Skip Navigation
Active combat against surveillance instead of passive defense

Examples of passive defenses against surveillance:

But why not actively combat surveillance instead of passively defending against it? Examples of active combat:

We must poison the data of those who are violating our privacy. Let us waste their time, increase their data storage costs, and waste their processing power. Let them drown in an ocean of data. Let them search for tiny needles in huge haystacks, with no way to distinguish between needles and hay.

Some ideas:

  • Sending fake data to Google Analytics (How does Google Analytics prevent fake data attacks against an entity's traffic?)
  • Create fake contacts lists to mislead those who are building social network graphs.
  • Encrypt lots of worthless data, store them in the cloud or send them by email. If the encrypted data is intercepted by any nosy entity, they will have to waste storage space while waiting to be able to break the encryption.

What are some other possible methods?

Let us turn the tables on those who have been violating our privacy. Why do we have to be on the defense? Let us waste their resources in the same way that they are wasting ours!

11
Disabling hardware acceleration in Firefox for security reasons
  • Source for your claim? Otherwise it’s fud

    I am not making any definite claims. I am just wondering whether or not the reasoning in the question makes sense. If it does not, please tell me why the reasoning is wrong. Thank you.

  • Disabling hardware acceleration in Firefox for security reasons

    I am using Firefox ESR on Linux. Does it make any sense to disable hardware acceleration for security reasons?

    Whereas Firefox is open source, many hardware drivers, and most computer hardware are not. Enabling hardware acceleration in Firefox means using these non-open-source components, which could be a security risk. My impression is that bugs in drivers and hardware are able to cause far more damage than ones in userland software. Does this reasoning make sense?

    5
    AppArmor profile for Signal Desktop in Linux

    For those who have installed Signal Desktop in Linux, do you use an AppArmor profile to harden the program? If so, can you share your AppArmor profile for Signal Desktop?

    0
    Simple Mobile Tools is being sold to a for-profit firm ZipoApps
  • When ZipoApps adds advertisements and telemetry to a future version of the Simple Mobile Tools apps, will my Google-Play-installed apps be automatically updated to the newer version with ads and telemetry? I don't want ZipoApps to get any of my data.

  • Can the government decrypt your WhatsApp chats?
  • If you did not enable end-to-end encryption for your WhatsApp backups on Google Drive, the US government could possibly compel Google to hand over your encrypted (but not end-to-end encrypted) backup, and compel Meta to hand over the decryption keys for the backup.

    Details about how WhatsApp backup works: The Workings of WhatsApp’s Backups (and Why You Should Enable End-to-End Encrypted Backups).

  • Quality of 3D printing versus injection molding

    Are consumer level 3D printers able to print plastic objects of similar quality to ones produced using injection molding? Or is 3D printing useful mostly for the prototyping stage before a design is finalized and a steel mold is produced for injection molding?

    16
    Should I always clear the web browser cache?

    I am using Mozilla Firefox as my web browser. I have configured it to clear cookies, active logins, form & search history, and offline website data when I close Firefox. Should I also configure it to clear the cache? What are the privacy implications if I don't clear the cache?

    EDIT: additional information:

    • My goal is to reduce fingerprinting and tracking by websites.
    • I use Mozilla Firefox on my personal laptop that almost never leaves my residence. The laptop has full disk encryption. I am the only user of the laptop.
    • I don’t erase my web browser history. I want to keep browser history for my future reference.
    18
    How to import Digipass 2FA token into open source authenticator app

    I have a "Digipass GO 6" hardware token generator that is issued by my bank. Is there a way to import the token generator into an open source authenticator app such as Aegis Authenticator?

    I suspect that Digipass uses a proprietary TOTP algorithm, but I am hoping that there is an open source software solution.

    1
    What are some great open source games?
  • People like giving recommendations like Super Tux Kart that haven’t aged well and don’t play well.

    What's the issue with SuperTuxKart? I thought that it was great fun when I played it.

