The Privacy Iceberg

This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.

Transcription (for the visually impaired)

(I tried my best)

The background is an iceberg with 6 levels, denoting 6 different levels of privacy.

The tip of the iceberg is titled “The Brainwashed” with a quote beside it that says “I have nothing to hide”. The logos depicted in this section are:

The surface section of the iceberg is titled “As seen on TV” with a quote beside it that says “This video is sponsored by…”. The logos depicted in this section are:

An underwater section of the iceberg is titled “The Beginner” with a quote beside it that says “I don’t like hackers and spying”. The logos depicted in this section are:

A lower section of the iceberg is titled “The Privacy Enthusiast” with a quote beside it that says “I have nothing I want to show”. The logos depicted in this section are:

An even lower section of the iceberg is titled “The Privacy Activist” with a quote beside it that says “Privacy is a human right”. The logos depicted in this section are:

The lowest portion of the iceberg is titled “The Ghost”. There is a quote beside it that has been intentionally redacted. The images depicted in this section are:

  • A cancel sign over a mobile phone, symbolizing “no electronics”
  • An illustration of a log cabin, symbolizing “living in a log cabin in the woods”
  • A picture of gold bars, symbolizing “paying only in gold”
  • A picture of a death certificate, symbolizing “faking your own death”
  • An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing “hiding ones identity in public”

End of transcription.

  • @[email protected]
    link
    fedilink
    English
    3
    edit-2
    1 month ago

    I guess I’m in the privacy enthusiast section. Although I do use searxng. And I will admit I do use some things from the top layer, like YouTube and steam. Also i don’t like how proton is a section above tuta aside from quantum safe encryption which is meaningless at the current state of technology (I agree that could change soon) aside from that proton mail is just as good as tuta.

    I use everything from the privacy enthusiast section on a daily basis except for addy.io and tuta since i use proton for email and email aliasing.

    • @[email protected]
      link
      fedilink
      5
      edit-2
      1 month ago

      Maybe I am wrong, but I think proton doesn’t encrypt headers and some metadata, Tuta encrypts everything or almost everything. Also, proton mail is not available in F-Droid
      Personally, I don’t like proto, it doesn’t follow the separation of powers principle, what happens if proton suddenly changes their policy? That is why true free and open software tend to be decentralized, for example mastodon vs bluesky, the only way I can really trust you it is if you can’t “betray” me, even if you really want

      • @[email protected]
        link
        fedilink
        11 month ago

        Tuta is located in Germany which has more power to look into your data than the Swiss government, but it’s mhe.

        Also what separation of power do you mean? Proton is also owned by a non profit and Tuta is just a Gmbh which is owned by two individuals it seems. Changing something regarding the non profit or the structure is pretty hard to do

        Tuta is however more open with that you can find their annual report or at least part of it if you want.

        • @[email protected]
          link
          fedilink
          31 month ago

          Sorry, I took for granted that you had to buy a pack with vpn, cloud storage, etc. That would have means that you would have to change a lot of services again in the case the proton company let you down. I still think that Tuta is a little more private for the reasons I mentioned

          • @[email protected]
            link
            fedilink
            11 month ago

            You mentioned almost nothing? Tuta can even more easily change their privacy policy. Not saying Tuta isn’t the right choice, but it’s worse than a lot of people make you think it is

      • @[email protected]
        link
        fedilink
        English
        11 month ago

        You might be right I searched it up and found that protonmail doesn’t encrypt header lines which isn’t great. The f-droid point is also valid. But unfortunately there is no decentralised email providers, even tuta is still centralised. I would be interested if there are any options for decentralised mail.

        On another note regardless of whether I’m using proton or tuta it’s hardly ever end to end encrypted since everyone I’m sending the mail to uses Gmail.

  • @[email protected]
    link
    fedilink
    English
    28
    edit-2
    1 month ago

    I give workshops on privacy. I always tell them that if they get nothing else out of my presentation, its that they should use a password manager.

    Honestly I think keepass should be beginner. That comes first before everything else.

    Also I think Tor Browser should come before VPNs. Its free and easier to use than VPNs (for when you want to google something secret and don’t want to be tracked. Most beginners are selective like that)

  • @[email protected]
    link
    fedilink
    81 month ago

    Malwarebytes is good in my opinion and ads didn’t told me about it. I discovered it by myself. And nowdays ads can’t really tell me much because I block every single ad I just possibly can.

  • @[email protected]
    link
    fedilink
    English
    171 month ago

    This is a modern art masterpiece. I’ve starred at it for hours while installing Arch Linux on my brand new T480.

  • Anna
    link
    fedilink
    111 month ago

    Using basic things like Graphene OS and keepass shouldn’t be considered privacy activist

  • @[email protected]
    link
    fedilink
    1101 month ago

    I was at the bike shop a few weeks back and a ghost walked in. He came in wearing a medical mask covered by a bandana, sunglasses, cap. They wore gloves, long sleaved pants and shirt.

    First question from staff, ‘this a robbery?’

    Ghost, ‘no, I just need 27 2.5 tubes, miss.’

    They get the tubes, he agrees. Staff asks if he has an account. Ghost says, “nope, why would I need one?” Staff says they do it for records, insurance claim assist, and discounts. Ghost goes with a John Doe, pays cash and peaces the fuck out.

    Total King, but dude was given up a lot. Half of us were drinking beers enjoying a warm evening in spring. I hope he has had some good rides.

    I can say with confidence thay he was a white male. In his 50s. About 5’10". 140 lbs-ish. If anyone wants to get any tips, good luck!

      • @[email protected]
        link
        fedilink
        191 month ago

        I’m no ghost, not even close. Be careful though, “what’s the point?” Is essentially the question everybody asks at every phase of that iceberg diagram.

        A possible answer to your question though, is that even if the state doesn’t know or care about him today that might change tomorrow.

        That’s not my threat profile but it’s a valid one.

  • Dimi Fisher
    link
    fedilink
    11 month ago

    I m definitely a privacy enthusiast, but I use searx also, the rest I have no clue what they are

  • @[email protected]
    link
    fedilink
    41 month ago

    In regards to addy, are my messages private in relation to the service or does it only serve to keep my anonymity to other threat actors?