- 0 Posts
- 36 Comments
I still use Reddit but I prefer lemmy
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•Musk may have violated FTC privacy order, new court filing showsEnglish1·2 years agoJeez not wiping the server
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•If you work remotely, your bosses are probably using software to track you. Here's how they'll catch you slacking off.English1·2 years agoMfw you think mass surveillance is so scary
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•If you work remotely, your bosses are probably using software to track you. Here's how they'll catch you slacking off.English2·2 years agoIt seems like they collect the data from big tech and not directly from the users.
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•If you work remotely, your bosses are probably using software to track you. Here's how they'll catch you slacking off.English1·2 years agoDepends what mean by owning a gun but some people are so insecure about their personal safety that they probably want one
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•If you work remotely, your bosses are probably using software to track you. Here's how they'll catch you slacking off.English1·2 years agoIdk but it’s a work computer I suppose
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•How an Encrypted Hard-drive WorksEnglish2·2 years agoOne thing it should note that most Linux distros does not encrypt the boot volume
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•What are the recommend changes to make iPhone more private?English1·2 years agoI suppose it’s easier to access the cloud storage than the phone given how secure the iPhone is and with lockdown mode, it’s even harder.
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•What are the recommend changes to make iPhone more private?English1·2 years agoYou know some people like to hack real people’s phone for fun
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•What are the recommend changes to make iPhone more private?English1·2 years agoYes Apple has their iCloud key, if you live in China, the key is controlled by the Ccp, potentially dangerous for abuse from lea, highly recommend not to use Apple devices if you live there. The other problem is if they same set of keys for global users that it is possible to crack encryption for global users using the same keys, hence compromising security if one day Ccp want to access to the files of some American’s phone through iCloud.
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•Threads' New Terms and Conditions Affects the FediverseEnglish2·2 years agoThe thing they could do is block the servers of Meta or route to tor for anything sent to meta.
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•Do eSIMs have any downsides from a privacy standpoint?English3·2 years agoThe only thing it improves is data security which can in some extent resist against identity theft, financial fraud, etc. Does having an eSIM card improve my data security?
Yes, there are significant security benefits. An eSIM card cannot be stolen without stealing the phone, whereas removable SIM cards are sometimes stolen, and used in port out scams. That’s when identity thieves fraudulently swap stolen SIM cards into different phones to gain access to the victim’s calls and text messages. The thieves may then try to reset credentials and gain access to the victim’s financial and social media accounts.
For more information about SIM swapping, port out scams, cell phone cloning and subscriber fraud, see our consumer guide on cell phone fraud. https://www.fcc.gov/consumers/guides/esim-cards-faq
Laitinlok@discuss.tchncs.deto Technology@lemmy.world•iFixit tears down a McDonald’s ice cream machine, demands DMCA exemption for itEnglish5·2 years agoUsing the hash of my artwork as my password for encryption lmfao
Laitinlok@discuss.tchncs.deto World News@beehaw.org•China's Xi urges more work to ‘control illegal religious activities’ in Xinjiang on surprise visit14·2 years agoReeducation or brain washing
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•New PoW protocol implementation for onion servicesEnglish1·2 years agoDoes this PoW deannonymise tor.
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•What are the best zoom alternatives?English1·2 years agoTutanota first use the user password to generate an AES key using BCrypt, that AES key is then used to encrypt the private key. The encrypted private key and hashed AES key is then sent to the server, hence the server does not store nor know the private key and the hashed AES key is used to authenticate the user. It uses SHA256 for hashing, it’s safe because the hashing algorithm is one way only and not reversible, meaning you can’t convert the hash to the password but only the other way around the password can generate the hash, so even the server is compromised it doesn’t gain access to your password.
Laitinlok@discuss.tchncs.deto Privacy Guides@lemmy.one•What are the best zoom alternatives?English2·2 years agoProton Mail uses PGP which depends on which cipher both recipient and sender, sharing PGP keys are also problematic. PGP doesn’t encrypt subject line but Tutanota does. Tutanota uses AES-128 and RSA-2048 for their encryption and uses AES-128 for external encrypted email which Tutanota and Proton Mail also supports.
Good