• 0 Posts
  • 23 Comments
Joined 2 years ago
cake
Cake day: September 26th, 2024

help-circle





  • I deleted one I didn’t even remember having. Something I created back when I first got a smart phone and as much as I recall think I used it for the primary phone login account and had my separate emails just in the client.

    Only got reminded of it when they sent an email to my main address saying it had been inactive for years and was going to be deleted anyhow, so went through this process where they unlocked it after a month of waiting to see what was in there before shutting it down. Was pretty much blank from the start so it doesn’t really matter if they actually deleted it or not.

    How my main email got set as a recovery is another question, probably just many years back brain not being so good at keeping online identities siloed.






  • It’s interesting that this is kicking up some controversy. Personally I’ve held similar thoughts since the time of AOL, that once it leaves your system it’s no longer in your control. You can ask people to delete it, and maybe they did, or maybe they deleted the one copy but not the cache version, or maybe just didn’t and lied about it. I’ve actually accidentally found stuff I thought was long lost when I decided to just mess around with some data recovery tools and pulled a bunch of pictures back from a drive I didn’t remember them ever being on.

    One of my kids I saw take a picture of a snapchat with another phone. Asked what they where doing and it was explained that if you do a regular screenshot it notified the other person, so this was how they kept a copy secretly. So with that in mind, you never know who has copies of what that was posted.


  • ShellMonkey@lemmy.socdojo.comtoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    3
    ·
    edit-2
    1 year ago

    This isn’t new, cell tower triangulation is a fact of the network operation and is part of how your signal gets handed off between towers as you travel. Airplane wouldn’t do anything unless it where to actually disable the sim entirely, and functionally even that doesn’t cut it in the USA given that a device without one can still connect to emergency services via any tower in reach.

    This is just the carrier giving a customer the data that would already exist, for a price, which I thought T-Mo actually used to give for free…








  • ShellMonkey@lemmy.socdojo.comtoPrivacy@lemmy.mlWhy is privacy a luxury
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    TOR is just slightly harder to keep up on as far as being listed on the same tables as commercial VPN hosts because it’s so dynamic. Anyone can spin up a node and be a relay or, for the brave/foolish, an exit node in a few minutes.

    Privacy largely comes from a plausible deniability in that the person asking for a site could be the originator or they could just be relaying a request for the originator. Freenet, or now called hypha net is similar that way.

    My perspective on internet privacy has long been that while I don’t expect to be a ghost, I can make the picture as muddy as I can to make whatever profile they gather be as useless as possible.


  • From the infosec practitioner perspective the number of bad actors coming from public VPN pops is exceptionally high compared to any other random IP, so they get put on a naughty list. We often cut out entire countries just because they have such a high ratio of bad 2 good traffic, particularly if it’s a country that we have no real expectation of user traffic originating from.

    It’s not so much a VPN bad, but just that you’re hanging out with others that act bad. Kind of the Nazi bar thing but for hackers. If you set up a private VPN somehow on a random cloud host you likely wouldn’t see the same issues, how to keep the ownership anonymous though is another problem.