Digital Privacy

110 readers
1 users here now

With corporations like Google, Facebook, Discord, etc. taking over more and more of people's lives, the issue of digital privacy is becoming more and more relevant.

This is a community for anything related to digital privacy. From discussing the violation of digital privacy, to discussing technical details of solutions to digital privacy issues.

founded 2 years ago
MODERATORS
1
1
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 
 

Since most people don't have the resources or knowledge to host their own servers, this post will provide recommendations for increasing digital privacy without self-hosting. If anyone can think of something to add, please comment and I will edit the post.


Alternatives to big tech services

This section will list alternatives to common big tech software that steals your data.

  • Discord: Matrix; Easy to use clients: Nheko, Element
  • Github: Codeberg
  • Twitter: Mastodon
  • YouTube: LBRY; Easy to use clients: LBRY Desktop, Odysee
  • Google Search: SearX/SearXNG; List of public instances: https://searx.space/
  • Windows: Any Linux distribution. Seriously, don't use Windows. Linux isn't as hard as people say it is. My parents and grandparents use it.
  • Google Chrome: Firefox. Do not use Chrome, it is one of the worst things that exists for privacy. Chromium (the open-source version of Chrome) is a little better but I still wouldn't use it.

Suggestions for privacy-respecting hardware

Suggestions for privacy-respecting software

  • TOR: Encrypts your traffic in three layers, then routes across a randomized network of nodes, providing very high security and privacy, and making it near impossible to track your activities.
  • Mullvad VPN: VPN that allows you to make an account without providing any details, and pay in cash or crypto (or just with a card) to ensure your identity cannot be found out since it's not even known by Mullvad.
  • LibreWolf: Browser focused on privacy and security. May break some sites, especially streaming sites like Netflix, Hulu, etc. Broken sites can be fixed by changing settings at the expense of some privacy if required.
2
 
 

We're happy to announce that BusKill is presenting at DEF CON 32.

What: Open Hardware Design for BusKill Cord
When: 2024-08-10 12:00 - 13:45
Where: W303 – Third Floor – LVCC West Hall

BusKill goes to DEF CON 32 (Engage)
BusKill is presenting at DEF CON 32

via @[email protected]

What is BusKill?

BusKill is a laptop kill-cord. It's a USB cable with a magnetic breakaway that you attach to your body and connect to your computer.

What is BusKill? (Explainer Video)
Watch the BusKill Explainer Video for more info youtube.com/v/qPwyoD_cQR4

If the connection between you to your computer is severed, then your device will lock, shutdown, or shred its encryption keys -- thus keeping your encrypted data safe from thieves that steal your device.

What is DEF CON?

DEF CON is a yearly hacker conference in Las Vegas, USA.

DEF CON Documentary
Watch the DEF CON Documentary for more info youtube.com/watch?v=3ctQOmjQyYg

What is BusKill presenting at DEF CON?

I (goldfishlaser) will be presenting Open Hardware Design for BusKill Cord in a Demo Lab at DEF CON 32.

What: Open Hardware Design for BusKill Cord
When: Sat Aug 10 12PM – 1:45PM
Where: W303 – Third Floor – LVCC West Hall

Who: Melanie Allen (goldfishlaser) More info

Talk Description

BusKill is a Dead Man Switch triggered when a magnetic breakaway is tripped, severing a USB connection. I’ve written OpenSCAD code that creates a 3D printable file for plastic parts needed to create the magnetic breakaway. Should anyone need to adjust this design for variations of components, the code is parameterized allowing for easy customization. To assemble a BusKill Dead Man Switch cord you will need:

  1. a usb-a extension cord,
  2. a usb hard drive capable of being attached to a carabiner,
  3. a carabiner,
  4. the plastic pieces in this file,
  5. a usb female port,
  6. a usb male,
  7. 4 magnets,
  8. 4 pogo pins,
  9. 4 pogo receptors,
  10. wire,
  11. 8 screws,
  12. and BusKill software.
Image of the Golden BusKill decoupler with the case off
Golden DIY BusKill Print

Full BOM, glossary, and assembly instructions are included in the github repository. The room holds approx. 70 attendees seated. I’ll be delivering 3 x 30 min presentations – with some tailoring to what sort of audience I get each time.

Meet Me @ DEF CON

If you'd like to find me and chat, I'm also planning to attend:

  • ATL Meetup (DCG Atlanta Friday: 16:00 – 19:00 | 236),
  • Hacker Kareoke (Friday and Sat 20:00-21:00 | 222),
  • Goth Night (Friday: 21:00 – 02:00 | 322-324),
  • QueerCon Mixer (Saturday: 16:00-18:00 | Chillout 2),
  • EFF Trivia (Saturday: 17:30-21:30 | 307-308), and
  • Jack Rysider’s Masquerade (Saturday: 21:00 – 01:00 | 325-327)

I hope to print many fun trinkets for my new friends, including some BusKill keychains.

Image shows a collection of 3D-printed bottle openers and whistles that say "BusKill"
Come to my presentation @ DEF CON for some free BusKill swag

By attending DEF CON, I hope to make connections and find collaborators. I hope during the demo labs to find people who will bring fresh ideas to the project to make it more effective.

3
1
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]
 
 

My needs are simple:

  • not a libshit hellhole
  • federates with other cool instances and mastodon.social cuz that's the biggest one
4
 
 

There is no apt tech sub on Lemmygrad, and this issue is an annoyance to many right now, I believe, especially during downtime.

5
 
 

Written by yours truly, enjoy. Education is also important for your computing life.

6
 
 

I've recently downloaded mullvad. I heard it's popular in the piracy community. 5 dollars a month is not bad. Currently saving for a good antivirus. What are your favorites?

7
 
 

Now that I have started this community off with a non-technical post, I will share my own, personal solution to digital privacy. This post will be more technical.

I self-host every service I possibly can from a cluster of servers (mostly low-power ARM SBCs) that are in my room. Until recently, I was just manually throwing services onto servers and then manually configuring everything. As I've mentioned before in a GenZedong General Discussion Thread, I am now using an orchestrator called Nomad as well as a service discovery solution called Consul.

This allows me to submit a single configuration file, and my servers all automatically configure themselves to perform whatever task I wanted them to. I've placed all my configuration files along with relatively detailed READMEs about them into this repository if anyone wants to take a look at them: https://gitea.arsenm.dev/Arsen6331/nomad.

Due to using SBCs, I am able to do all of this with a power consumption of just 50W.

Here is a list of things I host and what they're meant to replace:

There are more but they're not really alternatives to anything, I'll list them here:

  • Authelia: Provides authentication and 2fa for services that don't provide their own mechanism. Can also work similarly to "Sign in with Google" buttons via OAuth2 and OIDC.
  • Traefik: Reverse proxy that provides access to all the rest
  • Homer: Provides a dashboard for all my services. My instance can be found at: https://dashboard.arsenm.dev