Privacy

3189 readers
195 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
251
 
 

In this post, I hope to clarify and expand on some of the points and rebut some of the counter-messaging that we have witnessed.

252
 
 

Deep dive on why Meta need to be totally boycotted.

People here will know all this, but please share with your less knowledgable friends and family so they can realise the truth: Meta products need to be dumped!

253
254
19
submitted 1 month ago* (last edited 1 month ago) by cm0002@lemmings.world to c/privacy@programming.dev
 
 

A software architect discovered his iLife A11 smart vacuum was secretly transmitting data to overseas servers in 2025. When he blocked the data collection, the vacuum was remotely disabled through hidden software that allowed manufacturer access[^1].

The vacuum contained sophisticated hardware including an AllWinner A33 processor running Linux and Google Cartographer mapping software. Through reverse engineering, the author found rtty remote access software that let manufacturers secretly control devices[^1].

The incident sparked discussions about IoT device privacy and control. Multiple vacuum brands including Xiaomi, Wyze, and Viomi use the same hardware platform (3irobotix CRL-200S), suggesting widespread vulnerability[^1].

The story gained attention in October 2025, with tech commentators highlighting it as a cautionary tale about smart home devices[^2]. Forum discussions revealed similar experiences with other robot vacuums losing connectivity or requiring resets after firmware updates[^7][^9].

[^1]: The Day My Smart Vacuum Turned Against Me
[^2]: Suggested Read: The Day My Smart Vacuum Turned Against Me - Troy Patterson
[^7]: Wyze Forums - Robot vacuum does not connect to wifi
[^9]: Wyze Forums - Wyze Vacuum Save Created Maps in App

255
256
257
258
 
 

If you thought living in Europe, Canada, or Hong Kong meant you were protected from having LinkedIn scrape your posts to train its AI, think again. You have a week to opt out before the Microsoft subsidiary assumes you're fine with it.

259
260
 
 

Specifically, Teams will detect if the user has connected to the company's own Wi-Fi and automatically set the work location accordingly to the respective building.

261
 
 

The system won't be available until January 1, 2026 and the data brokers won't start processing the requests until August 1, but still a nice step.

262
 
 

Specifically, Teams will detect if the user has connected to the company's own Wi-Fi and automatically set the work location accordingly to the respective building.

263
264
 
 

The U.S. will expand the use of facial recognition technology to track non-citizens entering and leaving the country in order to combat visa overstays and passport fraud, according to a government document published on Friday.

A new regulation will allow U.S. border authorities to require non-citizens to be photographed at airports, seaports, land crossings and any other point of departure, expanding on an earlier pilot program.

Under the regulation, set to take effect on December 26, U.S. authorities could require the submission of other biometrics, such as fingerprints or DNA, it said.

265
266
 
 

How to protect your privacy on your smartphone Today, our smartphones follow us everywhere - from the workplace to our most private moments. But many people don’t realize that smartphones collect significant amounts of personal data in the background. In the this article, we share useful privacy tips how to…

267
268
 
 

Both Google and Apple are cramming new AI features into their phones and other devices, and neither company has offered clear ways to control which apps those AI systems can access. Recent issues around WhatsApp on both Android and iPhone demonstrate how these interactions can go sideways, risking revealing chat conversations beyond what you intend. Users deserve better

269
 
 

I've collected a lot of privacy tips over the years, ranging from somewhat common to very niche. After seeing this post, I wanted to share them, along with ways to mitigate each of them. I've tried to find sources for each of them, but some of them simply don't have good sources. You can help by finding good sources (Wikipedia, research papers) covering the specific topic. As with all my posts, this is not AI-generated, just well-structured.

Good sources

Glove Prints

Problem: Thin gloves like surgical gloves can still leave fingerprints on surfaces.

Source: https://en.wikipedia.org/wiki/Glove_prints

Mitigation: Wear thick, textured gloves

Main Hum

Problem: The hum of the electrical grid can be used to determine when, and sometimes where, an audio recording took place.

Source: https://en.wikipedia.org/wiki/Electrical_network_frequency_analysis

Mitigation: Only record audio in places far away from electrical appliances.

Stylometry

Problem: Your writing style can uniquely identify you.

Source: https://en.wikipedia.org/wiki/Stylometry

Mitigation: Use AI rewriting tools to obfuscate your writing style.

Infrared Glasses

Problem: Sunglasses don't block infrared cameras.

Source: https://www.reflectacles.com/irlenses

Solution: Buy infrared blocking/reflecting sunglasses such as Reflectacles.

Tracking Dots

Problem: Printers add tracking dots that identify which printer was used to print a document and when it was printed.

Source: https://en.wikipedia.org/wiki/Printer_tracking_dots

Mitigation: Use a printer that may not come with this feature (such as the upcoming Open Printer or use public printers like those found in libraries.

WiFi Motion

Problem: Wi-Fi routers are able to track motion under specific conditions.

Source: https://www.cognitivesystems.com/wifi-motion/ (and others)

Mitigation: Radio jammers may provide some protection against this, since the technology is still fragile.

PrintListener

Problem: Your fingerprint can be uncovered using the sound of your finger gliding across your screen.

