[-] relic4322@lemmy.ml 1 points 7 hours ago

Looks fantastic, great work!

[-] relic4322@lemmy.ml 1 points 1 day ago

I will also say that what I have listed is for my known digital foot print. If you catch my drift.

[-] relic4322@lemmy.ml 1 points 1 day ago

You are right. It's the choice I've made. I'm decided that I would rather have the lock down because I no longer think that being anonymous means anything. It's my opinion that due to the rise and ease of apply AI/ML and computational access we are all data points. So it's no longer a matter of blending in.

TLDR, I weighed the two and chose this

[-] relic4322@lemmy.ml 1 points 1 day ago* (last edited 1 day ago)

They aren't open. But yes. It would be if they were. The are open within my VPN. :)

[-] relic4322@lemmy.ml 3 points 3 days ago

The problem with hardening your system is that you become more identifieable unless you provide fake data. For example, here are my test results from coveryourtracks.eff.org

Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 2054.58 browsers have the same fingerprint as yours.

[-] relic4322@lemmy.ml 2 points 3 days ago

plugins are definitely detectable. just came across this, worth checking out your browser security.

https://coveryourtracks.eff.org/

[-] relic4322@lemmy.ml 9 points 3 days ago

everything you do to customize your browser makes your browser fingerprint unique. but you have a mostly unique fingerprint due to things you arent considering as well. system related stuff that your browser tells about you.

you have some options. 1) there are addons that limit privacy issues, 2) use a local web proxy, im using squid proxy for example just have it running on an old laptop. Optionally, I would also say, from a privacy standpoint look into DNS blackholing pihole, unbound, etc, and there are plenty of other things.

my favorite addons are ublock, privacy badger, i run noScript which is probably more painful than most are willing to put up with but I have heard that jShelter is a good compromise.

[-] relic4322@lemmy.ml 7 points 3 days ago

I have been thinking about this a lot recently. I live a life where OPSEC is relevant. Its something that I have had to consider always, and has been for 2 decades. Even so, I wasn't as concerned this whole time as I am these days. The fact is that technology is making it such that its no longer "im not a person of interest they wont spend resources on me" because data crunching is happening to such an extreme, on such a grand scale, that person of interest doesn't even matter. Do you exist, yes. Do you have a digital foot print, yes you do. Even if you dont do a lot online. Your metrics are being captured and being inferenced, and systems are using predictive analysis to determine what you "may" do in a given situation. Depending on who controls those systems they may decide not to give you a chance to make that choice.

Ill I can say is that there are a large number of groups that want your data, for a lot of different reasons, and none of them are for your benefit. So, are you going to let them have it, or are you going to take steps to reign in the amount of info you leave about?

[-] relic4322@lemmy.ml 2 points 3 days ago

Checking out RethinkDNS right now, this looks great! Thanks. Was tracking most of the other stuff, that stuff holds true on computers as well, but on mobile I was kinda drawing a blank.

[-] relic4322@lemmy.ml 5 points 4 days ago

totally arbitrary, lol. Im used to DNSSEC, saw DoT and DoH about the same time, think I saw a write up that used DoT and just went for it. Havent even compared DoT vs DoH, but DoH reminds me of Homer Simpson cuz im old XD

[-] relic4322@lemmy.ml 11 points 4 days ago* (last edited 4 days ago)

Brutalism and Art Deco, not together obviously, but +1000 points to Affordable Housing @supersquirrel@sopuli.xyz lol

[-] relic4322@lemmy.ml 15 points 4 days ago

Its funny to qualify and not go after it. After exploration I found the same things. Whats the point? Only thing I could find was hey you can hang out with smart people.

Its lonely being SMRT so this seems like it might be a good thing, but you know what... you put a bunch of smart people in a room and they are all used to being the smartest in a group and its insufferable.

Better to not bring it up, and just find people that share your hobbies tbh.

67
submitted 4 days ago by relic4322@lemmy.ml to c/privacy@lemmy.ml

So DNS Black-holing is not new obviously, and what stands out as the go to solution? Pihole probably... and yeah thats what im using because hey its a popular choice. Though I am running it in docker. Combining that with Unbound (also in docker), and configuring outbound DNS to use DNS over TLS, with a few additional minor tweaks, but otherwise mostly standard configuration on both.

Wondering what you guys might be using, and if you are using Pihole and/or Unbound if you have any tips on configuration.

Happy to share my config if there is interest.

296
submitted 5 days ago by relic4322@lemmy.ml to c/privacy@lemmy.ml

At this point it not about passive collection, corporations are going to extreme ends to get our data.

https://www.zeropartydata.es/p/localhost-tracking-explained-it-could

I am interested in what people are doing to enforce their privacy while using the web.

I have some things in place, looking to compare with the community.

(btw, I am new here, this is my first post. So uh… Hi )

view more: next ›

relic4322

joined 1 week ago