• 19 Posts
  • 39 Comments
Joined 9M ago
cake
Cake day: Oct 04, 2023

help-circle
rss

Ah! I was not aware of the fact that Alias service can encrypt email before forwarding to actual mailbox.


Email alias indeed helps to avoid spam and helps you to assume separate identity per site, but won’t help in any way to stop mail provider/server from processing your email data for user profiling / targeted ad purpose.

Buying email domain and self-hosting is only the full proof way from privacy POV, but it is really difficult target to accomplish. A privacy respecting email hosting + alias should be next ideal choice, IMO.


True, but till the transition completes (if it ever), these privacy frontends are quite handy tool to view content of those services.

I heavily use LibReddit to follow certain Subreddits, although I now mostly frequent Lemmy.


Same as that happened to Bibliogram earlier – a cat-n-mouse game between Dev and API owner.



The post is about Nextcloud self-hosted file storage as an open source replacement for One Drive which is deeply integrated with MS Teams. For those, who can’t replace MS Teams with FOSS equivalent for whatever reason, can at least stop relying on One Drive for file storage solution.

And, for your information, Nextcloud does offer 1:1 and group chat solution[1], which is an open source replacement for MS Teams.

[1] https://nextcloud.com/talk/


You are essentially sharing a file link via MS Teams.

Instead of keeping the actual file on OneDrive, it is hosted on your own (Nextcloud) server. Sorry but how it leads to privacy issue?


Nextcloud[1] is an open source and self-hostable SaaS product.

Instead of using OneDrive and Google Drive (and similar proprietary solutions), Nextcloud is a better solution from Privacy POV, IMO.

[1] https://en.wikipedia.org/wiki/Nextcloud


>The new add-in integrates Nextcloud with Microsoft Teams, allowing users to effortlessly share files and folders stored on their private Nextcloud server directly from the Teams user interface. This effectively replaces OneDrive (and similar proprietary solutions) with Nextcloud, IMO.
fedilink

And, here come typical response -

telecom operators have informally shared with the department that the leaked information claimed in the ClouSEK report seems to be a compilation of old data sets of telecom subscribers and it is not due to any vulnerability in their system."

Source: https://telecom.economictimes.indiatimes.com/news/industry/cybersecurity-firm-claims-data-leak-of-750-million-telecom-users-dot-asks-telcos-for-security-audit/107244949


>The main idea behind it is to improve the creation of tab groups for the user. The process is automated when the feature is used, which means that you do not have to create tab groups manually anymore and put tabs into them. >Edge sends information about **all open websites to a Microsoft server** when the option is selected. The AI processes the request then on the server and returns its suggestions after a moment. >While the automatic tab group creation features of Edge and Chrome look useful, privacy conscious users may want to skip those and create tab groups manually instead. >Having your entire list of open websites submitted to a company server without really knowing what is done with it and how it is stored outweighs the convenience of the feature.
fedilink

> The idea behind predictive policing is that by feeding historical crime data into a computer algorithm, it’s possible to determine where crime is most likely to occur, or who is most likely to offend. Law enforcement officials can then make proactive interventions, like conducting patrols in predicted crime locations, ideally stopping crime before it occurs. > Predictive policing systems rely on historical data distorted by falsified crime reports and disproportionate arrests of people of color,” the letter continues. “As a result, they are prone to over-predicting crime rates in Black and Latino neighborhoods while under-predicting crime in white neighborhoods. The continued use of such systems creates a dangerous feedback loop: biased predictions are used to justify disproportionate stops and arrests in minority neighborhoods, which further biases statistics on where crimes are happening. > Cameron was part of a joint effort between The Markup and Gizmodo that published an investigation in 2021 showing how a predictive policing algorithm developed by a company called Geolitica disproportionately directed officers to patrol marginalized communities almost everywhere it was used.
fedilink


>For facial recognition experts and privacy advocates, the East Bay detective’s request, while dystopian, was also entirely predictable. It emphasizes the ways that, without oversight, law enforcement is able to mix and match technologies in unintended ways, using untested algorithms to single out suspects based on unknowable criteria.
fedilink

Request: Your IP > Apple (1st) relay node > 3rd party (2nd) relay node > Website

Response: Your IP < Apple (1st) relay node < 3rd party (2nd) relay node < Website

Whoever has access to both relay nodes, can easily track you end-to-end.

As for Apple, they claim the 1st relay node is owned by them, and 2nd relay node is owned by 3rd party. (Source: https://www.apple.com/icloud/docs/iCloud_Private_Relay_Overview_Dec2021.pdf)

In theory, it should not be a privacy concern because -

  • Website will see the request coming from 2nd relay node’s IP.
  • 2nd relay node will see the request is coming from Apple (1st) relay node’s IP.
  • So, only Apple knows your IP.

