this post was submitted on 30 Mar 2021
16 points (94.4% liked)

Privacy

39627 readers
231 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I don't really use them, lately I thought if I want my voice/influence to be heard on a wider audience, I need to join the corporate social media platforms first.

my strategy is to slowly convert my followers to follow me on pleroma/mastodon by telling them if they want to see more/relevant posts, go to my fediverse account.

Instagram isn't necessary but twitter and youtube is. I haven't found a way to make an account privately. does anyone have any ideas? it would be really helpful

so the things I need

  • a vpn for twitter since it doesn't work on tor
  • a phone number

edit; I tried 1984 and it asked for personal info for the domain. use njal.la instead.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 4 years ago (1 children)

It might be virtually impossible to create a private google account on any device which you use for browsing the web, as they have a million ways of fingerprinting via things like invisible captcha, but knowing they know who you are doesn’t necessarily detract from having privacy from other people and organisations.

[–] [email protected] 1 points 4 years ago (1 children)

so, using TOR and a my own hosted vpn wouldn't work you say?

[–] [email protected] 1 points 4 years ago

In terms of using Tor to mask your identity from global surveillance companies “god eyes” (I include Alphabet in that category) I’m skeptical, especially when dealing in large files like video.

Tor's weakness to traffic analysis attacks is well-known. The original design documents highlight the system's vulnerability to a "global passive adversary" that can see all the traffic both entering and leaving the Tor network. Such an adversary could correlate that traffic and de-anonymise every user.

https://arstechnica.com/information-technology/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/

https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html

But for one off projects they might not bother due to cost.