10
submitted 3 months ago by Saki@monero.town to c/privacy@monero.town

“It is completely absurd to inflict mass surveillance on the general public under the premise of fighting theft.”

It comes at a cost to the privacy and civil liberties of the people of Britain.

24
submitted 7 months ago* (last edited 7 months ago) by Saki@monero.town to c/privacy@monero.town

The right time to start protecting your digital privacy is before your trip […] The simplest and most reliable precaution against border searches is to reduce the amount of information that you carry across the border.

image


Sometimes law enforcement officials achieve so-called “consent” by being vague […] You can try to dispel this ambiguity by inquiring whether border agents are asking you or ordering you […] If an agent says it is a request only, you might politely but firmly decline to comply with the request.

If you are a U.S. citizen, border agents cannot stop you from entering the country, even if you refuse to unlock your device, provide your device password, or disclose your social media information. However, agents may escalate the encounter if you refuse.

If you elect to comply with a border agent’s order to unlock your device, provide your password, or disclose your social media information, you can inform the agent that you are complying under protest and that you do not consent.


It is possible that if you unlock your device, and agents then search your device, a court will rule that you consented to the search. […] As noted in Part 1, the best way to avoid an inadvertent “consent” to search is to decline to unlock your device, provide the device password, or provide any social media information.

Technically, you don’t even need to admit that you know the password.

If you believe that border agents violated your digital rights at the border, please contact EFF at borders@eff.org.


See also:

17
submitted 7 months ago by Saki@monero.town to c/privacy@monero.town

The fact that the issue was discovered by Google TAG suggests it was exploited by a nation-state actor or by a surveillance firm.

As usual, Google did not publish details about the attacks exploiting the flaw in the wild.

See also: https://www.cert.europa.eu/publications/security-advisories/2023-100/

This vulnerability also affects Chromium-based web browser such as Microsoft Edge [3], Brave, Opera, and Vivaldi.

6
submitted 8 months ago by Saki@monero.town to c/monero@monero.town

“Some Hackers have figured out there is no quick and easy way for a company that receives one of these EDRs (emergency data request) to know whether it is legitimate,” he said.

“The hackers will send a fake emergency data request along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.”

17
submitted 8 months ago* (last edited 7 months ago) by Saki@monero.town to c/privacy@monero.town

privacy has nothing to do with having something to hide. Instead, privacy means protecting the human being that you are, all the personal details that make you, you. What you care about, what you love, what you hate, what you are curious about, what makes you laugh, what you fear. And most importantly, choosing when you decide to share that information and who you share it with.

it is possible to build technology used by millions of people with privacy at the heart. We build technology to advance that right in order to help users reclaim their agency in digital spaces.

(But by default, Tor Browser is not shipped with uBlock Origin.)

PS: ONION LINK http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/tor-in-2023/index.html

72
submitted 8 months ago by Saki@monero.town to c/privacy@monero.town

NOTE: This is about the Fifth Amendment protection against self-incrimination after a search warrant for someone’s cell phone is procured; not about digital privacy in general at the U.S. Border (a warrantless search).

See also: https://monero.town/post/1134494 EFF to Supreme Court: Fifth Amendment Protects People from Being Forced to Enter or Hand Over Cell Phone Passcodes to the Police

6
submitted 8 months ago* (last edited 8 months ago) by Saki@monero.town to c/privacy@monero.town

Now before the House, HR 6570 proposes to reauthorize Section 702 for three years — but with reforms including requiring all US intelligence agencies to obtain a warrant before conducting a US person query.

a competing bill, the FISA Reform and Reauthorization Act of 2023 (HR 6611), doesn't include a warrant requirement — and, in fact, includes language that many worry could be used to force private US companies into assisting in government-directed surveillance

13
submitted 8 months ago by Saki@monero.town to c/privacy@monero.town

House Intelligence Committee bill would also expand the definition of an electronic communication service provider include a broader range of providers, including those who “provide hardware through which people communicate on the Internet.”

