. Eighty-four Democrats and 128 Republicans voted for a warrant requirement, compared to 126 Democrats and 86 Republicans opposed. > > > > Numerous Democrats flipped their vote at the last minute under [heavy lobbying](https://prospect.org/2024/04/12/2024-04-12-reformers-narrowly-lose-fisa-reform-patriot-act-2-0/) from the Biden administration, which took a traditional, centrist view of the need for expansive spying powers [to ward off terrorists](https://theintercept.com/2023/11/06/hamas-counterterrorism-mass-surveillance-section-702/) and other foreign foes. > > > > > “Pretty much every single person in the Biden administration was lobbying pretty hard.” > > > > “It was top-to-bottom — pretty much every single person in the Biden administration was lobbying pretty hard,” said Kia Hamadanchy, a senior policy counsel for the American Civil Liberties Union. “There was a lot of fearmongering, which I don’t think was substantiated.” > > > > Supporters of the Biden administration offered some cover to the lawmakers who switched their way by including modest, procedural reforms in the legislation. > > > > The last-minute flippers included several members of the House Judiciary Committee, which traditionally has favored privacy protections more than members of the Intelligence Committee, who have overlapping jurisdiction over foreign surveillance. > > > > It was hardly surprising that Democrats buckled under pressure from the Biden administration, but it was shortsighted, civil liberties advocates say. > > > > [![](https://lemmy.ml/api/v3/image_proxy?url=https%3A%2F%2Flemmy.zip%2Fapi%2Fv3%2Fimage_proxy%3Furl%3Dhttps%253A%252F%252Fhexbear.net%252Fapi%252Fv3%252Fimage_proxy%253Furl%253Dhttps%25253A%25252F%25252Ftheintercept.com%25252Fwp-content%25252Fuploads%25252F2024%25252F12%25252FAP24191707446610-e1734450750786.jpg%25253Fw%25253D440%252526h%25253D440%252526crop%25253D1) > > > > Related > > ------- > > > > ### Top Senator Warns Sweeping New Surveillance Powers Will “Inevitably Be Misused” by Trump](https://theintercept.com/2024/12/18/trump-fisa-surveillance-spying/) > > > > “In 2024, it was already clear that Donald Trump and the people around him might well return to power,” said Sean Vitka, executive director of the progressive group Demand Progress. “Some Democrats refused to install guardrails when they had the chance.” > > > > Even worse from the perspective of civil liberties advocates, many Democrats voted to further expand the foreign spying law with a new provision that would allow the government to force “electronic communication service providers” — including, potentially, nonprofits, political campaigns, or news organizations — [to help it spy.](https://theintercept.com/2024/12/18/trump-fisa-surveillance-spying/) > > > > Sen. Ron Wyden, D-Ore., warned that that power will “inevitably be misused.” > > > > **House Judiciary Firms Up** > > ---------------------------- > > > > With Trump in the White House, some of the Democrats who voted against a warrant provision seem to be warming up to the idea, according to their comments at a recent House Judiciary Committee hearing on FISA reform. > > > > Several Democrats who advocates were counting on last time — including now-ranking member Rep. Jamie Raskin, D-Md., who eventually voted against the warrant requirement — spoke in favor of passing further reforms next year. > > > > Democrats at the hearing put the Section 702 program, named for the law that gives the surveillance power, in the larger context of the Trump administration’s erasure of privacy safeguards, including efforts to combine previously siloed Social Security, IRS, and student loan databases. > > > > > “In 2025, we no longer have to wonder if we were right to worry.” > > > > They also pointed out that, when it came to Section 702, Trump has gutted the Privacy and Civil Liberties Oversight Board, and FBI Director Kash Patel has eliminated an office tasked with auditing the FBI’s use of the surveillance program. > > > > Raskin said the results of a two-year “experiment” with modest FISA reforms have been “alarming.” > > > > “For years, the leaders of this committee have warned of how executive branch surveillance powers could be abused by a president who didn’t care about protecting civil liberties, who used cutting-edge technology to spy on Americans, and who ignored basic principles of due process and constitutional freedom to achieve their own ends,” he said. “In 2025, we no longer have to wonder if we were right to worry.” > > > > Rep. Jared Moskowitz, D-Fla., voted against a warrant requirement last year but spoke in broad favor of reforms at the hearing. His office did not comment on whether that includes a warrant requirement. > > > > Moskowitz’s primary challenger Oliver Larkin, a member of the Democratic Socialists of America, said in a statement that he supports forcing the government to get a warrant. > > > > “Rep. Moskowitz has put civil society, political opponents, minority and undocumented communities, and journalists at risk of the Trump administration’s privacy abuses and political targeting of dissent,” Larkin said. > > > > Another Judiciary Committee member who voted against a warrant requirement, Rep. Steve Cohen, D-Tenn., did not respond to a request for comment. His [left-leaning primary challenger](https://theintercept.com/2025/12/04/denver-primary-melat-kiros-diana-degette-justice-democrats/), Tennessee state Rep. Justin J. Pearson, said in a statement that he supports a warrant provision. > > > > “Democrats should be opposed to warrantless government surveillance no matter which party the president represents,” he said. “It should not have taken Donald Trump’s second election for some members of our party to finally stand up for their constituents’ basic civil liberties.” > > > > **Will GOP Cave?** > > ------------------ > > > > The problem for civil liberties advocates going into the April reauthorization is that they now face losing some of the Republicans who rallied to their side the last time. > > > > “People tend to be more skeptical about executive authority when the president is a president from the different party,” Hamadanchy said. > > > > They are also unclear on two key questions: Just how many Democrats will flip back, and where Trump will land on the issue. > > > > Some Democrats seem to be holding firm on their opposition to a warrant requirement despite challenges from the left. During an April committee hearing, Goldman said the FISA debate “pales in comparison” to the privacy violations being committed under the auspices of Elon Musk’s so-called Department of Government Efficiency. > > > > Goldman, who is positioning himself as a progressive in his primary race, [citing his support for the Green New Deal and Medicare for All](https://www.politico.com/newsletters/new-york-playbook/2025/12/17/goldman-lander-and-26-federal-plaza-00694095), is facing a challenge from New York City Comptroller Brad Lander. > > > > “Brad would vote to add a warrant requirement,” said a spokesperson for the Lander campaign. “The Trump administration’s abuse of power has highlighted the need for stronger 4th Amendment protections and now more than ever the House should take action to protect people’s privacy.” > > > > Lander’s [entry into New York’s 10th Congressional District race](https://hellgatenyc.com/lander-opportunity-dan-goldman-congress-race/) gives civil liberties advocates a vessel to challenge Goldman on the issue. Another Democrat who spoke on the House floor against the warrant requirement, Rep. Jim Himes, D-Conn., has not drawn a primary challenger yet. > > > > Trump is a bigger enigma. In 2018, his first administration opposed a warrant requirement, but last year he briefly urged Republicans to “[KILL FISA](https://theintercept.com/2024/11/05/trump-surveillance-power/)” — apparently because he [confused the 702 surveillance program](https://www.cato.org/commentary/trump-fisa-fact-check) with another that was used to spy on an adviser to his 2016 presidential campaign. > > > > In support of the current law, surveillance hawks will likely cite the findings of a [recent report](https://s3.documentcloud.org/documents/26177517/26-002-review-of-the-federal-bureau-of-investigations-querying-practices-under-section-702-of-the-foreign-intelligence-surveillance-act-2.pdf) from the Justice Department’s Office of the Inspector General. > > > > Based on internal oversight reports from the DOJ’s National Security Division, the inspector general said, “it appears that the FBI is no longer engaging in the widespread noncompliant querying of U.S. persons that was pervasive just a few years ago.” > > > > The report came with a crucial caveat. The inspector general relied on the FBI’s audits rather than conducting its own reviews of agents’ searches. The April 2024 to April 2025 period the report covered also meant that it tracked only a few weeks of Patel’s tenure. > > > > The post [Dan Goldman Supported Warrantless Spying on Americans. Now His Primary Opponent Is Hitting Him for It.](https://theintercept.com/2025/12/28/fisa-warrant-surveillance-dan-goldman-primary/) appeared first on [The Intercept](https://theintercept.com/). > > > > --- > > > > **From [The Intercept](https://theintercept.com/feed/?mk=fl_is_on_feature_page&mv=1) via [This RSS Feed](https://theintercept.com/feed/?mk=fl_is_on_feature_page&mv=1).**
fedilink

