privacy

9343 readers
1 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 3 years ago
MODERATORS
1
2
3
1
submitted 2 days ago* (last edited 2 days ago) by who@feddit.org to c/privacy@lemmy.ca
4
 
 

Friends,

We're happy to announce that we have funding available to package BusKill in QubesOS as a contrib package.

Bounty Now Available for BusKill Contrib Package in QubesOS

Thanks to a generous donation from NovaCustom, we're offering a bounty to anyone (including you!) who packages BusKill as an official contrib package for QubesOS.

About BusKill

BusKill is a laptop kill-cord. It's a USB cable with a magnetic breakaway that you attach to your body and connect to your computer.

What is BusKill? (Explainer Video)
Watch the BusKill Explainer Video for more info youtube.com/v/qPwyoD_cQR4

If the connection between you to your computer is severed, then your device will lock, shutdown, or shred its encryption keys


thus keeping your encrypted data safe from thieves that steal your device.

About NovaCustom

In Mar 2015, Wessel klein Snakenborg (founder of NovaCustom) started selling highly-customizable Linux laptops from Europe.

In Aug 2021, NovaCustom released their first laptop (NV40) with coreboot pre-installed with Dasharo.

Photo of a screw that's been covered with a unique pattern of (multi-color) glitter nail polish
NovaCustom offers anti-tamper options, including glitter nail polish applied to the chassis screws (photos sent to you via Proton Mail before shipment — specify PGP key at checkout for e2ee)

Since 2023, NovaCustom has been a leader in hardware security:

And now, in Apr 2026, NovaCustom is further working to increase the accessibility of BusKill to QubesOS users, by sponsoring the submission of an official QubesOS contrib package.

Funding Available

If you'd like to claim this bounty for yourself, please

  1. Read the details of the bounty, and then
  2. Submit a proposal by commenting on this GitHub issue

Claim Bounty

opencollective.com/buskill/projects/qubes-package

Moreover, if you're a QubesOS user and you'd like to donate additional funds in support of this bounty, you can do so here.

Stay safe,

The BusKill Team
https://www.buskill.in/
http://www.buskillvampfih2iucxhit3qp36i2zzql3u6pmkeafvlxs3tlmot5yad.onion/

5
6
7
8
9
 
 

cross-posted from: https://lemmy.ca/post/62594213

Denial Takes Hold as Teens Circumvent Australian Age Verification

The failure of the Australian age verification laws has left advocates with the only tool left in the chest: denial.

10
 
 

cross-posted from: https://lemmy.ca/post/62278765

Software changes for compliance with age-verification laws are being pushed a bit everywhere in Linux-development; for example:

It's interesting that it's the same small group of people behind these pull requests, and that discussion threads in them have been locked owing to a great amount of negative criticisms.

They say "we have to comply with the law". Which also means that if "the law" in the future will require proper verification, handling to 3rd-parties, or whatnot, then they will comply.

Well, it's their right to. They don't owe anything to anyone, and are under no obligation to report to users or to the community, nor to pay heed to anybody's wishes.

If things proceed in this direction, we users may at some point have to choose between privacy-friendly Linux distributions or legal Linux distributions. People who, like me, are worried, need to start thinking about concrete actions to take before it's too late: where to develop such distros? which channels to download and distribute them from? And so on. (And of course, more generally we need to write and protest to politicians, organize protest marches, go on strike, refuse to comply...)

It's good to remind to those who keep on repeating the words "legal" and "illegal" that for example Nelson Mandela was, technically speaking, a criminal who did and promoted illegal activity. This happens when laws become immoral.

11
 
 

cross-posted from: https://mander.xyz/post/49367302

Hong Kong police can now demand phone or computer passwords from those who are suspected of breaching the wide-ranging National Security Law (NSL).

Those who refuse could face up to a year in jail and a fine of up to HK$100,000 ($12,700; £9,600), and individuals who provide "false or misleading information" could face up to three years in jail.

It comes as part of new amendments to a bylaw under the NSL that the government gazetted on Monday.

The NSL was introduced in Hong Kong in 2020, in wake of massive pro-democracy protests the year before. Authorities say the laws, which target acts like terrorism and secession, are necessary for stability - but critics say they are tools to quash dissent.

The new amendments also give customs officials the power to seize items that they deem to "have seditious intention".

Monday's amendments ensure that "activities endangering national security can be effectively prevented, suppressed and punished, and at the same time the lawful rights and interests of individuals and organisations are adequately protected", Hong Kong authorities said on Monday.

...

The city has seen the arrests of hundreds of protesters, activists and former opposition lawmakers since the introduction of the NSL.

...

12
 
 

Bernie has a conversation about AI with an AI agent, Claud. Found it informative and fascinating, especially for someone who knows little about AI.

13
 
 

I saw Wire get mentioned a bit, and now I'm curious.