See also: Tell Congress: They Must Defeat HPSCI’s Horrific Surveillance Bill | EFF Action Center

4
submitted 8 months ago by Saki@monero.town to c/monero@monero.town

How FinCEN May Be Violating Your Rights
A call to action against FINCEN proposal 2023-0016A
Written By Preston Pysh

Eroding Anonymity Through Additional Verification: The mandate for “Additional Customer Identity Verification Measures for Transactions Involving Unhosted Wallets” is a direct affront to privacy and anonymity. This requirement transgresses on the First Amendment’s sanctuary for anonymous speech

A Direct Assault on Anonymity-Enhanced Currencies: The “Prohibition on the Use of Anonymity-Enhanced Convertible Virtual Currencies (AECVC)” is nothing short of a legislative bulldozer through the edifice of privacy.

See also: Preston Pysh says proposed FinCEN crypto rules violate US Constitution

8
submitted 8 months ago* (last edited 8 months ago) by Saki@monero.town to c/privacy@monero.town

Bis zum Jahr 2030 will die EU allen Bürger:innen eine „European Digital Identity Wallet“ (ID-Wallet) zur Verfügung stellen. Sie soll on- wie offline bei Verwaltungsgängen und Bankgeschäften, aber auch bei Arztbesuchen, Alterskontrollen oder beim Internetshopping zum Einsatz kommen.

(By 2030, the EU wants to provide all citizens with a “European Digital Identity Wallet” (ID wallet). It is intended to be used online and offline for administrative procedures and banking as well as medical visits, age verification, and internet shopping.)

The article (in German) is mostly about eIDAS 45
Cf. https://monero.town/post/1018961 Last Chance to fix eIDAS: Secret EU law threatens Internet security

(There are many English articles about it; see e.g.
https://mullvad.net/en/blog/eu-digital-identity-framework-eidas-another-kind-of-chat-control )

Though not the main topic of the article, this “ID wallet” thing sounds disturbing. (EU politicians calls a normal wallet “unhosted wallet” and don’t like it very much.)

3
submitted 8 months ago* (last edited 8 months ago) by Saki@monero.town to c/meta@monero.town

On the front page of monero.town, sm.ms and catbox.moe are recommended as image hosting services. Unfortunately both are not Tor-friendly, esp. Catbox blocks Tor.

The Cock.li guy comes up with a solution.

  1. Solution about Catbox: Just change cat in the URL to fat and the image is viewable for Tor users!

Example https://monero.town/post/1025717 where
https://files.catbox.moe/6z3p3z.jpg is not viewable via Tor
https://files.fatbox.moe/6z3p3z.jpg would be viewable via Tor

  1. How to use an inline image (in general, not only Catbox)

The syntax is ![](URL) so…
![](https://files.fatbox.moe/6z3p3z.jpg)

Result:

  1. How to make it a Clickable thumbnail

Text link would be [Text](URL) you can replace Text with an inline image, URL with the image URL, i.e.
[![](URL)](URL) so…
[![](https://files.fatbox.moe/6z3p3z.jpg)](https://files.fatbox.moe/6z3p3z.jpg)
Result


Note: Optionally you can put Alt text in ![] as in
![Monero-chan is happy](https://sample.net/happy-monerochan.png)


Another hosting service imagebam.com is iffy but Tor friendly, easy to upload images there from Tor Browser & you can direct-link to the uploaded full image.

Using 3rd party image hosting services has privacy implications, but it will save the server resource of monero.town.

34
submitted 8 months ago by Saki@monero.town to c/privacy@monero.town

Many countries use censorship systems to block access to human rights resources

.onion sites are particularly useful at maximizing internet users' privacy and anonymity because they never leave the Tor network.

While technically I2P might be better, it’s good news that a recognized human rights organization has adopted an onion, because that will improve the “shady” image of Tor, esp. hidden services (aka darknet), as in “privacy technology is good, not for criminals, but for you, for everyone. Using Tor is normal, and Monero is a great tool.”

