• 3 Posts
  • 8 Comments
Joined 1M ago
cake
Cake day: Feb 21, 2025

help-circle
rss

Thanks. This is actually really helpful. I looked it up to check as it I didn’t believe it. Unfortunately, I have no idea whether my brain accidentally or deliberately misspelled it so cannot guarantee that I will learn for next time I use the word. Thank you for your help though.


You are, of course, correct. Whilst my post is only semi-serious, I agree that if I seriously followed the line of thinking then the entire system becomes unusable pretty quickly.

As you can see, I am adapting my threat model to trust less and less structures as I go through the post. As such, it would only really be relevant in the event of a rapidly evolving adversary and probably not even then.

My threat model is nowhere near as tight as is suggested by the contents of the post. The post is more of a thought experiment to see how quickly you can “invent” threats to get to holding all data only on an offline hard drive in a cupboard somewhere. Lol


Exactly, but that just raises more issues. Which cabin? Where? How to stop people breaking into the cabin? Should it have a chimney to automatically incinerate the data device if anyone comes near? As people expect cabins to be in woods, would it be better if the cabin was outside the woods? And finally, is it easier just to trust Google with my data Lol


Personal data security - How far is too far?
I was thinking about personal data security and let my mind wander. I decided that if you were exceptionally paranoid then........ When thinking about personal data it may occur to you that, once you have implemented an adequate 3 stage backup system to avoid data loss, your main risk is the exfiltration and use of that data for nefarious purposes. Personal data, e.g. the pictures or messages on your phone or pc, can imply many different things such as religion, sexual orientation, health details, political views etc. that could potentially be used against you by a bad actor. As such, it would seem rather inadvisable to hold any data on any device that is not encrypted in a fashion whereby only you hold the encryption key. Further, if you are going online using the device then, even if the device has a trusted os that implements full disk encryption, then it would also seem inadvisable to hold any data on the device that isn't seperately encrypted within the operating system. The data would be protected before first unlock by the os encryption and after first unlock by the seperate encryption. As the password for this seperate encryption would neccessarily need to be complex you would be best storing this within a trusted password manager that employs zero-knowledge encryption or even better one that does not employ cloud-based syncing. You would also probably want to pepper the password with memorised additional digits. You might then consider that, as encrypted data, while not especially useful now, may be seen as potentially more valuable should it be exfiltrated and stored for future decryption once technology allows, it may not be the best idea to store this encrypted personal data on any device that connects to the internet or even in a zero knowledge encrypted cloud-based storage solution. You would then presumably decide that it is best to carry all the data you may wish to access at short notice encrypted on a portable simple data storage device that you could connect to any devices you wish to access the data on. You make the assumption that whoever mugs/holds you up/pickpockets and takes the data device is less likely to hold onto the encrypted data than an online attacker. It is possible that you would then adjust your 3 stage backup system to be based on 3 non-internet-connected simple data storage devices kept in 3 seperate locations, one of which you carry around with you. It was at this point that I decided to stop thinking about it. Lol. As noted, this train of thought would probably only occur if you were exceptionally paranoid and it could be theorised that at that point it is debateable whether you are more at danger from data exfiltration and exploitation or the very angry rabbits that want to know why you are so far down the rabbit hole. Lol.
fedilink

What I meant by my threat model not being the tightest was that if I want to read something on a site that requires javascript and cookies then I will just turn them back on temporarily rather than not read what I want just because of possible tracking.

I agree with your point about the web being almost unusable in parts without JavaScript. However, I find that a lot of sites have a lot of javascript-heavy pages at the front but simpler pages behind where you get to things you actually want to look at. Usually a site’s RSS feeds let you get directly to the simpler pages without using JavaScript.


Excellent post. I agree entirely.

There absolutely must be an elegant solution to the problem. However, in my opinion, the issue is that not enough people are interested in having the security you mention. Don’t the statistics say that over 50% of people don’t use a password manager, reuse passwords and those passwords are things like password123?

This apathy towards security presumably means that there is very little money in designing the elegant solution to the problems raised in your post and many of the brightest and best in the field will simply seek alternative employment in the online data collection and advertising field where all the money is.

As it stands, so many people have so little concern about online security or privacy that it seems to be slowing progress in both fields.


Thanks. Is Tor browser as effective if not used over tor? My tracking blocking is via a VPN that I trust and want to continue using so I wasn’t thinking of using tor. I think I read somewhere that using VPN over tor or tor over VPN somehow became less private (I’m not technical so this might not be right - maybe someone could explain it). I was going to use Mullvad as I believe it has many of the same qualities as Tor browser but is more focused on use with a VPN rather than Tor.


The question of browsers
So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work. My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection. With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup. I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies. I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux. Thanks for any help in advance.
fedilink

Thanks for this. It is very helpful. To be honest, I had forgotten about Exodus.

I think it needs camera and microphone in case you want to take photos and video and save directly to an encryted volume. That is not in my use case so I will just deny those permissions.


Thanks. I had noted the lack of internet permission as a positive. I guess that I was just puzzled at the lack of coverage within the community. Maybe the app simply hasn’t been around long enough to attract the attention it seems to warrant. Or maybe I am being overcautious.


How private is DroidFS?
Hi. When considering the privacy credentials of an android app, I would usually search for reviews by well-known privacy advocates or recommendations from common privacy websites. However, with DroidFS I am unable to find much information and no recommendations from common sites. The little information I can find is that it is an efficient, easy-to-use implementation of gocryptfs and cryfs for android. This is what I am looking for but was wondering whether anyone had any further insight on the app from a privacy point of view please. Thanks.
fedilink