chappedafloat

joined 1 year ago
[–] chappedafloat@lemmy.wtf 2 points 1 year ago (1 children)

I think a big part of it comes down to what threats are there in theory and what threats are there actually. The problem is that the theoretical threats are possible, they're not unrealistic and that's why it doesn't feel good to not be protected against the theoretical threats but we maybe need to try and accept they are too unlikely to be active threats. Trying to protect from theoretical threats is kind of like trying to protect your house from having an airplane fall down from the sky into your house. Or maybe this is just my trying to cope.

And how do we know what threats are theoretical vs active threats? Just have to keep learning and learning, it takes a long time. Talking in privacy and security communities can help speed up the learning.

[–] chappedafloat@lemmy.wtf 1 points 1 year ago

Yeah, i did use words that express feelings in this topic I created and it was intentional because when people have to deal with something that involves uncertainty or something so advanced they don't understand it entirely then they can become uncomfortable and scared even though maybe there isn't something to be scared about or maybe the fear is justified.

My post was intended to be a discussion starter so we can dig into this, get to the truth and help everyone including myself to understand everything better.

[–] chappedafloat@lemmy.wtf 4 points 1 year ago (4 children)

Why not is the question and that comes down to guessing. Sheep do what they are told so don't need to guess much there. Those who are not sheep have to go through a long journey to gradually keep increasing their privacy and unlearn the sheep habits we've been conditioned to have.

The end goal is to throw away your phone because you can do everything on your computer instead including buying a phone number, using voip and take and make calls. Phones are unnecessary spy devices used by sheep.

[–] chappedafloat@lemmy.wtf 0 points 1 year ago

You can buy for cents phone numbers online for one time verification purpose or even rent the number for long term if you need. It's better to use these anonymous cheap throwaway numbers if you want privacy instead of your real phone number for everything.

[–] chappedafloat@lemmy.wtf 1 points 1 year ago

I don't have experience with that yet. Are you talking about a PI hole? Can you give a little idea on how to make such firewall rules? Because I want to have a laptop with many VMs or Qubes and each VM has different firewall rules. An email qube would only allow connection to the email server. Maybe one of the safe browsing VMs would only allow connections to the websites I typically visit. The unsafe VM maybe to everything except for known bad IPs/domains.

And NSA and other potential adversaries most likely have access to at least one domain that isn't blocked by firewall.

[–] chappedafloat@lemmy.wtf 21 points 1 year ago

NSA is infamous for illegal and unconstitutional mass surveillance.

[–] chappedafloat@lemmy.wtf 2 points 1 year ago

They are very cheap, only $1 for 10 aliases and then then $0.1/month for any additional aliases. But can't pay with monero.

[–] chappedafloat@lemmy.wtf 3 points 1 year ago

Can I open an account with TOR browser and pay with monero without having to give any info like a secondary email or phone number?

[–] chappedafloat@lemmy.wtf 0 points 1 year ago

I dont think it matters if an email service is a honeypot because if you want E2EE communication then use Signal, not email. And if you are sending emails to other email providers then there's probably not E2EE and it's unecessary to be a honeypot because the metadata can be collected anyway very easily. Almost all data passes through Google/Microsoft/Amazon/Cloudflare.

[–] chappedafloat@lemmy.wtf 1 points 1 year ago* (last edited 1 year ago) (1 children)

do they allow you to create anonymous accounts by paying with monero? And connected via TOR browser?

view more: ‹ prev next ›