14
 
 
15
16
 
 

Disclaimer: This is not technically a privacy matter for the reader, but I believe it is adjacent and important enough for this community.

Around January 11, 2026, archive.today (aka archive.is, archive.md, etc) started using its users as proxies to conduct a distributed denial of service (DDOS) attack against Gyrovague, my personal blog. All users encountering archive.today's CAPTCHA page currently load and execute the following Javascript: setInterval(function() { fetch("https://gyrovague.com/?s" + Math.random().toString(36).substring(2, 3 + Math.random() * 8), { referrerPolicy: "no-referrer",…

Far too many netizens still try to ignore this or even come up with reasons why gyrovague is the bad guy here.

Alternative archive pages:

archive.org
ghostarchive.org
archivebox.io (self-hosted)

But how else to bypass a paywall?

I've read relevant articles and clicked old links - they all seem to be history. The only ones that still work just look for the article in various archives - the subject of this post always amongst them. The same applies to this article, but there's still some good tips.

Here is the original article from 2023: https://gyrovague.com/2023/08/05/archive-today-on-the-trail-of-the-mysterious-guerrilla-archivist-of-the-internet/ and what Patakallio has to say about it today:

The post mentions three names/aliases linked to the site, but all of them had been dug up by previous sleuths and the blog post also concludes that they are all most likely aliases, so as far as “doxxing” goes, this wasn’t terribly effective.

Here is a relevant ArsTechnica article: https://arstechnica.com/tech-policy/2026/02/wikipedia-bans-archive-today-after-site-executed-ddos-and-altered-web-captures/

Wikipedia editors discovered that the archive site altered snapshots of webpages to insert the name of the blogger who was targeted by the DDoS.

archive.today (.ph, .is, .md, .fo, .li, .vn) also loads a pixel and javascript from mail.ru. The script mentions lamoda.ru, kommersant.ru, dzen.ru, ad.mail.ru, vk.com, vkontakte.ru, ok.ru, odnoklasseniki.ru. I haven't researched this further, but I think one can assume that your IP address will be spread across all relevant Russian websites. 10 years ago I would have said "so what? The Russians have social media too" but today you can safely assume that all this data is available to the government itself and is actively contributing to the hybrid war.

All in all, archive.today has always been in the "too good to be true" category. Call me suspicious.

And once again because it's important:

The Wikipedia guidance points out that the Internet Archive and its website, Archive.org, are “uninvolved with and entirely separate from archive.today.”

17
 
 
18
 
 

Youtube automatically adds a tracking code called an SI to most links generated through their app and webpage. It's a unique identifier used to track video sharers. If Alice shares a video with her SI in it and Bob clicks the link, Bob's browser will send Alice's SI to youtube, and now Google knows that Alice and Bob are friends. It's a way of spying on people's interactions outside of youtube. You can install browser extensions and alternate apps that strip away your SI, to prevent Google from spying on you.

So I'm wondering if we can use SIs to hack the youtube algorithm. For example, let's say we took note of a left wing youtuber's SI, someone nice like hbomberguy, and a million people installed a browser extension that adds hmbomberguy's si to all their youtube links. And then they just go along sharing links as normal. Would the algorithm notice that tons of people are looking at videos seemingly shared by hbomberguy, and boost his videos? Or is there anything else we could do with SIs to manipulate Google's analytics in a way that spoils their data and achieves some useful and prosocial end we believe in?

19
20
 
 

Content warning: speculation and discussion about dystopianism, US fascism, mass surveillanceAfter ICE murdered Alex Pretti, it became known that he'd had a run in with ICE a week earlier, which was documented as he went to the ER for a broken rib courtesy of ICE. Knowing the prior interaction, the question arose as to how spontaneous the killing of Alex Pretti was. Was a decision to capture or kill him issued, on the day of his murder, as soon as he was recognized by the surveillance apparatus, before any ICE agent interacted with him?

Based on what this article about 2020 Russian technology used in Iran suggests, I'm more convinced the killing of Alex Pretti was more pre-meditated. My fears of facial recognition in general are pretty piqued after reading this

21
 
 

It's important to be clear that this is not the same company that made the Motorola brand famous.

"Motorola Mobility is a wholly owned subsidiary of the Hong Kong based Chinese technology giant Lenovo"

22
23
 
 
24
 
 

TL;DR: Mozilla recently released AI controls for Firefox — a single control panel that lets people disable AI features in the browser or pick and choose which to leave on. On the surface, this sounds like a win for user choice in an era of AI-everything.

25
 
 

I use X, Instagram, and Pinterest for thirst content. Sadly, the former two are unsafe (unsure about Pinterest but it is American and not FOSS so I’d assume the same).

I’d really like to shift off these platforms, but I’m having trouble finding anything with a reliable search and algo that isn’t a dry well.

view more: next ›