
Little Snitch on a Mac.
Little Snitch on a Mac.
There are an infinite number of programs that could do this. Will they? Probably not.
Best thing is to install a trustworthy personal firewall, and block all outbound network access for all processes, and then enable as needed. This won’t stop Windows itself, but it will give you a heads-up if something else is trying to send data somewhere and you can make an informed choice at the time.
“Peak” is rather optimistic….
The one I use is part of a hardware UTM, but I also use Lockdown VPN on iOS, and https://pi-hole.net/ in a container on my LAN, and then VPN all my devices to my home network when I’m not at home.
Depends on the browser/OS.
My go-to for general browsing is Firefox with uBlock Origin and NoScript, which I also use in Edge; I have a few browsers that are still using uMatrix, and I have a proxy filter that strips calls to .js URLs by default except for specifically allowed URLs.
This is why using a local web proxy is a good idea; it can standardize those responses (or randomize them) no matter what you’re actually using.
Personally, I keep JavaScript disabled by default specifically because of this, and turn on those features per-site. So if a website has a script that requires the accelerometer for what it does, that script gets to use it. Other sites keep asking for it? I suppress the requests on that site and if it fails to operate (throws one of those ad blocker or “you have JS disabled errors), I just stop going to the site.
I’ve found that with everything disabled by default, browsing the web is generally a pleasant experience… until it isn’t.
This of course requires using a JS management extension. What I’d really like to see is a browser that defaults to everything disabled, and if a site requests something, have the browser ask for permission to turn on the feature for that particular script, showing the URL for the script and describing what the code does that needs the permission. This seems like an obvious use for locally run AI models.
Thing is, privacy isn’t binary; it isn’t even a spectrum. It’s an amorphous 3-dimensional cloud.
Total privacy means that nobody else knows you even exist. Nobody wants total privacy, even if they think they do.
What most people want is for governments and corporations to not be able to track their day to day activity, malicious actors to not have access to their identity and financial data, and individuals to only have the information about them needed to connect and relate in society.
The first thing anyone needs to do is create their own privacy and threat models. Identify your personal risks within those models and adapt as needed.
For instance, using a cellphone of any type means you’re using a location tracker. Same goes for any vehicle with a built in cellular device. That information is available to specific corporations as well as government agencies and sometimes third parties with money.
Is it worth giving up that level of privacy to be connected to other people in most places you’d be likely to go? That’s up to the individual.
Same goes for libre software and hardware.
The craft was designed to land on Venus unharmed; it is likely in one piece at the bottom of the ocean.
But to publish on AltStore, you need a developer account, which already provides free publishing on Apple’s App Store.
The big difference is that you can publish anything that can be notarized instead of being limited by Apple’s reams of regulations. But you still have to abide by the Apple Developer agreement.
At least AltStore doesn’t require a big sideloading song and dance anymore. But I stopped using it once the software I used it for became available on the App Store.
And Riley’s going to have to deal with malware and scams now :/
Buying with cash is useful, or else someone is still selling your purchase patterns.
And turn your phone off before you go in the store.
Since we’re discussing Windows privacy here…
What I’d really like is something that creates a situation like VeraCrypt plausible deniability, but where the base image gets updated regularly so that the timestamps and temporary file usage also look plausible for a computer used today.
Then instead of running an app like this, you just log out, and when you log in with the wrong password, it presents a plausible if mostly empty userland that overwrites the real encrypted data as new files are written to disk.
And in recent years, VPN abuse by malicious actors has gone WAY up. Well, either that or the ability for InfoSec practitioners to trace the threat actor back to the VPN has gone up. Or a combination.
I don’t have these legitimate concerns, and I STILL keep stuff like that as thoughts in my head. The only reason I’d journal my thoughts is if I eventually wanted someone to read them.
I keep my journaling for things I actually do in real life that I want to keep track of.
What is the purpose for writing it down? When you know that answer, then you look for the safest way to accomplish that purpose, which probably isn’t a diary.
Realistically, what the article suggests to me is that I should carry a burner phone when crossing borders and if I need my real phone, turn on lockdown mode and then turn it off and stow it in my luggage with the understanding that it may get confiscated and never returned.
Probably worth reading the article. There are consequences to saying “no” at the border.
That’s the point. Windows 11 cannot be made to be a private OS. So you have to adjust your privacy model instead if you want to use it.
Censorship is when the government blocks otherwise free speech.
Depends on who does it and why.
The US government blocking access to .ca by US citizens? Yeah, that’s censorship.
Your ISP blocking access to .su domains? Nope.
A web server blocking access to .br domains? Again, no.
Er, your instructions don’t kill all the telemetry that makes Win11 so privacy invasive.
Unfortunately, your comments about security are spot-on — there have been a number of improvements in the latest Win11 releases that were never added to Win10.
So while Win10 can be tweaked to be a relatively private OS, you need to update to the latest Win11 for security, or switch to a non-Microsoft OS.
Remember that fingerprinting can be your friend… because it’s much easier to fake an online fingerprint than a real one.
You can generate a unique fingerprint with each online interaction; this means that you will always have a unique identity.
Or, you can ensure you always have the same fingerprint as a large number of other people.
Think of it as the difference between using a different valid loyalty card each time you shop vs using one of the famous numbers that millions of other people are also using.
Of course, in both circumstances, you do give up the benefits of being uniquely identifiable.