this post was submitted on 30 Aug 2024
161 points (92.1% liked)
Privacy
32179 readers
735 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
All the crypto in the world won't help if you do stupid stuff and have crap OPSEC.
A big part of that is stay under the radar. If I were NSA I'd be running a great many TOR nodes (both relay nodes and exit nodes) in the hope of generating some correlations. Remember, you don't need to prove in order to raise suspicion.
So for example if you have an exit node so you can see the request is CSAM related, and you run a bunch of intermediate nodes and your exit nodes will prefer routing traffic through your intermediate nodes (which also prefer routing traffic through your other intermediate nodes), you can guess that wherever the traffic goes after one or two relay hops through your nodes is whoever requested it.
If you find a specific IP address frequently relaying CSAM traffic to the public Internet, that doesn't actually prove anything but it does give you a suspicion 'maybe the guy who owns that address likes kiddy porn, we should look into him'.
Doing CSAM with AI tools on the public Internet is pretty stupid. Storing his stash on cell phones was even more stupid. Sharing any of it with anyone was monumentally stupid. All the hard crypto in the world won't protect you if you do stupid stuff.
So speaking to OP- First, I'd encourage you to consider moving to a country that has better free speech protections. Or advocate for change in your own country. It's not always easy though, because sadly it's the unpopular speech that needs protecting; if you don't protect the unpopular stuff you jump down a very slippery slope. We figured that out in the USA but we seem to be forgetting it lately (always in the name of 'protecting kids' of course).
That said, OP you should decide what exactly you want to accomplish. Chances are your nation's shitty law is aimed at public participation type websites / social media. If it's important for you to participate in those websites, you need to sort of pull an Ender's Game type strategy (from the beginning of the book)- create an online-only persona, totally separate from your public identity. Only use it from devices you know are secure (and are protected with a lot of crypto). Only connect via TOR or similar privacy techniques (although for merely unpopular political speech, a VPN from a different country should suffice). NEVER use or allude to your real identity from the online persona. Create details about your persona that are different from your own- what city you're in, what your age and gender are, what your background is, etc. NEVER use any of your real contact info or identity info.
Feasibility aside, the shitty laws in question attacks content hosting platforms first(safe harbor laws). So no matter how many vpns i hop through, the site would simply limit the visibility of my post in the region and go about their day.
Yes exactly. This is a big part of why some repressive countries are starting to require identity registration in order to participate in social media. Arresting people is unnecessary if you can simply stamp out non-preferred speech at the point of discussion.