Page 35. I haven't confirmed anything, so do your own research! Happy new privacy respecting year!
fedilink


[Question] VPN and Mobile Data
I recently found out that my mobile provider "leaks" (if you can say that) while I've using a VPN. On wifi it is completely fine. On my phone when I go to the Speedtest app, my Mobile ISP will show up like full name while connected to a VPN. However, if I'm on wifi it will show the VPN's server provider name instead. Also instead of the wave wifi icon it shows "LTE". Is my mobile data actually leaking even though I'm connected to a VPN? How can I fix this?
fedilink

PGP read client side
Regarding PGP being used between 2 providers, eg Google and Proton, what prevents Google from viewing the messages client side after they’ve been decrypted?
fedilink


    Create a post

    A place to discuss privacy and freedom in the digital world.

    Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

    In this community everyone is welcome to post links and discuss topics related to privacy.

    Some Rules

    • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
    • Don’t promote proprietary software
    • Try to keep things on topic
    • If you have a question, please try searching for previous discussions, maybe it has already been answered
    • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
    • Be nice :)

    Related communities

    much thanks to @gary_host_laptop for the logo design :)

    • 136 users online
    • 108 users / day
    • 435 users / week
    • 1.32K users / month
    • 4.54K users / 6 months
    • 1 subscriber
    • 4.63K Posts
    • 117K Comments
    • Modlog
    Lemmy
    A community of privacy and FOSS enthusiasts, run by Lemmy’s developers

    What is Lemmy.ml

    Rules

    1. No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia. Code of Conduct.
    2. Be respectful, especially when disagreeing. Everyone should feel welcome here.
    3. No porn.
    4. No Ads / Spamming.

    Feel free to ask questions over in: