A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
- Don’t promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
- 0 users online
- 57 users / day
- 383 users / week
- 1.5K users / month
- 5.7K users / 6 months
- 1 subscriber
- 3.12K Posts
- 78.1K Comments
- Modlog
Udemy with email: Udemy gets your email, and will probably require a verification process to verify that you own it:
Udemy with Google Sign in: You click through in your browser, to authorize Udemy to obtain some details (usually just email + basic profile details), Udmey gets a “token” (effectively a random string) which they can send to google to retrieve these other details, and verify you still have an account and you (or google) haven’t revoked access, which they can use now and in the future. They don’t need to verify your email as they have a token that is “proof” already. To you it’s a click through, to everyone else it’s a bit more complex. If Udemy has a data leak, if they didn’t store your email directly, it’s possible that the token could be reset before someone is able to obtain it. But it’s unlikely they aren’t obtaining the email address as soon as you log in and storing it.