  • LocalSend - An open source cross-platform alternative to AirDrop
  • LocalSend is not exactly an alternative to AirDrop. In LocalSend, two devices must be connected to the same LAN to share files with each other. In AirDrop, no LAN connection is necessary. Files are transferred directly between devices, similar to Bluetooth file sharing between devices.

  • Personal Finance @lemmy.ml citytree @lemmy.ml
    Are there any target-maturity bond ETFs for UK Gilts?

    I am looking for a target-maturity bond ETF for UK Gilts but I couldn't find any by using an internet search engine. I would like something similar to iShares iBonds Dec 2033 Term Treasury ETF but for UK Gilts instead of US treasury bonds. Does such an ETF exist? If not, what are the practical alternatives for getting UK government bond exposure that have the following characteristics:

    • Easy for foreigners to purchase
    • Easy to liquidate
    • Has a fixed maturity date
    • Has a low minimum investment requirement (e.g. less than 1000 GBP).
    0
    App for automatically switching on/off mobile data and Wi-Fi based on location
  • WiFi and mobile data are activated all the time.

    In our case, there are several problems with activating both WiFi and mobile data all the time:

    • At home, if the WiFi is out of range, switched off, or temporarily out of service, Android would start to consume mobile data. This is highly relevant because, at her home, WiFi is unavailable from night time till early morning to enforce self-discipline.
    • Outside home, there is no need for WiFi. Why should it be switched on when it will never be used outside home? It would just be a battery drain.
  • App for automatically switching on/off mobile data and Wi-Fi based on location

    My mother uses a prepaid phone plan where mobile data usage is charged by the megabyte. It is currently not cost-effective to switch to a monthly fixed-cost subscription plan.

    • When she is at home, she should:
      • Switch off mobile data.
      • Switch on WiFi (because her home WiFi has a fixed monthly cost).
    • When she is outside home, she should:
      • Switch on mobile data (so that others can contact her using messaging apps such as Signal and WhatsApp).
      • Switch off WiFi (to conserve battery).

    The problem: she often forgets to do the above. Sometimes she leaves home without switching on mobile data. Sometimes she accidentally uses lots of mobile data when at home.

    Is there an app that can automatically switch on/off mobile data and WiFi based on the phone’s location? Location should be detected based on all the following data: latitude/longitude coordinates (if location is enabled on phone), WiFi networks in range (if WiFi is enabled on phone), and cell tower signals (if airplane mode is not on).

    We would strongly prefer to use a privacy-respecting open source app for this. Phone: Samsung Galaxy A series. OS: Android 13.

    12
    Is the Internet Archive's controlled digital lending (CDL) going to be shut down?

    I have been reading about Hachette v. Internet Archive, but as a layperson with little knowledge about legal matters, I was not able to completely understand the current situation.

    Do the court cases mean that the Internet Archive is about to be forced to shut down its e-book lending system? If so, would such a shut down affect US users only, or would it be worldwide?

    5
    App for version control of text files
  • Using git it’s probably the most easy and lightweight method to VC plain text ...

    Really? I am currently using RCS for my simpler version control needs, and Git for larger and collaborative projects.

  • App for version control of text files

    Are there any open source apps that can version control text files in Android? I don't necessarily need something with lots of features like Git. Even something similar to RCS would be sufficient for me.

    2
    General Programming Discussion @lemmy.ml citytree @lemmy.ml
    Are there any standard source-available licenses?

    For open source software, I can easily use a widely-used open source license (e.g. MIT, Apache, GPLv3, MPLv2, etc.). However, source-available licenses are less easy to find.

    Are there any source-available licenses that I can readily copy to apply to my software? I am hesitant to copy the source-available licenses listed on Wikipedia because license texts are copyrighted by default and should not be copied without permission from the author of the license text.

    Specifically, I am looking for a source-available license that has conditions similar to the GitLab Enterprise Edition (EE) license that I can use for my software.