[-] Saki@monero.town 10 points 8 months ago

Some of possible solutions include:

  • always use Tor 24/7, Tails or not, when possible, even when browsing normal websites, or using IRC etc.
  • use bridges
[-] Saki@monero.town 33 points 9 months ago* (last edited 9 months ago)

The same URL now: Microsoft gives in and lets you close OneDrive on Windows without explaining yourself

Update November 10th, 4:45AM ET: Microsoft has removed the dialog forcing users to fill out a survey when quitting OneDrive, and reverted to the original prompt. In a statement sent to The Verge, Microsoft says:

Between Nov. 1 and 8, a small subset of consumer OneDrive users were presented with a dialog box when closing the OneDrive sync client, asking for feedback on the reason they chose to close the application. This type of user feedback helps inform our ongoing efforts to enhance the quality of our products.

The story below is unchanged.

[-] Saki@monero.town 43 points 9 months ago* (last edited 9 months ago)

Excuse me, do you have a moment to talk about GNU/Linux? 🙃

When I got my senior mom a computer she had never used Windows. Instead of having her learn that I installed Debian with Xfce and Firefox. Now that’s all she knows, I laugh at people who tell me Linux is too hard when my mom without any tech knowledge uses it as her daily computer. If I had to switch her to Windows or a Chrome browser she’ll make a fuss about it.

How about a live OS as a free trial? Not only free as in free beer, but free as in freedom, and always will be free. You own your OS, not vice versa.

Become a Linux user today, while keeping your precious Windows 11 or whatever. I raise you Tails if you do this at all.

  • Get an unused USB stick, download Tails and make a bootable USB. Typically this will take less than an hour.
  • Restart and boot your computer into Tails.
  • Congratulations! You’re a Debian user now, even on Tor. Meaning your real IP is hidden. Privacy strikes back!
  • Start Tor Browser and enjoy Lemmy. Libre world is usually Tor-friendly (though lemmy.world may be behind CF).

I’m not saying you should ditch Windows today, but you might want to do some experiments? There are other OSes too, if you think yours is (becoming more and more) annoying!

[PS: lemmy.world is indeed behind Cloudflare (CF). You may not be able to use it directly via Tor. I’m okay because writing/reading this from a different, privacy-friendly instance. Though CF is MitM, some people believe it’s necessary. Be careful, though: everything you send, including your password, may be visible to this MitM as plaintext.]

[-] Saki@monero.town 13 points 9 months ago* (last edited 9 months ago)

Sorry if I sounded unpleasant. I’m not holding Monero, I actually use it (just like one may use Paypal), is all. Still, as you can see I’m from Monero.town, so obviously I’m a fan. Guilty as charged!

I’ve actually been “preaching” about privacy to my friends, but they’re typically like “Google is fine. I have nothing to hide.” Or about PGP (in vain). But I wouldn’t preach about (recommend) the privacy coin to regular people. Like you pointed out, it’s controversial and risky. As a long time user, I know too well about both sides of this.

[-] Saki@monero.town 17 points 9 months ago

Exactly, except not “the entire”, but “almost entire”?

Monero has been largely detached from CEXes, no companies, no middle men… Many users still have that idealism, a cypherpunk philosophy, that which Bitcoin tried to achieve originally. It’s community-based and crowd-funded… Some of that fund was stolen, so we’ve got to admit that the Monero community was not so smart after all… Yeah, a bit embarrassing tbh. To err is human, I guess.

For example, we do have a zero-fee donation site kuno.anne.media and recently help some girl buy a laptop or doing things like that. Some of Monero users are idealists by nature, maybe silly dreamers or naive philosophers, but definitely not greedy HODLERs. Weird people, either way, haha 😅

[-] Saki@monero.town 19 points 9 months ago

I think I know what you’re trying to say, and that’s actually a difficult point. Privacy is double-edged.

By that logic, you’d have to support chat control, e2e backdoor, eIDAS 45, etc. and ban Tor, Tails, VPN, BitTorrent, or encrypted communication in general because sometimes criminals can (and do) abuse such technology too. While such logic is understandable, I’m a privacy advocate and can’t agree with that. Most libre people, EFF, FSF, etc. have been fighting against that very logic for more than 20 years. I’m one of them.

