this post was submitted on 06 Oct 2023
163 points (93.1% liked)

Privacy

31783 readers
353 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Warning to all Brave Browser Users

Blocking variations.brave.com which is used for A/B testing could potentially break Brave's functionalities. For me did Brave's "forgetful browsing" feature broke which seems to be disabled by default if you block this domain.

#brave #bravebrowser #privacy @privacy @privacyguides

you are viewing a single comment's thread
view the rest of the comments
[โ€“] Boring@lemmy.ml 2 points 1 year ago (1 children)

I'm just saying that collaboration with or association with spooks or glowies isn't in itself a red flag.

Many privacy and freedom granting software is made by these people.

Take Tor for example, made by the navy to hide information from the public and anonymously attack networks of adversaries.. Yet now is the NSA's biggest obstacle in mass surveillance.

[โ€“] JoeBidet@lemmy.ml 3 points 1 year ago

I beg to disagree: the global interception capacities of the NSA in 2012 (as showed in the very few 2013 documents from Ed. Snowden that were made public) clearly were enough to routinely de-anonymize tor. By owning a certain percentage of the global internet traffic, you de facto own tor (can very precisely correlate what comes in and what goes out, and do that retrospectively when needed).

and that was 10+ years aog....

Association with spooks is a red flag, for the multiple, endless ways they have been doing their shitfuckery, endangering the general public, the exceptional US citizens, and information/communication security at large... by weakening standards, by corrupting corporations to introduce (or leave open) some bugs, by infiltrating development teams, by pressuring operators to grant full access, by breaking and entering, etc..

Anyone who doesnt see that as a problem has to be considered as part of it. Simple, basic rule.