Pinned toot

"Do you have something to hide?" is a manipulative rebuke to those that use .

It would help us all turn this conversation around. Because, the answer is: YES, we do have something to hide.

Things that we should hide, and must question why a government or business NEEDS access to:

- Medical history.
- Sensitive conversations with employers, children, spouses.
- Billing and banking information.
- Purchase information.
- Web search history.
And more...

Have you ever had your VPN connection to a website blocked by ?

Yet, Cloudflare is also a provider.

This seems monopolistic and anti-competitive from a company with massive control over internet traffic.

Police are making a literal police state with the help of your neighbors.

- Consider ditching your video doorbell.

- Consider telling the police HECK NO to videocam integration.

nbcnews.com/news/us-news/polic

Starting today, your donations to Tor will be matched by a group of donors who believe in the importance of resisting the surveillance pandemic, up to $100K.

With this match, your impact will be DOUBLED: torproject.org/donate/donate-u

Clearview AI does one thing—sell to police the service of identifying people in probe photos. So it cannot evade the @ACLU lawsuit against its dragnet faceprinting with an erroneous First Amendment defense. eff.org/deeplinks/2020/11/clea

To clarify: our point is that complex software app installs can block people from using a particular OS, because without apps, the OS is useless. Most Linux installs are much easier than the others, thankfully.

Show thread

Overly technical software installation is a huge blocker for most people. This stops people from using privacy-protecting Operating Systems like .

If we are to get people into products that are better for , please add "simple installation" to your issues list if you or software.

is our everyday go-to for spreadsheets and documents. Why use products from invading big tech companies, when there is a legit alternative with a rapid development cycle?

Better yet, you can be part of the change to smaller tech:

blog.documentfoundation.org/bl

Make the decision to use products.

Mojeek is an alternative search engine and so it makes sense that we both love and use .

If you've got some free time this month, why not help them out?

If you're thinking of ousting some of the Big Tech elements from your business or work life, why not try them out?

blog.documentfoundation.org/bl

The #virtualpanopticon gets more sickening in China. Code like any tool is neutral, but it's how it is written and what purpose it is written for is not neutral. Code isn't evil, but algorithms can be if the humans behind it are.
---
RT @organizejs
This is what custom code for detecting Ugyhurs looks like--just a single line that will get your model to learn "Ugyhur features." It may look unspectacular and benign even, but code like thi…
twitter.com/organizejs/status/

What it's like to get locked out of Google indefinitely

“It's just one reason why it's so important that we fund and develop human-scale small tech as an alternative to the stranglehold of big tech on our lives." – some guy who goes on about this stuff a bit

businessinsider.com/google-use

HT @robby

Since people are shopping early this year:

- Add "No surveillance gifts" to your wish-lists
- Don't order products for others that track locations, upload biometrics or use voice-to-buy
- You probably don't "need" an Amazon Ring
- Potential IOT devices should be researched for security holes
- Teach your kids how to disable their cameras, location services and how to go into airplane mode

is a great goal.

EFF Files Amicus Brief Arguing That Law Enforcement Access to Wi-Fi Derived Location Data Violates the Fourth Amendment

eff.org/deeplinks/2020/10/eff-

Sounds like a perfect time to donate some money to the EFF.

As we've posted previously ( mastodon.social/@theprivacyfou ), we believe that owning up to the reality that we do have secrets to keep is important - and that should not make us "bad" or suspicious people.

Our passwords are secret.

Our home address, email, IP addresses are secrets we may choose to share with some.

Our web searches are secret.

Our political, spiritual and other communications and investigations are secrets.

Don't let "them" turn you into a villain.

Creepy covert camera “feature” found in popular smartwatch for kids - This popular smartwatch aimed at kids had a backdoor that received covert encrypted commands via S... nakedsecurity.sophos.com/2020/ #vulnerability #smartwatch #backdoor #android #privacy

Who is inspiring you to do great things for privacy and information security these days?

Regular reminder - Participating in social ? Consider having your mobile devices switched off, in airplane mode or leave them at home to avoid being caught in dragnet .

Keep them off on - the complete journey -before and after. If you must use your mobile, be diligent in your efforts to protect your :

- Encrypt your device
- Have it pin-locked
- Disable logons
- Disable
- Disable location services
- Know your attack surfaces

Much of what we think we "own" online like books, movies and music is actually a form of leasing from Amazon, Google, Apple, etc. These companies may mislead people to believe they own the products they pay for. They may have no idea that their viewing, reading and watching is surveilled.

Working with our members of Congress and other legislative bodies to legally define the word "Buy" and force companies to use "Lease" instead, could help people understand what is really happening.

Show older
Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!