• 0 Posts
  • 38 Comments
Joined 1 year ago
cake
Cake day: May 14th, 2024

help-circle




  • A paper-only journal would defend against the state, but not against people you live with. A digital journal can be encrypted, but an intelligence agency could potentially gain access

    A digital journal doesn’t need to be any more government-accessible than a paper journal.

    Depending on your threat model, this could require special hardware, special software, or both. In order of ease of setup, I would suggest:

    • Keep all your data on your own physical media. No cloud services, period.

    • Keep it encrypted.

    • Disable network connectivity at every level that you possibly can, such as:

      • OS level: disable wi-fi, disable blutooth, and disable networking entirely.

      • Firmware/BIOS level: If you BIOS has options to disable networking components (especially wireless ones), do that.

      • Hardware level: If your laptop has a switch to disable wi-fi, use it. If ethernet, unplug the cable. Etc.

      • Physical level: Remove any removable wireless cards or antennas.

      • Wallet level: buy a computer than never had wi-fi or bluetooth in the first place. This could mean a retro computer, or could mean using a micro-pc like some models of Raspberry Pi.


  • Neither of those can stream video in real time AFAIK. They will back up the video file on some unpredictable schedule after you’re done recording. So not ideal for a situation where your phone might be seized or destroyed.

    But if that works for you, there are lots of open-source options that work similarly. SyncThing can sync to any server, and all you’d need to do is make sure your sync destination is network-accessible somehow (VPN, internet-facing server, whatever). Lots of cloud drive apps can auto-upload photos and videos, and some of those are open-source.

    A better off-the-shelf proprietary workflow might be a Zoom call with cloud recording enabled. Then you’d be protected against a sudden (and perhaps permanent) loss of network connectivity.


  • Is it more for situations that need to be compatible with most *nix systems and you might not necessarily have access to a higher level scripting language?

    Yes, and also because integrating Python one-liners into shell pipelines is awkward in general. I’m more likely to write my entire script in Python than to use it just for text processing, and a lot of the time that’s just a pain. Python isn’t really designed for one-liners or for use as a shell. You can twist it into working in those use cases, but then I’d ask the reverse question: why would you do that when you could “just” use awk?

    On macOS, Python is not installed by default. So if you are writing scripts that you want to be portable across platforms, or for general Mac administration, using Python is a burden.

    This is also true when working with some embedded devices. IIRC I can ssh into my router and use awk (thanks to it being included in Busybox), but I’m definitely not going to install an entire Python environment there. I’m not sure there’d even be enough storage space for that.


  • Joplin is great. I have its data stored locally with encryption, and I sync across devices with Syncthing. It also has built-in support for some cloud providers like you mentioned, and since it supports local encryption, you don’t need to depend on the cloud provider’s privacy policy.

    Setting it up on multiple devices was a bit complex, but the documentation is there. Follow the steps, don’t just waltz through the setup assuming it will work intuitively. I made that mistake and while it was not the end of the world, it would’ve saved me 15 minutes if I’d just RTFM.




  • In theory, the only difference between an electric heater and your computer, as far as actual heat goes, is the dispersal pattern. They will generate exactly the same heat: 1W of heat per 1W of electricity used. That’s thermodynamics for you!

    You said:

    The flat was kept not quite as warm as previous years

    So I don’t think it makes sense to assign any of the savings to using your PC vs your usual electric heaters. It’s because you kept your place a little cooler, which makes an absolutely huge difference. When heating in winter, every additional degree of air temperature is more costly than the last, since heat loss is relative to the temperature differential between indoors and outdoors (i.e. a warmer room will lose more heat to the outdoors than a cooler room, so you need to generate more heat to maintain it).

    This sounds to me a lot like dieting. Most of the time, the success of a diet has less to do with the actual diet and more to do with the fact that dieting has made you more mindful and changed your behavior in other ways.

    The two biggest things you can do to save money on heating in winter are:

    1. Keep your place cooler. Wear warm socks, long sleeves, etc. instead.
    2. Improve insulation. Plastic window insulation kits are cheap and easy to install/remove. For doorways, you can get adhesive insulating foam to fill side gaps and a slide-on door sweep to cover any bottom gaps.

  • AnAmericanPotato@programming.devtoPrivacy@lemmy.mlDuckDuckGo Gone Rogue
    link
    fedilink
    English
    arrow-up
    41
    arrow-down
    2
    ·
    3 months ago

    Defaults matter. Every time you open a private browsing window, that’s what you’re going to get. Every time you use LibreWolf or Firefox Focus or any other browser that disables/clears cookies by default (which is a good practice), that’s what you’re going to get.

    I don’t want anything I search for going into OpenAI. Ever. I’d feel fine about this if they hosted their own models.



  • Apple has three realistic options:

    1. Submit to the UK’s demands and grant them a backdoor to encrypted backups.
    2. Disable encrypted backups in the UK.
    3. Leave the UK market entirely.

    They went with #2, which is probably the least user-hostile option available.

    From 1500GMT on Friday, any Apple user in the UK attempting to turn it on has been met with an error message.

    Existing users’ access will be disabled at a later date.

    I am very interested in seeing what the UX around this will be. Ideally, they should give users direct notice well in advance, so they have time to plan a migration or mitigation. Of course, Apple makes it basically impossible to perform a full backup through any mechanism except iCloud, so…one more example of how vendor lock-in is inherently a security and privacy risk.


  • I’m not (currently) in a position where others would find it desirable to do so. Potentially in the future?

    It’s hard to imagine a scenario where this would happen and your voice would not otherwise be available. For example, if you went into politics, then you’d be a target, but you’d already be speaking in public all the time. It only takes a few seconds of a voice sample to do this nowadays and it’ll only get easier from here.

    Maybe just make a point to educate your family and friends on the risk of voice cloning so they don’t fall for phone scams.



  • AnAmericanPotato@programming.devtoPrivacy@lemmy.ml[Deleted]
    link
    fedilink
    English
    arrow-up
    7
    ·
    4 months ago

    Another issue with Google Play is that there’s nothing stopping the developer from pushing out an update that doesn’t match the published source. It isn’t tied to GitHub or anything.

    Developers with apps on Google Play are frequently targeted with buyout requests from scammers looking to get malware to an existing user base. Or even if it’s not explicitly malware, it could be closed-source.

    For example, the “Simple Mobile Tools” app developer sold their apps a year or two ago. Now they have ads, in-app purchases, and god knows what else. If you had installed them from Google Play, you would have received these updates automatically. Those new versions don’t exist on f-droid, naturally. Anyone who was using them should really uninstall them and install the “Fossify” forks from f-droid.

    Every developer ID publishing on Google Play is potentially for sale. There are no real safeguards against this, and you might never know. At least with F-Droid it’s verified as open source and malicious (or just plain crappy) updates can be identified and dealt with, either by f-droid maintainers or by end users.