The Privacy Iceberg

This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.

Transcription (for the visually impaired)

(I tried my best)

The background is an iceberg with 6 levels, denoting 6 different levels of privacy.

The tip of the iceberg is titled “The Brainwashed” with a quote beside it that says “I have nothing to hide”. The logos depicted in this section are:

The surface section of the iceberg is titled “As seen on TV” with a quote beside it that says “This video is sponsored by…”. The logos depicted in this section are:

An underwater section of the iceberg is titled “The Beginner” with a quote beside it that says “I don’t like hackers and spying”. The logos depicted in this section are:

A lower section of the iceberg is titled “The Privacy Enthusiast” with a quote beside it that says “I have nothing I want to show”. The logos depicted in this section are:

An even lower section of the iceberg is titled “The Privacy Activist” with a quote beside it that says “Privacy is a human right”. The logos depicted in this section are:

The lowest portion of the iceberg is titled “The Ghost”. There is a quote beside it that has been intentionally redacted. The images depicted in this section are:

  • A cancel sign over a mobile phone, symbolizing “no electronics”
  • An illustration of a log cabin, symbolizing “living in a log cabin in the woods”
  • A picture of gold bars, symbolizing “paying only in gold”
  • A picture of a death certificate, symbolizing “faking your own death”
  • An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing “hiding ones identity in public”

End of transcription.

  • edel@lemmy.ml
    link
    fedilink
    English
    arrow-up
    24
    ·
    edit-2
    9 days ago

    Pretty good!! I agree with 95%.

    Loved the “As seen on TV” category!

    I agree that Tuta is more secure than ProtonMail.

    Some are blended like Tor, that should be in Activist if used in secured computer.

    Was not aware of the existence of Coincarp (logo by GrapheneOS). Is a crypto price tracker used by Activists? I left crypto a couple of years ago but though Activists just don´t trade much and stick for the long haul and use Monero for purchases.

    • hikeandbike@midwest.social
      link
      fedilink
      English
      arrow-up
      8
      ·
      9 days ago

      Curious why Tuta may be more secure than Proton? I’ve been debating switching off Proton but calibrating my risk profile, Germany being part of 14 Eyes and all.

      • Broken@lemmy.ml
        link
        fedilink
        arrow-up
        4
        ·
        9 days ago

        I would probably argue they are the same in terms of security and privacy. Privacy communities tend to disfavor Proton because its all eggs in one basket, and also for political reasons. Both of those are subjective to your personal threat/privacy profile.

        Its true that a single point of failure is more risk than separate services, but that fact doesn’t undermine their security on a technical level, and has nothing to do with privacy. As for the political, yes it’s something to watch but nothing wrong has been done. They are set up as a non profit with checks and measures in place to prevent corruption from happening. I’m OK with different points of view and having different points of view on a board is a good thing.

      • edel@lemmy.ml
        link
        fedilink
        English
        arrow-up
        8
        ·
        9 days ago

        Technically speaking is highly contested and you have arguments pro and con, one way an another. They use different technologies so it is hard to compare properly, specially since it depends on the users using it properly.

        If the technology is good, it does not matter where it is located. Switzerland, specially since a couple of years, does provide more freedom guarantees than Germany but it is not immune at all, actually, the US had used the Alpine country to do operations due to its attractiveness to dissidents and criminals alike. However, for the overwhelming majority of customers, either option is fine for they privacy and security. Only metadata has been obtained in few instances in both companies and nothing else… at least no that was used in a court of law.

        For ultimate targets, if they have to rely on email, that they should not, I would choose Tuta though. These are my reasons.