Source: https://www.ndss-symposium.org/wp-content/uploads/2024-618-paper.pdf

Mitigation: Use a ballpoint pen with a stylus tip, which are somewhat common to find at most events.

Laser Microphone

Problem: You can record audio using the vibration of nearby objects, like windows.

Source: https://en.wikipedia.org/wiki/Laser_microphone

Mitigation: Have sensitive conversations in closed-off or soundproof rooms or outside in remote areas.

Keystroke Recording

Problem: Your keystrokes can be uncovered using audio recordings of typing.

Source: https://arxiv.org/pdf/2403.08740

Mitigation: Use virtual keyboards.

Typing Patterns

Problem: You can be identified based on your typing patterns.

Source: https://expertbeacon.com/your-typing-style-is-as-unique-as-your-fingerprint-heres-what-that-means/ (and others)

Mitigation: Type into a text editor and copy-paste into the form you want to submit.

Unshredder

Problem: Shredded documents can be reconstructed.

Source: https://www.unshredder.com/ (and others)

Mitigation: Burn sensitive documents or use piranha solution.

Microbial Cloud

Problem: You can be identified using your unique microbial cloud.

Source: https://peerj.com/articles/1258/

Mitigation: Shower obsessively, I'm not sure.

Gait Recognition

Problem: The way you walk can identify you.

Source: https://en.wikipedia.org/wiki/Gait_analysis

Mitigation: Place gravel in your shoes or intentionally walk funny.

Store Tracking

Problem: Stores track your location using Wi-Fi and Bluetooth signals from your device.

Source: https://en.wikipedia.org/wiki/Indoor_positioning_system (and others)

Mitigation: Disable Wi-Fi and Bluetooth when not in use.

Gyrophone

Problem: Gyroscopes can record audio

Source: https://crypto.stanford.edu/gyrophone/files/gyromic.pdf

Mitigation: Disable sensor permissions for apps that don't need it on GrapheneOS.

Camera Styles

Problem: Cameras can be identified using picture styles.

Source: https://www.scientificamerican.com/article/tracing-photos-back-to-the-camera-that-snapped-them/

Mitigation: Use Polaroid cameras or obfuscate pictures before sharing them.

Amazon Sidewalk

Problem: Offline Amazon devices can access the internet by communicating with nearby online Amazon devices.

Source: https://en.wikipedia.org/wiki/Amazon_Sidewalk

Mitigation: Don't use Amazon devices.

Deep-TEMPEST

Problem: Data sent over a wired connection (like HDMI) can be received wirelessly.

Source: https://arxiv.org/pdf/2407.09717

Mitigation: Use shielded cables or encrypt wired connections in transit.

Cartridge Memory

Problem: Offline printers exfiltrate data through ink cartridges.

Source: https://support.hp.com/us-en/document/ish_6681254-6681301-16

Mitigation: Use a printer that does not come with this feature (such as the upcoming Open Printer.

WhoFi

Problem: You can be identified based on how your body blocks Wi-Fi signals.

Source: https://www.theregister.com/2025/07/22/whofi_wifi_identifier/

Mitigation: Use a Radio jammer.

Stingray

Problem: Most phones are vulnerable to Stingray attacks.

Source: https://en.wikipedia.org/wiki/Stingray_phone_tracker

Mitigation: Use Rayhunter to detect Stingray attacks.

EICAR

Problem: Surveillance cameras can scan QR codes.

Source: https://www.linkedin.com/pulse/qr-code-car-hack-fun-impractical-w-garrett-myler

Mitigation: Some surveillance cameras will crash if they scan a QR code with an EICAR Anti-Virus Test File.

Pulse-Fi

Problem: Wi-Fi can measure your heartrate

Source: https://ieeexplore.ieee.org/abstract/document/11096342

Mitigation: Cover your skin to reduce effectiveness.

Mediocre sources

Security Envelopes

Problem: The contents of envelopes can be read without being opened by seeing through the paper.

Source: General knowledge.

Mitigation: Use security envelopes or thick packaging.

Branding

Problem: Even when fully covered, the clothing you wear can identify you.

Source: General knowledge.

Mitigation: Use plain unbranded clothing bought secondhand from yard sales or Goodwill.

Body Shape

Problem: Even when fully covered, your body shape can identify you.

Source: General knowledge.

Mitigation: Wear baggy black clothing like down jackets.

ID Address

Problem: State ID cards have your address listed on them.

Source: General knowledge.

Mitigation: Passports are valid photo IDs that do not have your address listed.

Bluetooth Contacts

Problem: Any Bluetooth device you pair your phone to can access your contacts.

Source: Various online discussions.

Mitigation: Use a phone that allows you to deny that permission when pairing Bluetooth devices.

Voice Changers

Problem: Voice changers can be reversed.

Source: Various online discussions.

Mitigation: Use voice changers that highly obfuscate your voice (beyond something like a pitch shift) or use a program that converts live speech-to-text into live text-to-speech.

Analog Speakers

Problem: Speakers can be used as microphones.

Source: Various online discussions. You can try this yourself by plugging a speaker into your microphone jack.