The really powerful thing about Facebook ads is in your ability to layer targeting options on top of one another, gradually making your audience more and more specific. An extreme (and hilarious) example of the power of hypertargeting was featured in AdWeek last year, when a marketing pro targeted his roommate with ads so specific the poor guy thought he was being cyberstalked.

🤮


>Mozilla is unhappy because the use of browser engines other than WebKit will be restricted to the EU, forcing them to develop two different apps. >For an independent browser like Firefox, managing two browsers is not easy, so it can be forgiven that this could be seen as almost harassment. >Also, the fact that the use of browser engines other than WebKit is limited to iOS means that the use of WebKit is still forced on iPadOS, which also increases the effort for Mozilla. Source: https://iphonewired.com/news/746093/
fedilink






sold ad analytics

Do you still the have the link to news article where it was reported?

Earlier I was using Pi-Hole on my network then switched to AdGuard Home (not same as AdGuard DNS) as it is an open source product with in-built DOH support (yes, I can setup Pi-Hole to do the same, but that’s an extra manual configuration) and Privacy Guide seems to recommend it over Pi-hole. After reading your post, I tried to lookup more about it. Nothing on Wiki. Closest thing is this. If the allegations are true then I need to switch back to Pi-Hole.



If installing extension is not an option for you -

  • You can open https://snowflake.torproject.org/ (or https://relay.love/) on a tab,
  • scroll down to ‘Leave this browser tab open or embed a web badge on your website’ section
  • toggle ‘Enabled’ button
  • and leave the browser running.
  • Note: Browser needs to have WebRTC enabled to make it work.

I’m personally running Snowflake container on docker on my little Raspberry pi 24/7. And, yes, in 2023 most of the connection to my bridge was from Iran.


Yes, Temporary/Disposable email account is strictly for one time use.


>AdGuard Temp Mail’s addresses are temporary and aren’t stored long by design: Emails are automatically deleted 24 hours after you receive them. A temporary mailbox is deleted after 7 days of inactivity. But if you keep the page open or come back in a couple of days, it won’t disappear. >AdGuard Temp Mail is currently in beta stage. Here’s what we’re planning to add in the future: Zero-access encryption TLS support on the SMTP server side Image proxying Security checks for links
fedilink

>"The InMarket Apps have been downloaded onto over 30 million unique devices since 2017," reads the FTC complaint against InMarket Media. >"Respondent also makes the InMarket SDK available to third party app developers, and it has been incorporated into more than 300 such apps which have been downloaded onto over 390 million unique devices since 2017." >The FTC complaint says InMarket maintains 2,000 categories of distinct "audiences" which tracked people fall into, including "Christian churchgoers," "wealthy and not healthy," and "parents of preschoolers." >Ultimately, the FTC deems InMarket's five-year data retention policy overly excessive for targeted advertising, significantly elevating the risk of misuse and exposure.
fedilink


I think it depends on headphone model/setup.

My Sennheiser Momentum 3 by default only look for devices that were paired up in the past.

It goes to (forced) discovery/pairing mode only when I press a specific button on headset manually.

Check manual of your headset for similar setup.


>Google collects and shares data between its own services by default. Search, advertising, YouTube and several others exchange user data. Users in the EU have to give consent to this form of sharing. By default, data will no longer be exchanged between services. EU users may already manage the Google Services that may or may not exchange data. >EU users who searching with buying intentions, e.g., for a hotel or laptop, will get a new dedicated unit in the search results that shows group of links from comparison sites "from across the web" and "query shortcuts at the top of the search page to help people refine their searches". >Users from the EU will get browser and search engine choice screens on Android and in Google Chrome.
fedilink

Have I Been Pwned adds 71 million emails from Naz.API stolen account list
>The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware. >Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites. >Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.
fedilink



This is how I explained it to one of my friends who is/was definitely a member of “I’ve got nothing to hide” club -

  • Suppose you are in a pay-to-use toilet minding your own Business.
  • That pay-to-use toilet is managed by a public/private entity called ToiletBook.
  • Suddenly you notice a (hidden) camera in the room.
  • When confronted, the owner confirms the only reason they took your picture to suggest you the perfect underwear based on your size. And, there is a legal guarantee that picture/data will never be used for any other purpose and only be processed by machine.
  • Will you still go to such toilet?

BTW, that friend stopped talking to me afterward; not sure why 🤔 (Edit: I should stop giving shitty examples to anyone, as it seems ) 🤐


Back in '50s, the connection between Tobacco products and Cancer was evident. Since '70s connection between Fossil fuel and Global warming was evident.

Yet, no one heeded those warnings at the time. With cancer rate going up, and climate becoming increasing unpredictable/extreme, people now started to take notice.

With so much information to process, Human brain ignores information that doesn’t have a clear relation to a significant real world problem that immediately impacts their lives. This makes us intelligent (at short term) and dumb (at long term) at the same time.

