Also the number at the end of the account name is randomly generated. So it would take a few attempts to get the username you want.
Also the number at the end of the account name is randomly generated. So it would take a few attempts to get the username you want.
I also did this. Just felt dirty and have no idea if they honor it.
I also read that most of the opt-out services are owned by data-brokers. But that they were using them to try to hurt their competition. So I signed up for all the opt-out services I could find.
I recommend (no affiliation other than as a customer) https://easyoptouts.com/
I do not recommend Kanary (you cannot get to your dashboard without being an active premium member) One Rep (Mozilla just broke off their partnership. Seems extra sketch now as probably a lot of people will be avoiding them and they’ll be looking for extra ways to make a buck)
The others were middle of the road, but no real complaints.
I had an idea later but Optery seems to be removing data even remotely associated to me. So, wrong middle name, or right name wrong state. Their aggressiveness makes me think they are owned by a databroker trying to hurt their competition, so I’d say if you use them, sign up with information similar to your own and hope the actual you gets caught up in their scorched earth tactics.
Thanks for letting me know, I am looking in to it…
Facebook internal documents from their current lawsuit discovery process. Facebook call this project ghostbuster:
https://www.documentcloud.org/documents/24520332-merged-fb
https://mashable.com/article/facebook-snapchat-data-project-ghostbusters-mark-zuckerberg
Mental Outlaw briefly outlines how the mitm attack works without alerting the browser of bad certs:
https://www.youtube.com/watch?v=WkLvpxImRGw&t=30
Your ISP doing a mitm attack would be multi-step and unlikely, but not impossible. The most likely use case would probably be the involvement of the federal government or bad actors who have compromised a CA, which has happened in the past:
https://en.m.wikipedia.org/wiki/Kazakhstan_man-in-the-middle_attack
https://blog.mozilla.org/security/2015/03/23/revoking-trust-in-one-cnnic-intermediate-certificate/
https://security.googleblog.com/2015/09/improved-digital-certificate-security.html?m=1
For a malicious ISP to try to intercept traffic on it’s own, I imagine an attack like this would be used:
https://techgenix.com/understanding-man-in-the-middle-attacks-arp-part4/
Not an expert, so feel free to correct me but…
Selinux is open source https://github.com/SELinuxProject/selinux
Selinux is built into the kernel already. So if it has NSA spyware, you’re already compromised.
I’m unaware of any ‘official’ audit.
Using it should only increase your security.
With very little effort it would be possible to mitm all the customers and it would all be pointless. Look at what Facebook is recently done to steal user data. They have apparently been doing their attack for years.
Yes, you’re correct on the formula calculation. I keep “words x 0” to show that the variable has been accounted for. Sorta like significant digits.
The formula was developed because I regularly found myself in disadvantages relationships. I dont expect many if anybody will be able to relate much past this point…
I don’t blame anyone but myself nor am I mad with any of these individuals as I’m simply mentally malformed (context below). This formula gave me the ability to determine when a relationship wasn’t worth maintaining.
Mentally malformed context: I would take someone’s statement as truth over my own observed reality. Example, Person: You promised me you’d do X Me: I have no memory of that. Person: Well you did. Me: I’m sorry I didn’t get that done, what can I do to make it up to you. Person: X still has to get done, and you can do Y to make it up to me. Me: okay. Me to myself: I must be constantly missing time. I must be going crazy… Try to act normal so you don’t get locked up.
Having access to a absolute (though arbitrary) number has given me the ability to make better decisions.
Also, I would be interested if you elaborated on the social protocol you mentioned.
Only 80 hours? How lazy.
“I don’t care about privacy because I have nothing to hide.”
The threats I started with were just Google, Facebook, and data brokers… But it quickly progressed to a game level, where I do it now for fun.
It would probably be too inconvenient to maintain if I spent much time online. Probably 80% of the time I spend at the computer is trying to improve my privacy. Work doesn’t have any computer requirements (yea manual labor jobs) and I spend most of my personal time hunting, fishing, and reading.
