RatoGBM

joined 1 year ago
[–] RatoGBM@lemmy.world 5 points 1 month ago* (last edited 1 month ago)

Thanks, exactly what I wanted to know. This explains a lot.

There had to be some reasoning behind it after all.

[–] RatoGBM@lemmy.world -1 points 1 month ago

So the email and username have no cryptographic purpose, they are just there for convenience.

Thanks I guess...

[–] RatoGBM@lemmy.world 2 points 1 month ago* (last edited 1 month ago) (3 children)

So the email and name will be plaintext in the public key/signatures?

memorable link to the public key’s owner.

Ok, just strange how the key generator insists on specifying them. Encryption usually doesn't like extra metadata.

[–] RatoGBM@lemmy.world 6 points 1 month ago* (last edited 1 month ago)

From my knowledge VPNs hide your IP from the destination, and the destination from your ISP.

Fingerprinting is mostly about the browser you use.

For VPN any VPN should do (eg. Mullvad VPN $5/month) and for Browser just have a non-big tech browser with ad-blockers and tracking protection (eg. Mullvad Browser or other Firefox/fork with good config).

Or Tor

Also, how serious is the "not getting tracked" need? It sounds like you are getting hunted by the social media site? Wouldn't that need full OPSEC mode with Tails and Whonix like the real darknet hackers?

For the VM, I can't help you much. There should be tones of cloud hosting providers out there, just a Linux VM on another guy's computer after all.

PS: I am a newbie just repeating stuff I heard before like a parrot.

[–] RatoGBM@lemmy.world 2 points 1 month ago* (last edited 1 month ago)

Some random notes app on F-droid probably has what you need. (Notes apps because "Diary" gives mostly medical/habit trackers/loggers)

Also check IzzyOnDroid repo (select "Writing" category or just search for "Diary"), it has more "modern" apps in my impression.

You will need to scroll through quite a few to find one you like. Just don't get yourself into choice dilemma, pick one that looks decent and start using it.

-28
submitted 1 month ago* (last edited 1 month ago) by RatoGBM@lemmy.world to c/privacy@lemmy.ml
 

Cunningham Law (backfired terribly)

Can someone please explain why PGP is needs all of these? All explanations of public key encryption mention any email embedded emails.

And I probably don't completely understand what PGP is, so please give me a good article or video on it.

[–] RatoGBM@lemmy.world 7 points 2 months ago* (last edited 2 months ago)

How to tell someone is reading Sapiens.

Still, insane that "science/technology improvements" did not improve happienes at all. Just shifted the standards.

 

Death Note Anonymity analysis by Gwern.

I think it would be valuable to read for people here, especially newbies and "privacy bros" to understand how ~~privacy~~ (anonymity) actually works.

Given a perfect weapon, can you commit a perfect crime?

The answer is surprisingly close to no.

Everything you do bleeds information.

A perfect crime is one that wasn't even noticed. If a perfect crime gets noticed it immediately reveals the following: you are smart and you have the knowledge and weapons to commit a perfect crime, and in a murder you must have had a motive, instantly ruling out 99% of the human population.

On the web you can be tracked using almost anything: browser window size, word choice, times you are online, internet connection delay, negative qualities like not giving your language will exclude the majority of people who do.

In fact, just this post alone is sufficient to narrow me down to less than a million (maybe even a few thousand) people.

Edit: This is actually about anonymity, privacy is slightly different, but I think this is still relevant to privacy.