💾 Archived View for midnight.pub › replies › 7972 captured on 2024-05-10 at 13:16:05. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
The hop from your device to "the network" is the most problematic, in my opinion.
Yes, I would agree. That's why I would prefer to use a service that anyone uses as the first hop.
If you want privacy, shut down your computer/phone/TV/car/camera --- anything that connects to the network or sends out radio signals.
Well, ok, but you would be back 50+ years with that. No communication.
Pen and paper, in real life meetings and the like are not ensuring complete privacy either, its just that the observation is a bit more difficult.
I have seen people that can very accurately match handwriting to a person, even if you try to write differently (ie. with your wrong hand). There are even technical means to match up Typewriters to typed pages. All has been there in the past.
Security/privacy are a very hard problem.
Yes, it is.
I have seen people that can very accurately match handwriting to a person, even if you try to write differently (ie. with your wrong hand). There are even technical means to match up Typewriters to typed pages. All has been there in the past.
Typewriters and printers can be identified very accurately. That's why the iconic Hollywood ransom note, is a collage of letters cut out from different sources. 🤣
Seriously though. I am not an expert either, but I would strongly deter anyone from doing anything that is reprehensible in their coutry, in facebook or equivalent platforms. Hiding in the crowd is not possible in electronic form, and you can be sure that popular communication platforms, will be monitored by totalitarian regimes.
You just spare them the resources they need to invest, in targeting, monitoring, and compromizing servers, running exit nodes, honneybods, and analyzing traffic to determine your IP.
Facebook already does that for them, and would not bat an eye to hand them over.
If you have legitimate concerns, you should go the tinfoil hat way, all the way.
Tails, TOR, snowflake proxies, killswitch, and public internet access, (with public monitoring cameras in mind), or go sneekernet or something.
Be safe my friend