I was speaking to a mechanic once and he said they offered a service where they’d go into the car and and physically disable the communications chip on the vehicle. So everything would function normally, but the car would be unable to transmit data. It sounds like a technically feasible solution.
I’ve since spent many hours online looking for tutorials, information, or stories and found almost nothing. Has anyone else hears about anything like this or have any experience?
I’d love to be able to start some kind of wiki for how to disable those chips for different make and models of cars.
This is what you’re looking for:
https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List
There is/was another website that had a large list but also all the opt out steps. I think they also had a service where they’d opt out for you, but you had to fill out a bunch of personal info.
I also heard that a lot or most of the opt out services were bought by data brokers. There’s one site that seemed to just be 2 guys and a side hustle thing. I went ahead and did that. I have no proof that they did anything or did a good job, but I was still happy with the service.
This person made a rough guide, and not merely shared their own setup.
I reread the post. Personally, at no point does it seem to be a guide or even a recommendation. I also got the feeling that the poster doesn’t consider themselves an authority on privacy and was just looking to move further in their privacy journey by posting their setup for friendly and constructive criticism. Your responses read as critical and barely constructive.
I do appreciate the links to the criticism of GrapheneOS. This is the first I’ve come across such criticism so I’ll be checking these out as soon as I have free time.
Here is my setup:
Web browsing
Desktop
Servers (too much to list but here’s some random stuff)
Mobile
Messenger
Online accounts
Video streaming
AI
Social Media
Shopping/Finance
Music streaming
Programming
Misc
I feel like I’m missing a bunch of stuff and I probably am, but that’s all I’m going to include or I’d probably have to self-publish as a novel.
**Edited for readability
I have had great(ish) success with psychology books to learn about what behaviors and facial expressions to look for. They are well documented and accurate (in my experiencel) combine that with the formula: words x 0 + facial expression + action x 3. And making myself aware of deposits and withdraw on the bank of my good will.
(they obviously have my data anyway)
You’re generating new valuable data with every purchase though. Brick and mortar stores are some of the worst when it comes to data abuse (not really privacy because they don’t want to sell the data).
I haven’t tried it, but you should be able to make your own credit cards with a card reader/writer and put your virtual cards there. I was going to play with that setup a bit but never got the time… And now I’m not in a position to do so. However I might compile my research and theories and make a post about it.
I’ve been looking into trusts. They are actually easy to setup and you just open a bank account or send them some sort of official letter to transfer the name to the trust. Then you do direct deposit like normal because you are the sole owner of the trust so no extra steps to “funnel” money into it. I never even thought of using it as a privacy tool though I’ll have to think on that.
I also heard in passing that you can setup a business in Mexico without much oversight and use it here in the states without issue. But I haven’t been able to track down more info and the interviewwee didn’t site any source or how to guide.
Also for the mobile payments Apple pay doesn’t send any info along to the merchant they generate a new code with each transaction with no personal information. That code is what’s used for the payment. Also as much as I dislike Apple they probably use but don’t sell your info. So less bad than a regular credit card. Also privacy.com is planning (or maybe already implemented) virtual wallet cards. Their product was amazing, I was able to sign up with a fake name and address… But they removed the card funding feature and require you bank account number now. So they messed up my account and their support was terrible. Couldn’t get it fixed and ended up deleting my account.
I keep a jar in my glovebox. My local grocery store has cash-based self checkout registers with a spot to input change. Whenever I go, I grab a handful of change and dump the lot into there. It usually takes like $3-6 off my purchase with some change left over. But it’s an easy way to keep the collection low.
I loved privacy.com until they changes some things and removed debit as a funding source because after that I had a few technical issues and their support took almost 6 weeks to respond… And it was a one word response email that didn’t help at all. I’m trying to use IronVest, but also having technical issues, but their support is kind and answers in 24hrs.
I have personally tracked down people online by just their phone number. OSINT is a super fun challenge. I do recommend you try it.