        1. It has a lesser footprint, so less likely intelligence agencies tried to infiltrate it.
        2. The people behind are there fro the very beginning and show their faces publicly (Many in Proton too like the CEO, but it is no so transparent with the rest)
        3. The people of Tuta are more ideological so it is a barrier for intelligent services to penetrate. Tuta has show however being anti the Russian government (rightly or not), so this point is not valid if you are in that side.
        4. Tuta has a very organic and progressive growth. Proton had an explosive growth. Of course, it could been good marketing, but still…
        5. Proton still today requires Google’s Push Notification servers, after years and years demanding a solution. Tuta had that solved since long, long ago.
        6. Recently a case came in Canada of a intelligent agent using Tuta since “it was infiltrate by intelligence agencies”… After a few hours going through the case, I read it the opposite, he used it because he actually considered it a better choice to cover his crime. He was not that high in the ranks, but I read that the he resumption o these officers.
        7. Nothing regarding security, but as a paying customer for both I was “tricked” far less by Tuta. Proton, for instance, does not refund you, only gives you credits. Even 20min after an accidental 2yr renewal I got stuck with them unwillingly. That practice should never be acceptable for a SaaS.

        Now, Proton overall, for most is a bit more reliable and full feature and better put together so it is easier to recommend. Think of Proton as the Apple of emails, quite secure and miles away from Gmail, but security wise and ethically, of the two, my bet would be with Tuta.

      • errer@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        3
        ·
        9 days ago

        The CEO of Proton has tried cozying to Trump and any company led by a guy who does that is knocked down several notches for me

        • chingadera@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          9 days ago

          If any service is at the whim of someone’s emotions or opinions, it’s at the bottom, and it should stay there.

          Let the program be the program, and if we can’t see how it’s written, assume the above is true.

          Foss or die

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        9 days ago

        Its not. They don’t even sign their releases or support PGP

        Tuta is not a proton replacement

      • edel@lemmy.ml
        link
        fedilink
        English
        arrow-up
        9
        ·
        9 days ago

        Wow… I use Aegis exclusively as my authenticator since 2 years ago and completely did not recognize the logo by itself!!! I used Yandex image search and it told me coincarp… Sorry.

  • tisktisk@piefed.social
    link
    fedilink
    English
    arrow-up
    75
    arrow-down
    2
    ·
    9 days ago

    TIL I’m a privacy activist–who can help me get to the ghost mode?
    (Do I even want to get there or is that limited to journalists who have entire states trying to unalive them?)

    • Rose56@lemmy.ca
      link
      fedilink
      arrow-up
      3
      ·
      9 days ago

      You should stage your death, like they tried to do on prison break and then move to Mexico or Columbia. Send me a DM for more information /J

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      55
      ·
      9 days ago

      Do I even want to get there

      Only you can answer that.

      or is that limited to journalists who have entire states trying to unalive them?

      Pretty much, but if you want to give up all technology, work for yourself, and fake your death, then more power to you!

      • Rozz@lemmy.sdf.org
        link
        fedilink
        arrow-up
        1
        ·
        8 days ago

        Do you like living in the woods and not enjoy technology (or can live perfectly happily without it)?

      • jaybone@lemmy.zip
        link
        fedilink
        English
        arrow-up
        14
        ·
        9 days ago

        Seems like faking your death would cause more privacy problems than it solves. Why not just “stay alive” with a completely innocuous identity? Then adopt some new identity which cannot be traced back to the original?

        • The 8232 Project@lemmy.mlOP
          link
          fedilink
          arrow-up
          5
          arrow-down
          2
          ·
          9 days ago

          If you’re alive, you are asked for documents such as property records, taxes, etc. and if you refuse then bad things happen. If you fake your death, no more questions are asked and you can take on fake identities. In essence, faking your death takes your identity out of “the system”

    • murky0106@lemmy.world
      link
      fedilink
      arrow-up
      17
      ·
      9 days ago

      limited to journalists who have entire states trying to unalive them. Don’t live your life in fear

    • PieMePlenty@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      9 days ago

      Easier than you think it is. Hard to keep at it. All you need to do is stop using a phone or computers. Death cert is only needed when you’ve been compromised and people are out to get you. Gold isnt really usable unless you stumble onto a secret underground society where all trade is done in gold. Realistically, you’d sooner be trading goods (or services) for other goods (or services).

