• @[email protected]
    link
    fedilink
    67 months ago

    You can save different identities using one password and then every time you sit down at your computer you can just make up new details for those identities in one password so that when you go to the mall, You’re not always Chungus McGrungledunk, but sometimes they’re going to be offering a free trial to, Faurtstick Blastschish or whatever name I give the email address I spin up for the purpose.

    It’s good to register a burner domain that you don’t care about and once you have the processed enough different identities through it simply stop renewing it and sign up for new one.

  • @[email protected]
    link
    fedilink
    117 months ago

    On some public networks, my Wireguard VPN just doesn’t work. Although I can connect to my server using SSH, so I assume the network was configured to block certain ports or how else can it block VPN connections?

    • @[email protected]
      link
      fedilink
      157 months ago

      Many networks block UDP ports, which is what wireguard uses. If you can configure the serverside part of the VPN, you could try running it on port 123, which is used for the network time protocol (ntp), which also uses UDP and is open nearly everywhere

      • Prison Mike
        link
        fedilink
        37 months ago

        Are you familiar with Tailscale? I think it reverts to tunneling over WireGuard over HTTPS in cases like this — I might be wrong, but I might block UDP on myself to test this out.

        • @[email protected]
          link
          fedilink
          2
          edit-2
          7 months ago

          No, you’re right! They have the best name, DERP relays lol. When tailscale can’t find a node over UDP , it switches over to TCP and runs the encrypted traffic through the DERP relays.

    • @[email protected]
      link
      fedilink
      587 months ago

      Don’t use random, invented data. That’s wrong. Use the real data of a ceo or other executive from a company that spammed you. Or if you have the time find out who owns the mall and use their information.

      • Druid
        link
        fedilink
        English
        157 months ago

        That’s so evil and so amazing

        • @[email protected]
          link
          fedilink
          77 months ago

          I recently did something similar. My daughter’s orthodontist practice (it’s a large office with multiple locations) from a few years ago sent a spam txt message. I tracked down the owner of the practice and called the office, “I have a new phone number. Please change it on my records.”

          And gave the owner’s home number."

      • @[email protected]
        link
        fedilink
        2
        edit-2
        7 months ago

        info@, postmaster@, web@, abuse@, or any other mandated valid email addresses for the service that wants your data.

        Any system that includes an SMTP server supporting mail relaying or delivery MUST support the reserved mailbox “postmaster” as a case-insensitive local name.

        https://datatracker.ietf.org/doc/html/rfc5321

  • @[email protected]
    link
    fedilink
    English
    103
    edit-2
    7 months ago

    My email is whatever shit protonpass comes up with when I generate a random alias. Phone number is 3334445566 Name is: lol no Gender is undisclosed DoB is January 1st of the first year I can select. Otherwise, 1900 And income is 1.

    There, free WiFi.

    • @[email protected]
      link
      fedilink
      English
      527 months ago

      That said…A wifi access point that requests that info is almost certainly not private for every other trackable thing you do with that wifi, however.

      • @[email protected]
        link
        fedilink
        257 months ago

        If it’s an open WiFi (no WPA password) packets are not encrypted anyway, so anyone on this AP can easily see everything that comes through it. A decade ago, when most websites allowed plain HTTP, there was a Firefox extension which let you hijack the Facebook or Twitter session of anyone connected to an open WiFi with a couple of clicks.

        Nowadays everything is hopefully encrypted at the application level, so while attackers can see where the data goes, they can’t actually read it.

      • JustEnoughDucks
        link
        fedilink
        57 months ago

        Everything you do on a public WiFi should be through a VPN anyway. Just in case you accidentally forget you are on it and log in somewhere.

    • @[email protected]
      link
      fedilink
      227 months ago

      I usually use:
      Email - [email protected]
      Name - Nah Nope
      Gender - prefer not to say
      DoB - same as you
      Phone - just random digits, or if I’m feeling spicy the phone number of a guy I used to be buddies with who fucked me over
      Income - never been asked for this yet, probably go with something outlandish…like 1

  • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 🇮 🏆
    link
    fedilink
    English
    23
    edit-2
    7 months ago

    That’s when I use the oldest human invention: LYING.

    Fake email, fake address, tell them I make more than the highest option they give for the income, make up the entirely unique gender of squorp, etc.

    • @[email protected]
      link
      fedilink
      English
      67 months ago

      They don’t care. They’re just turning around and repeating your lies to whatever advertiser is so stupid as to believe their demographic sales pitch.