Using a service at free of cost (at the expense of your privacy) is acceptable by majority of population as it has no significant real world impact on their lives.

If tomorrow, a huge data leak from these imbecile data hoarders leads to massive transaction fraud/identify theft that impacts a significant percentage of population and their daily lives, only then there will be massive outrage that you expect.

Till then, we are the only one who escaped the Matrix, while rest embraced it.


>Location firm Near describes itself as “The World’s Largest Dataset of People’s Behavior in the Real-World,” with data representing “1.6B people across 44 countries.” Mobilewalla boasts “40+ Countries, 1.9B+ Devices, 50B Mobile Signals Daily, 5+ Years of Data.” X-Mode’s website claims its data covers “25%+ of the Adult U.S. population monthly.” >Fast food restaurants and other businesses have been known to buy location data for advertising purposes down to a person’s steps. For example, in 2018, Burger King ran a promotion in which, if a customer’s phone was within 600 feet of a McDonalds, the Burger King app would let the user buy a Whopper for one cent. >Outlogic (formerly known as X-Mode) offers a license for a location dataset titled “Cyber Security Location data” on Datarade for $240,000 per year. The listing says “Outlogic’s accurate and granular location data is collected directly from a mobile device’s GPS.”
fedilink


>Using a panel of 709 volunteers who shared archives of their Facebook data, Consumer Reports found that a total of 186,892 companies sent data about them to the social network. On average, each participant in the study had their data sent to Facebook by 2,230 companies. That number varied significantly, with some panelists’ data listing over 7,000 companies providing their data.
fedilink

>X’s move to make people pay for a basic form of two-factor is problematic. It also created confusion because the company prompted free users to switch away from SMS two-factor, but then seemingly simply turned off the protection altogether for those who didn’t. This likely left a group of users in a situation where they think they have two-factor authentication on, but actually don’t.
fedilink

If your hardware supports, you may self-host your favourite privacy frontends (e.g. LibReddit) on docker on your system, and point that extension to your self-hosted privacy frontend servers.


That’s a clear indication of IoT control being taken over by malicious actor to make it a part of botnet.

Any IoT needs to be secured when connected to Internet (and, not intranet).


Lemmy website does provide official PWA app.

On iOS: Safari > Lemmy website > Hit share button > Add to home screen. On android, I assume steps will be similar.

I wholeheartedly recommend PWA app as such is published by the publisher of website itself, and I don’t need to download it either from official or 3rd party store.

In case you don’t know, PWA is basically a web app, running using your browser engine, which has almost same look-n-feel of native app.

Wiki: https://en.m.wikipedia.org/wiki/Progressive_web_app


> The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said. Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html
fedilink

"After signing into their ACT account, if a student accepted cookies on the following page, Facebook received details on almost everything they clicked on—including scrambled but identifiable data like their first and last name, and whether they’re registering for the ACT. The site even registered clicks about a student’s ethnicity and gender, and whether they planned to request college financial aid or needed accommodations for a disability"
fedilink


I personally use Invidious (Privacy front-end of YouTube) using Docker. Though it can be compiled and run standalone as well.

It doesn’t take much resource (< 100 MB) to run on my system. There is NO ad or no pause.

It’s like YouTube Premium account with ZERO tracking.

https://github.com/iv-org/invidious


You are right; I should have fully read OP’s post before advising.

In my case, all cookies (except the ones I marked as exception) are deleted when browser is closed. Note, 3rd party cookies are by default blocked on Firefox.

I found this to be right setup for me.

Sorry, for the confusion.



In my case I’m using Miniflux RSS reader on Docker on a Raspberry Pi4. It has option to download content of articles. It’s really lightweight.


To add more context to it -

Meta is actually trying to comply circumvent EU’s strict privacy policy.

Recently, The EU’s top court said in July that Meta must first get consent before showing ads to users - a ruling that jeopardises the company’s ability to make money by tailoring advertisements for individual users based on their online interests and digital activity.

Source: https://www.euronews.com/next/2023/10/03/meta-could-charge-facebook-and-instagram-users-in-eu-to-go-ad-free-to-comply-with-privacy-



Option 3 : Delete your FB profile, and live peacefully ever after 😀


I personally consider this[1] to be the ultimate test of Browser fingerprint protection coverage. Let me know if you manage to find a way to defeat this test.

[1] https://abrahamjuliot.github.io/creepjs/


Same setup, but with Mullvad Browser


This is another good website for Browser leak/privacy settings test.

https://browserleaks.com/


OS: Ubuntu 23.10 | Browser: Firefox 119 | Add-on: No-Script | Misc: AdGuardHome on Raspberry Pi 4B

Edit: Uploaded Full image for Comparison with Mullvad Browser.


Let me put it in this way – if Firefox were really a spyware, TOR browser won’t be based on Firefox.