      This level technically shuns technology and that brings its own challenges. Its like saying you cant have privacy with technology. I dont necessarily agree with this statement so I’d say don’t go to this level.

  • Matt@lemmy.ml
    link
    fedilink
    arrow-up
    19
    ·
    7 days ago

    Just tell the normie that you have nothing to say if you have nothing to hide. Also, why there’s no F-Droid?

  • utopiah@lemmy.ml
    link
    fedilink
    arrow-up
    37
    arrow-down
    1
    ·
    9 days ago

    On browsers, as you put Chromium then also put Firefox or deMozillaed Firefox e.g. WaterFox.

    I’d put Brave back to the 2nd layer due to relying on Chromium and being heavily marketed while gathering data for its crypto scheme. I’d also put Firefox on the 2nd or 3rd layer.

    • hansolo@lemm.ee
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      10
      ·
      edit-2
      9 days ago

      FF doesnt deserve much better than Brave as it sends telemetry, so both on tier 2. LibreWolf would fit for tier 3 or maaaybe 4.

      • utopiah@lemmy.ml
        link
        fedilink
        arrow-up
        13
        ·
        9 days ago

        Do you trust this preference panel on telemetry? If not why not? If you do believe it is legit what do you believe it remains problematic?

          • utopiah@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            8 days ago

            I’m not sure what’s that’s supposed to show as “there are built in settings for some of this stuff, it’s not complete and many settings are abstracted away from the user. Enter about:config” since it might be hierarchical, i.e. disabling a single telemetry toggle, either via Preferences or about:config might disable all the other ones. I haven’t looked specifically at that part of the code of Firefox but I’d trust more a Wireshark analysis than this since it doesn’t actually show (unless I missed that part, quite possible as it’s relatively long) that information does actually go back to Mozilla even while one has disabled all telemetry option.

            Fingerprinting is fair, in the sense that yes, if you do broadcast your userAgent and other public information you do narrow the potential search space and thus expose you as an individual more, yet has nothing to do with Mozilla.

            • hansolo@lemm.ee
              link
              fedilink
              English
              arrow-up
              1
              ·
              8 days ago

              But we’re taking about this in the context of this infographic. So we have to distill this down to:

              Should FF be with, or above, Brave?

              I assume we’re also taking about relatively low-barrier changes that most users can implement. So vanilla FF vs vanilla Brave, there’s a difference. Can we harden FF? Sure. Will 95%+ of people do that with Librewolf or 3 dozen other forks out there? Why bother when there’s nuance to be gained with other forks? So now vanilla FF stops being relevant.

              And to be clear, I don’t use Brave unless I absolutely have to. I don’t love it, but vs. normie Vanilla FF, there’s a slight edge.

              • utopiah@lemmy.ml
                link
                fedilink
                arrow-up
                4
                ·
                8 days ago

                Up to you and OP but the fact that there isn’t even Firefox or LibreWolf or WaterFox but there is Chrome, Brave and Chromium is problematic to me. At the very least Firefox should be there and IMHO below Chrome.

  • Owl@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    2
    ·
    9 days ago

    You play games on steam? clearly brainwashed.

    also how dare you slander Malwarebytes like that

  • nossaquesapao@lemmy.eco.br
    link
    fedilink
    arrow-up
    111
    ·
    9 days ago

    Funny how you need more and more technical knowledge to go deeper into privacy, until the last level, which is basically giving up on technology itself.

  • PraiseTheSoup@lemm.ee
    link
    fedilink
    arrow-up
    5
    ·
    9 days ago

    I use Keepass but mostly for convenience and I don’t understand why it’s in the 5th category. If I have 50 different accounts with 50 different passwords but they can all be had with one keepass password, how is that different than having 50 different accounts all using the same password?