nothing more to add

  • stupid_asshole69 [none/use name]@hexbear.net
    link
    fedilink
    English
    arrow-up
    3
    ·
    6 hours ago

    There’s a lot of funny responses in this thread. What you change in your life depends on what you do now and how you expect to be targeted.

    If you’re a normal person, my advice is always to speak less and recognize your surroundings. Recognize that the internet is a social media advertising platform.

    • VibeCoder [they/them]@hexbear.net
      link
      fedilink
      English
      arrow-up
      13
      ·
      edit-2
      1 day ago

      The basic idea is to identify what you’re trying to protect, what threats exist or may exist, and outline possible protections against those threats, as well as the tradeoffs of those protections. So for example, someone who doesn’t do any praxis and browses Hexbear all day (not trying to call anyone out) doesn’t need to be running Edward Snowden levels of opsec and privacy software, but they should almost certainly get a cheap VPN and be regularly cycling accounts.

    • space_comrade [he/him]@hexbear.net
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      1 day ago

      What this basically means is that it’s a set of assumptions about how powerful and skilled your potential adversaries are in ways to compromise you and your data, and then you list all those avenues of attack and try to safeguard your privacy and devices against each of those.

      For example let’s take the CIA as an adversary, on one extreme you could assume they have incredible sci-fi quantum whatever technology where they can breach any system arbitrarily and completely, or on the other extreme you could assume they’re entirely incompetent and can barely turn on the computer, leaving you to do whatever you want online. Obviously neither of those extremes are true, the truth is somewhere in the middle but getting closer to the truth unfortunately requires a lot of technical knowledge and experience.

      I’m not extremely knowledgeable myself but I think you can go a long way with just the basics like getting a good VPN (make sure your payment is anonymous tho, I personally use Mullvad) and not posting any personally identifiable details online.

  • yarr@feddit.nl
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 day ago

    Post your passwords here so we can weigh in on how secure they are and provide recommendations for better ones if needed.

  • Dimmer06 [he/him,comrade/them]@hexbear.net
    link
    fedilink
    English
    arrow-up
    13
    ·
    edit-2
    1 day ago

    If you’re going to do the revolution or anything remotely illegal don’t discuss it on or even near a computer, phone, or any device that can send or received telecommunication signals.

  • SamotsvetyVIA [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 day ago

    who are you protecting against and what are you protecting. eg. 1) your phone comms - read about the hacks and backdoors in ios and android phones (especially those published by kaspersky) etc. then decide on how to mitigate it. tossing the phone altogether if the threat is the state or something. 2) posting publicly - identity construction, typing analysis blah blah

  • SwitchyandWitchy [she/her]@hexbear.net
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 days ago

    Lie frequently and realistically about pretty much any personal details about yourself. Once somebody knows enough details about you pretty much no matter how small, they or someone else listening in will be able to figure out your identity.