6
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 25 Apr 2025
6 points (100.0% liked)
GenZedong
4551 readers
110 users here now
This is a Dengist community in favor of Bashar al-Assad with no information that can lead to the arrest of Hillary Clinton, our fellow liberal and queen. This community is not ironic. We are Marxists-Leninists.
This community is for posts about Marxism and geopolitics (including shitposts to some extent). Serious posts can be posted here or in /c/GenZhou. Reactionary or ultra-leftist cringe posts belong in /c/shitreactionariessay or /c/shitultrassay respectively.
We have a Matrix homeserver and a Matrix space. See this thread for more information. If you believe the server may be down, check the status on status.elara.ws.
Rules:
- No bigotry, anti-communism, pro-imperialism or ultra-leftism (anti-AES)
- We support indigenous liberation as the primary contradiction in settler colonies like the US, Canada, Australia, New Zealand and Israel
- If you post an archived link (excluding archive.org), include the URL of the original article as well
- Unless it's an obvious shitpost, include relevant sources
- For articles behind paywalls, try to include the text in the post
- Mark all posts containing NSFW images as NSFW (including things like Nazi imagery)
founded 4 years ago
MODERATORS
Thanks, and yeah, emails are the worst part of security, I can already tell, and probably a real weakness or even potential Achilles' heel of one's privacy. I mean, you can't really survive without them, not at first, and everyone has one and has to use one for their jobs. Really big problem, arguably a systematic and even cultural one.
Also, what is GPG (probably a dumb question)?
And yeah, in-person convos were used in the 2000s for the CPUSA; some people would literally go into the forest or some private area to talk, or that's one story I once heard.
Also, regarding numbers, I see the terms "2FA" and "VOIP provider" and apps like "open source authenticator" and "yubikey." I will keep them in mind...
Ultimately, I don't expect things to be 100% air-tight; the point is to make it more difficult, difficult enough for them not to bother, so that they will "glance over" you, and then move on to more high-profile individuals or groups.
Yeah email sucks, I don't use it for anything requiring infosec.
GPG is an open source encryption package, you can use it to sign / encrypt your emails and allow others to verify/decode them so long as they have a certain kind of one of your keys.
Going into a forest to talk is legit. It leaves only one source of infosec risk: the people attending not being careful afterwards. As good as it gets! Of course this is not needed for fairly safe things unless your country is at risk of a harsh crackdown.
2FA = 2 factor authentication. Like when sites make you put in a number texted to you after you provided your password. There are key-bases options that are more secure and offer a way to not use a phone number. An authenticator app can also work, after verifying it you pit in numbers as if they were texted to you but they come from an app. A physical device like a yubikey acts basically the same way but you actually plug it into yout phone or computer and it cryptographically verifies that it is the one you registered with the website.
VOIP = voice over IP, a service for digitally calling people on the normal phone network.
For infosec you always want a threat model. IMO the first threat is fascists and other creeps, i.e. don't get doxxed. Using a totally separate account for something and not sharing personal info does this. The next is corporate-government spying which can amount to the same thing at first, as in, "oops we leaked all the names of pro-Palestinian organizers reom this Google Doc". If the state turns even more internally fascistic they might even target all socialists, in which case you want a minimized digital footprint to decrease th3 chances of getting caught in their net - which is sure to be an incompetent process on the state's part.
Following the strats I've laid out would protect you from all 3 but are a bit of work.
And of course, once targeted by the state, they will have little trouble tracking people down digitally. The third case is just for minimizing the chance if being targeted. We should all have real escape plans if things start moving fast.
Thanks for the rundown, comrade.