• 0 Posts
  • 16 Comments
Joined 11 months ago
cake
Cake day: August 27th, 2023

help-circle








  • The video you posted 100% proves my point. Nothing in the video is security related, Its all privacy points. Getting attacked by scammers, phishing emails, phone calls etc are privacy threats, because you provided your main email, phone number etc where you should not/did not have to. I am saying again privacy is orders of magnitude bigger thread to a common person than an attacker spending resouces and targeting a random person. Please recognize that privacy and security are different things, people obsess with security when its a smaller threat to them.

    Non of the threats in the video would happen if people didnt share their lives, emails, phone numbers etc all online in plain sight. Non of the threats required an attacker to use a vulnerability to enter into pc/phone/network etc.

    Privacy - use email aliases for different websites, different phone numbers for 2FA, do not use social media or at least do not post all your life , real identity, email and a phone number on there etc

    Security - dont use no longer supported software, use an offline password manager, you still have no chance against 0 day vulnerabilities

    /for a good measure, i copied the link you posted and entered into piped.video, example of privacy.



  • Good info. I use e/OS on my old Samsung phone as a daily driver. I consider the phone to be a communication device, so have just couple of messenger apps there. All else is done on a PC so dont consider the security to be an issue. But its good to be aware of it. However, I think privacy is orders of magnitude bigger thread to a common person than an attacker spending resouces and targeting a random person. Sure, someone could attack me, but to get what? While google attacks privacy 24/7.






  • The thing is that today you dont even need access to the coversation when you have metadata. Imagine, a woman calls a number of center for planned parenthood, is on the phone for 20 mins. Then she calls a number of her gyno doc for couple mins. Then her phone is located at that gyno doc a week later for 2 hours or whatever it takes. Do you need to decrypt the conversation? You already know what was discussed.