[-] Saki@monero.town 50 points 9 months ago

The linked article (and so AutoTL;DR) is not very accurate. If you’re interested in this incident, read the original post, which is short and compact. General media articles are only quoting or re-quoting this thread, typically with some misunderstanding.

Specifically (about this post): Among other things, multisig is only suggested; nothing has been decided yet.

Generally (in many similar articles): Probably a specific local machine was hacked, though no one really knows yet what happened. It’s unlikely that the Monero network itself was hacked.

Since I’m a Monero supporter, obviously I tend to say good things about it, but frankly, the ironical fact here is, Monero is so privacy-focused that when something like this happens, it’s difficult to identify the attacker—i.e. by design Monero also protects the identity of the attacker. Some Monero users are having this weird, paradoxical feeling: it would be nice if we could catch this evil attacker, but being able to catch the attacker would be in a way very bad news for Monero (if you know what I mean) 😕

[-] Saki@monero.town 11 points 9 months ago* (last edited 9 months ago)

Recently (2023), the default of GnuPG has been changed: a new key generated will be no longer RSA but ECC. Elliptic (25519) is a way to go: keys are much shorter than say RSA4096. Migrating to elliptic is convenient and perhaps safer, even though RSA may be still safe too.

Realistically 2048 is about 600-digit. Factorization of a 100-400 digit number is more or less possible now. 600 is still hard, but maybe not totally impossible in the near future.

25519 was designed by D. J. Bernstein, who tenaciously fought a long legal battle against the US cryptography export regulations. He’s also strongly criticized various sabotages (backdoor) in NIST standardized cryptography algorithms, such as the random bit generation in Dual EC. That’s why people tend to like 25519, over RSA etc.

Nerdy footnotes 😅

multiplying two different large prime numbers

Technically, the two numbers are usually not proven primes (not a big deal: they’re most probably primes, just not mathematically proven…).

brute-force cracking a strong key would require an enormous amount of time

Obviously, one wouldn’t do a naive brute-force, like trial division. There are some number theoretic, sophisticated algorithms, and they’re getting stronger and stronger, both algorithm-wise and machine power-wise… Not too long ago, people were saying RSA512 was strong enough!

[-] Saki@monero.town 9 points 11 months ago

I asked two Mastodon admins, both new to crypto, to accept crypto donations, adding “if possible Monero.” To my surprise, a few weeks later one started to accept only Monero, running a full-node, p2pool’ing, even providing xmrno.de publicly for non-full-node p2pool miners. So this privacy-oriented (no-logging) generic Mastodon instance ieji.de (also providing onion/I2P) is now Monero supporting.

[-] Saki@monero.town 17 points 11 months ago* (last edited 11 months ago)

It’s a free country, you can use whatever you like. Respect yourself and your own intuition :)

The current situation (~~summer~~ July–Sept 2023) is, you better switch to any browser that is not Chromium-based. The reason is “Web Environment Integrity” (WEI), which seems to mean, basically, Google is trying to DRM-lock the whole Internet to make sure you see their ads and they can track everyone. Freedom-loving users obviously don’t like that.

At the same time Firefox is getting more and more annoying, yet it’s better than Google. A safe bet for a general user might be LibreWolf. Another new option is Mullvad Browser.

[-] Saki@monero.town 9 points 1 year ago

While no info can't be absolute, what you're trying to do is truly appreciated. Thanks! You're also having awesome-privacy, right? That's awesome too, even though again no info can't be absolute. Keep up the great work!

[-] Saki@monero.town 9 points 1 year ago

It used to be much more decentralized, peaceful, not-for-profit. No systematic tracking (No GA.js). No affiliate/Google Ad infestation.

Individual users had their own small, cozy, hobby websites, not for monetizing - purely writing about whatever they were personally interested in, not trying to increase page views. A lot of good, pure, text-based websites, which perfectly worked without JavaScript nor cookies. Early webmasters were able to type clean HTML directly and fluently using a plain text editor, not depending on centralized platforms, so page load was super-fast, not bloated.

Individual users themselves owned the Internet, so to speak; were not owned by centralized platforms.

view more: next ›

Saki

joined 1 year ago
MODERATOR OF