Flmaker @ Flmaker @lemmy.world Posts 2Comments 11Joined 6 days ago
I completely agree. The potential for breaches is always there, and the goalpost for security is constantly moving. Encrypting data before uploading is a solid strategy, and while encryption algorithms may eventually be broken, Defining the threat model is key to finding the best solution which I cannot find and answer yet
Regarding the online cloud storage encryption concern, I’m still uncertain, as AI’s capacity to function beyond traditional oversight makes these risks more difficult to predict and manage
Thank you so much for sharing your personal insights and experiences
As for the encryption concern, I’m still at a crossroads regarding the fact that AI’s ability to operate beyond traditional oversight makes these risks more challenging to predict and control
Not directly the state actors really more to do with the consequences ie common hacks into state actors resources make the data open to misuse and the state actors do not take any responsibility if they are hacked, right!
When an AI system is given access to it , it can uncover hidden patterns or vulnerabilities that humans might miss. This ability can lead to consequences, such as exposing sensitive information or breaking security measures, especially if the data is encrypted or anonymized. AI might also exploit weaknesses in the data, resulting in data breaches, privacy violations, or malicious manipulation. AI could leak personal details or confidential information, leading to significant risks like reputational damage or financial loss. AI to operate beyond traditional oversight makes these risks harder to predict and control.
Thank you for the link, do you think I ask the same question there as well or just read the posts there to gain more knowledge on the risks please
My concern: If an AI system is granted access to it, AI can detect patterns or vulnerabilities that humans might overlook, leading to data breaches or exploitation.
Thank you for the strategy I appreciate very much all the best
Thank you for that, I'm afraid I have mentioned the "encrypted" word in my post :
(ie. if I choose to store them online/cloud encrypted, I face significant privacy concerns. While they might be secure now, there’s always the potential for a very near future breaches or compromises, especially with the evolving risks associated with AI training and data misuse),
but haven't detailed/highlighted/clear enough
Yes "encrypt them first then upload them" is the situation I meant
p.s edited the post now
![asklemmy](https://lemmy.world/pictrs/image/44bf11eb-4336-40eb-9778-e96fc5223124.png?format=webp&thumbnail=48)
Dilemma: Online vs. Offline Privacy & Security of Personal Family Photos/Videos – Balancing Risks & Protection
I have tried to post my thank you message but "hanging" after clicking the reply button has continued for 3 days or so.
I sincerely thank you for your incredibly thoughtful and detailed response. Not only did you take the time to explain everything so clearly, but the way you included your personal experience really made a difference.
It’s rare to come across someone who is willing to share such in-depth insight, and I truly appreciate how much effort you put into helping me understand things from a practical standpoint. Your advice has been extremely helpful,
Thank you again for being so generous with your time and knowledge!
I agree that I have to to rely on the encryption for what I have for the films online/cloud, and that seems acceptable.
However, when it comes to personal family photos and videos, I’m facing a dilemma.
- If they’re stored online, they’re vulnerable to potential compromises (PRIVACY CONCERN) -maybe not now, but in the future, especially with the risks posed by AI training.
- On the other hand, if they’re kept offline, I’m still at risk of losing them due to physical factors, especially since I live in an earthquake-prone area
Thank you everyone so much for your responses. You’ve truly opened my eyes to so many aspects I hadn’t even considered before.
Your insights were not only thoughtful but also incredibly helpful. It’s rare to come across such comprehensive answers that cover so many angles, and I really appreciate the time and effort you took to share them.
Each of you has given me a lot to think about, and
I’m grateful for the depth of understanding you provided. Thanks again!
As a first step, I'd like to pick one of the programs to start with:
Cryptomator
gocryptfs (not so Windows-friendly)
GnuPG
VeraCrypt (slower than TrueCrypt, and since it’s offered as a replacement, it makes me suspicious, especially since TrueCrypt mysteriously vanished without providing any explanation. Some people believe VeraCrypt might have backdoors, whereas TrueCrypt’s abandonment perhaps didn’t provide any backdoors.)
TrueCrypt (I have used it occasionally on my Windows PC, although it is no longer updated)
I appreciate your suggestion very much.
I wonder what the difference between gocryptfs and others like Trucrypt would be.
Need to search and compare the pros and cons of both,
the advantages and disadvantages of each,
particularly in terms of security, ease of use, and performance