Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)FL
Posts
2
Comments
11
Joined
6 days ago

  • I completely agree. The potential for breaches is always there, and the goalpost for security is constantly moving. Encrypting data before uploading is a solid strategy, and while encryption algorithms may eventually be broken, Defining the threat model is key to finding the best solution which I cannot find and answer yet

  • Thank you so much for sharing your personal insights and experiences

    As for the encryption concern, I’m still at a crossroads regarding the fact that AI’s ability to operate beyond traditional oversight makes these risks more challenging to predict and control

  • Not directly the state actors really more to do with the consequences ie common hacks into state actors resources make the data open to misuse and the state actors do not take any responsibility if they are hacked, right!

    When an AI system is given access to it , it can uncover hidden patterns or vulnerabilities that humans might miss. This ability can lead to consequences, such as exposing sensitive information or breaking security measures, especially if the data is encrypted or anonymized. AI might also exploit weaknesses in the data, resulting in data breaches, privacy violations, or malicious manipulation. AI could leak personal details or confidential information, leading to significant risks like reputational damage or financial loss. AI to operate beyond traditional oversight makes these risks harder to predict and control.

  • Thank you for that, I'm afraid I have mentioned the "encrypted" word in my post :

    (ie. if I choose to store them online/cloud encrypted, I face significant privacy concerns. While they might be secure now, there’s always the potential for a very near future breaches or compromises, especially with the evolving risks associated with AI training and data misuse),

    but haven't detailed/highlighted/clear enough

    Yes "encrypt them first then upload them" is the situation I meant

    p.s edited the post now

  • asklemmy Ask Lemmy @lemmy.world

    Dilemma: Online vs. Offline Privacy & Security of Personal Family Photos/Videos – Balancing Risks & Protection

  • I have tried to post my thank you message but "hanging" after clicking the reply button has continued for 3 days or so.

    I sincerely thank you for your incredibly thoughtful and detailed response. Not only did you take the time to explain everything so clearly, but the way you included your personal experience really made a difference.

    It’s rare to come across someone who is willing to share such in-depth insight, and I truly appreciate how much effort you put into helping me understand things from a practical standpoint. Your advice has been extremely helpful,

    Thank you again for being so generous with your time and knowledge!

    I agree that I have to to rely on the encryption for what I have for the films online/cloud, and that seems acceptable.

    However, when it comes to personal family photos and videos, I’m facing a dilemma.

    • If they’re stored online, they’re vulnerable to potential compromises (PRIVACY CONCERN) -maybe not now, but in the future, especially with the risks posed by AI training.
    • On the other hand, if they’re kept offline, I’m still at risk of losing them due to physical factors, especially since I live in an earthquake-prone area
  • Thank you everyone so much for your responses. You’ve truly opened my eyes to so many aspects I hadn’t even considered before.

    Your insights were not only thoughtful but also incredibly helpful. It’s rare to come across such comprehensive answers that cover so many angles, and I really appreciate the time and effort you took to share them.

    Each of you has given me a lot to think about, and

    I’m grateful for the depth of understanding you provided. Thanks again!

    As a first step, I'd like to pick one of the programs to start with:

    Cryptomator

    gocryptfs (not so Windows-friendly)

    GnuPG

    VeraCrypt (slower than TrueCrypt, and since it’s offered as a replacement, it makes me suspicious, especially since TrueCrypt mysteriously vanished without providing any explanation. Some people believe VeraCrypt might have backdoors, whereas TrueCrypt’s abandonment perhaps didn’t provide any backdoors.)

    TrueCrypt (I have used it occasionally on my Windows PC, although it is no longer updated)

  • asklemmy Ask Lemmy @lemmy.world

    How do you ensure privacy and security on cloud platforms in an age of compromised encryption, backdoors, and AI-driven hacking threats to encryption and user confidentiality?