Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

What do they do if I send: AFBC67CEDA7AD?

Ban all “non-intelligible” content?

Who can stop me from hiding information in very normal looking sentences?

If you want privacy, there will always be a way.



sort by: page size:

While your device will rotate privacy addresses within a /64, online service operators can ban your /64.

Well, there's steganography.

And as I said, I'd just avoid services that were vulnerable to coercion.

If it gets to the point that all ISPs block anything that's encrypted, then most everyone will be screwed. However, that'd be hard to implement without creating opportunities for private pwnage.

And as a deep backup, there's always encryption via covert channels. You can only hide maybe 0.1%-1% of throughput, but that's enough for text hidden in video or whatever.

And re banning, I can create as many new personas as I need.


You don't.

We have your infos. FOREVER~.

Which we shall use as blackmail if you ever decide to do anything funny.

Like leave.

We are watching you.


Usually nothing, I only block third party cookies and write under a pseudonyms.

But I'm always conscious on the implication of what I do on internet so if needed I know how to use appropriate tools for protect my privacy.


> Use PGP and Tor if you want true privacy.

Don't use email for starters, really.


You should not be transmitting sensitive information to the internet.

Hm, please don't give unpublished/unaudited circumvention software to people in censored regimes -- you could get them in a lot of trouble by promising privacy that you aren't actually giving them.

By using either you disclose your network of friends, location, the content of your communication, and -- if you didn't take steps to counter it, essentially the majority of web pages you visit.

All voluntarily. Stasi would be jealous.


Refuse to give personal information and carry minimal personal information in devices and websites outside of one's control.

If they don't have it, it cannot leak.


ah yes. unless they are actively listening in am i not safe enough as compared to DPI censorship and network analyzers mandated by the said oppressive government?

So, basically three things to notice:

1. never click on links in e-mails. 2. if you're targeted by a nation state, you're screwed. 3. everybody is vulnerable to rubber-hose cryptography.


There are some python scripts that will go through and scrub your contents. Not that it really matters, all the big guys backup reddit everyday for future reference, you're just probably protecting yourself from low level doxers and not state actors. Then again state actors can always go down to the hardware store and buy a $5 dollar wrench or rubber hose and beat it out of you

Exactly! It pretty much ensures I can't use this for any confidential work for any clients.

Too late to edit but I should point out that this also handily prevents governments or ISPs from viewing your queries, or anyone else for that matter. Except in cases of MITM attacks obviously.

I'm not going to tell you how to live your life, but isn't that intentionally violating security policy and likely to end poorly? I suppose if we ignore ethical questions it might come down to hoping that IT departments that block stuff are also incapable of catching you, but that seems... riskier than I'd like.

It doesn't really matter if you're "interesting" or not. They're using keyword filters anyway, so if you don't encrypt your stuff, and say something that they consider suspicious, you'll probably show up in their alert system anyway. Welcome to the surveillance state and self-censorship. I'd say it's worse to not have your data encrypted.

What I'm saying is that people who have something to hide will find a way.

You can't ban math.

Google and Microsoft made a solution that scans user files for illegal stuff, but it can be easily defeated by simply uploading a password protected archive.


  how is that going to protect the US? [...] perpetrators
  will not transport any digital devices with incriminating
  data.
Options include:

1. Bad guys with imperfect opsec (I see in your unallocated space there's a deleted TAILS ISO... onto a watchlist with you!)

2. Friends and relatives of bad guys (I see your nephew e-mailed you holiday photos from cybercafes near two different suspected terrorist training camps... onto a watchlist with him!) a bit like social media companies' 'shadow profiles'

3. Non-terrorist targets, like good old corporate espionage and political blackmail (Oh, you're a journalist/oil industry exec/prostitute? Let me just take a copy of your contacts, records and reports)


Probably more evil than the practice described in the article is at the very end. In order to get them to stop, or not start in the first place, you have to give them your email address. So you have to trust them with the very thing you want them to stop abusing. No thanks. The real answer is a very strict ad blocker. On all your devices. Every time you browse.

The only way to keep your personal information safe is to not share it in the first place. Pass all the laws you want and require all the layers of security you can imagine but your data is still not safe; it will eventually get leaked. Either through the actions of hackers, intentional or unintentional leaks, security bugs, or utter incompetence of some human that has legal access to it.

next

Legal | privacy