Mitigation: Use built-in speakers or remove all speakers entirely.

Spray Paint

Problem: Spray paint can't blackout surveillance camera lenses.

Source: Various online videos of failed criminals.

Mitigation: Use duct tape or other adhesives that are not only cheaper but provide better protection.

Censorship

Problem: Pixelated or blurred images can be reversed.

Source: Various reversal tools.

Mitigation: Censor information using solid boxes.

Bad sources

Radio

Problem: Receiving antennas can be geolocated using signal interference.

Source: I couldn't find a suitable source covering this specifically. This is a general source.

Mitigation: Receive media via offline methods.

Vehicle Telemetry

Problem: Cars will collect telemetry locally to be shared when you visit auto repair shops.

Source: I couldn't find a suitable source.

Mitigation: Use dumb cars or commute using bicycles, buses, etc.

Detaining

Problem: Police can detain you without a valid reason if you carry an ID.

Source: I couldn't find a suitable source.

Mitigation: Don't carry your ID unless you need to.

Copper Strips

Problem: Buildings can be wiretapped using microphones as thin as paint.

Source: I couldn't find a suitable source.

Mitigation: Have sensitive conversations in areas unlikely to be wiretapped, or buildings with plain concrete walls.

Biometric Unlock

Problem: Police don't require a warrant to unlock your phone using biometrics.

Source: Various sources have conflicting information.

Mitigation: Lock your phone without biometrics or use two-factor fingerprint unlock on GrapheneOS.

Pedometers

Problem: Pedometers can reveal information such as your religion.

Source: A website I still can't find.

Mitigation: Use dumb pedometers that don't include timestamps.

OC by @Charger8232@lemmy.ml

270
 
 

You can't say they aren't innovating.

271
 
 

Meta’s Ray-Ban glasses usually include an LED that lights up when the user is recording other people. One hobbyist is charging a small fee to disable that light, and has a growing list of customers around the country.

272
273
 
 

Garrett Langley is getting rich off of selling everything about you.

https://garrettlangley.com/

274
275
 
 

In this Techlore Talks episode, I sit down with Jose Briones to explore whether dumb phones really offer better privacy and how digital minimalism can transform your relationship with technology. Jose breaks down practical strategies for reducing screen time, the importance of device segmentation, and why mindset, not just hardware, matters most. Whether you're considering a dumb phone or looking to reclaim your focus, this conversation will challenge how you think about your devices. > > Techlore empowers individuals with practical digital privacy knowledge, security tools, and advocacy resources to protect your data and reclaim your digital identity. > > 📱 RESOURCES IN VIDEO: > • https://josebriones.org/ > • https://www.dumbphones.org/ > • https://www.youtube.com/c/josebriones > • Jose's interview of Henry: https://josebriones.substack.com/p/building-better-digital-habits > > 🔎 RELATED VIDEOS: > • https://www.youtube.com/watch?v=oyQuwUJgPPY > > ⏱️ TIMESTAMPS: > 00:00:00 INTRO > 00:01:24 DUMBPHONES + PRIVACY & DIGITAL RIGHTS > 00:03:56 WHY ARE DUMBPHONES BETTER FOR PRIVACY? > 00:05:48 DUMBPHONES VS. MINIMAL SMARTPHONES > 00:08:57 ADOPTING THE MINDSET > 00:13:41 ADJUSTING FOR ONLINE WORK > 00:18:21 HANDLING MISMATCHED EMOTIONS > 00:22:40 ARE OFFLINE ACTIVITIES IMPORTANT? > 00:26:12 FINDING A BALANCE WITH ONLINE WORK REQUIREMENTS > 00:30:16 DIGITAL MINIMALISM + HARDWARE > 00:35:21 DEVICES & WHERE TO START > 00:39:42 ENCRYPTED COMMUNICATION > 00:44:19 WHEN OUR CHOICES IMPACT OTHERS > 00:48:33 ARE WE ANTI-TECHNOLOGY? > 00:51:36 HENRY'S IDEAL PHONE > 00:54:41 CONTENT CREATION & CONSUMPTION > 00:57:44 HOW CAN PEOPLE FIND YOU? > 00:59:29 OUTRO > > 🔐 TECHLORE RESOURCES: > • Homepage: https://techlore.tech/ > • Go Incognito Course: https://techlore.tech/goincognito > • Forum: https://discuss.techlore.tech/ > • Privacy Tools: https://techlore.tech/resources > > 🧡 SUPPORT TECHLORE: > • All Methods: https://techlore.tech/support > • Patreon: https://www.patreon.com/techlore > • YouTube Memberships: https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg/join > > 📺 MORE TECHLORE: > • Surveillance Report: https://www.youtube.com/@surveillancereport > • Techlore Clips: https://www.youtube.com/@techloreclips > > 🌐 FOLLOW ELSEWHERE: > • PeerTube: https://techlore.tv/ > • Mastodon: https://social.lol/@techlore > • Bluesky: https://bsky.app/profile/techlore.tech > • Twitter: https://twitter.com/TechloreInc > • Telegram: https://t.me/techlorefeed

view more: ‹ prev next ›