Em Adespoton

  • 0 Posts
  • 192 Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle





  • Em Adespoton@lemmy.catoPrivacy@lemmy.world...
    link
    fedilink
    English
    arrow-up
    1
    ·
    20 days ago

    So… in the wake of a murder that had nothing to do with drones, AI, hacking OR terrorism, the FBI feels there will be an increase of all four… why?

    Or is the murder being called terrorism because it’s made the 1% feel less safe?

    As for the means… obviously these are areas the FBI doesn’t feel it currently has under control, where any citizen can leverage the technologies to bypass the FBI’s current defenses.








  • The main defense against VPN timing attacks is to ensure your VPN exit node isn’t somewhere that the same person would have access to as your connecting IP.

    That said, if someone runs a website or service where you have a unique login or custom token and they have access to your ISP’s connection logs… a standard VPN will once again give you away. This is why TOR exists.

    I generally argue that an exit VPN doesn’t really provide much privacy; the only real services it provides are georelocation and protection against low effort bulk filtering (eg, identifying torrenters or bulk metadata collection).

    For everything else, either encryption and third party DNS is enough, or the exit VPN isn’t enough to stop targeted surveillance.








  • One clarification: carrier towers can still find a phone; GPS is passive; your phone locates itself in relation to the GPS satellites.

    Most phones are also broadcasting WiFi MAC IDs and Bluetooth MACs, plus hardware and capability strings over Bluetooth. And then any apps you’ve got loaded may also be calling home with your location unless you have that disabled and rotate your ad ID regularly.

    [edit] also worth pointing out that even if you turn a smartphone “off” it still pings the local cell towers with its IMEI regularly. Surprised me the first time I witnessed that.