      Hurt them by not using it. That’s the biggest number that feeds their machine.

      • Prison Mike
        link
        fedilink
        27 months ago

        I think if you lie and use a VPN there might be less data for them to profit from.

      • @[email protected]
        link
        fedilink
        47 months ago

        There’s something to be said for poisoning the data. Intentionally, and consistently, enter slightly wrong information into every form you can. If it leaks, it all corroborates, but with other wrong information.

        It’s definitely easier and more reliable to just pass tho.

  • @[email protected]
    link
    fedilink
    47 months ago

    I made “free” internet.

    In Australia we have an ISP that provides a Huawei USB back up. You can find unlocking instruction online. Works anywhere in Australia. SIM can be used in a generic wifi hot spot. People throw them outa lot as they frequently get over ordered. Lostcin post etc. I have 3.

  • GHiLA
    link
    fedilink
    10
    edit-2
    7 months ago

    Bro, look, there’s an open wifi network here now. Signal kinda sucks out here. Imma try it.

    …it’s loading a login screen

    they want my employee number

    close it and never think about using it again

  • @[email protected]
    link
    fedilink
    657 months ago

    I went to a restaurant recently that asked me to pay my bill with the QR code on the tablet. Scanned it, and the first thing it did was ask for my phone number to verify my “account” by sending me a code.

    The server didn’t understand that I wasn’t going to do that, and they needed to run my credit card like normal or I wasn’t paying.

    • @[email protected]
      link
      fedilink
      287 months ago

      Oh man. If I need to download an app to pay for a meal I’m never going back to that place again.

        • thermal_shock
          link
          fedilink
          English
          47 months ago

          I talked my way out of a parking ticket once. the machines were offline, and the only sticker for the app was knee level on the side. I argued a smart phone should not be a requirement to park your car here, meter cop tore the ticket up right then.

    • @[email protected]
      link
      fedilink
      117 months ago

      That’s why in some ways I don’t mind that my country still pays for mobile data, because I just don’t even bother at restaurants anymore “oh, I’ve run out of data, I can’t scan that, here’s my money”

      Because of how severely covid lock downs hit our state, every single restaurant I’ve been to in the last 5 years has used a QR code to order and pay.

      I have allergies, so this means I mostly just order black coffee when it’s QR only.

      I’m not giving you all of my personal details for an overpriced $5 black coffee. The result is that I sit there with my friends, fiddling my thumbs, not buying anything.

    • AwkwardLookMonkeyPuppet
      link
      fedilink
      English
      107 months ago

      But what’s the big deal? It’s just an account, sir. Everyone does it. It doesn’t mean anything.

      These are the thoughts of people who truly have no idea what’s going on in the world, and those people are abundant.

  • @[email protected]
    link
    fedilink
    17
    edit-2
    7 months ago

    Here’s a secret those free wifi providers don’t want you to know: usually, they don’t check your email or ask you to verify it, so you can just enter [email protected] If they do show a second screen asking for an email, just create a tempmail adress on cellular and switch back to verify. It works 99.99% of the time.

    Edit: you also don’t have to enter any real personal information, how would they know?

    • @[email protected]
      link
      fedilink
      127 months ago

      I always use famous people, just in case someone is checking the data and assumes that Tom Cruise or Sydney Sweeney decided to stop in Cambridge for a quick bite to eat in Nandos before staying in the Travelodge.

  • @[email protected]
    link
    fedilink
    277 months ago

    Rule of thumb on the Internet, if you can’t see how it’s payed for (subscriptions, ads, donations…) then you probably pay with your personal data.

    Especially true for apps and games. “Play totally free, no annoying adds or in-app purchases” means “Here is a trojan horse pretending to be a game while farming every possible information from your device to sell to the highest bidder”.

    • @[email protected]
      link
      fedilink
      English
      117 months ago

      Small shout out to Apple here, perhaps, for their little privacy report card. Here is Angry Birds 2:

      A transcription app by a cool solo dev:

      Y’all trust these?

      • LostXOR
        link
        fedilink
        27 months ago

        As I understand it Apple is fairly good privacy-wise (at least compared to others). I wouldn’t 100% trust those cards, but I’m guessing they’re pretty accurate.

  • @[email protected]
    link
    fedilink
    157 months ago

    I’ve never given a real email to these. I just bash the keys on my phones with random letters and decide whether it’s going to be gmail, aol, or yahoo that day…