    2
    How to prevent keyboard and mouse fingerprinting in web browsers

    If websites are able to track their users' typing behavior and mouse movements, then the websites may be able to use that data to fingerprint, track, and possibly identify their users. Is this a real privacy risk? If so, what are the methods to counter keyboard and mouse fingerprinting by websites? Note that I do not want to disable JavaScript.

    5
    WhatsApp Web vs WhatsApp Android privacy

    Does user privacy when using WhatsApp Web (https://web.whatsapp.com) differ substantially from using WhatsApp on Android? WhatsApp on Android has end-to-end encryption and (optional) encrypted backups. If I use WhatsApp Web, will Meta be able to see the contents of my WhatsApp messages?

    10
    homelab @lemmy.ml citytree @lemmy.ml
    Network cable: CM fire rating vs Euroclass Eca

    I'm buying a Cat 6 cable. I have two available choices. One has fire rating "CM", and the other has Euroclass rating "Eca". Which one is more fire resistant? I was not able to find an equivalence table. Is "CM" comparable to "Eca"?

    0
    Website for checking if app will work without Google Play Services

    Is there some kind of website that has a database of whether or not an app would require Google Play Services to function? I remember using just such a website a few weeks ago, but I don't remember its name. It has a search box where one enters the app name and it will tell you whether or not that app relies on Google Play Services.

    2
    Chinese keyboard for Android?

    Is there any open source and privacy-respecting Android keyboard for Chinese input? I want to avoid proprietary keyboards such as Gboard and Samsung Keyboard. Unfortunately, the open source Android keyboards that I found only support alphabetic input:

    For Chinese input I would like pinyin input for both traditional characters and simplified characters. Handwriting input would be nice to have but it is not essential.

    12
    Can uBlock Origin do everything that NoScript does?

    I have installed both uBlock Origin and NoScript in Firefox. Does it make sense to use both at the same time? I was wondering whether or not uBlock Origin is able to do everything that NoScript does. If not, what does NoScript have that uBlock Origin does not?

    23
    Refusing to use Signal: "I have too many messaging apps"

    Not sure if any of you have encountered the same resistance to using Signal. Some of my cousins refused to use Signal because they are already using "too many chat apps" (e.g. WhatsApp, Facebook Messenger, WeChat, Telegram, Line, Snapchat, etc.). To them, Signal will just be another chat app among their numerous other chat apps. I understand that jumping between so many messaging apps imposes some kind of cognitive and maintenance burden. What are some ways to convince such people to use Signal?

    9
    The Little Learner: A Straight Line to Deep Learning
    www.thelittlelearner.com The Little Learner: A Straight Line to Deep Learning

    A highly accessible, step-by-step introduction to deep learning, written in an engaging, question-and-answer style.

    cross-posted from: https://lemmy.ml/post/1539767

    > Another book in The Little Schemer series: > > The Little Learner: A Straight Line to Deep Learning by Daniel P. Friedman and Anurag Mendhekar. > > > The Little Learner covers all the concepts necessary to develop an intuitive understanding of the workings of deep neural networks: tensors, extended operators, gradient descent algorithms, artificial neurons, dense networks, convolutional networks, residual networks and automatic differentiation. > > > > ... > > https://www.thelittlelearner.com >

    0
    Unclassified FBI Document: Ability to legally access Secure Messaging App Content and Metadata (January 2021)

    cross-posted from: https://beehaw.org/post/789646

    > An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act. > > > This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve: > > * Apple iMessage: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone. > > * Line: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location). > > * Signal: date and time of account creation and date of last connection. > > * Telegram: IP address and phone number for investigations into confirmed terrorists, otherwise nothing. > > * Threema: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date. > > * Viber: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination). > > * WeChat: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users. > > * WhatsApp: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups. > > * Wickr: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting. > > TL;DR Signal is the messaging system that provides the least information to investigators.

    2
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CI
    citytree @lemmy.ml
    Posts 20
    Comments 30