The Privacy Iceberg

This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.

Transcription (for the visually impaired)

(I tried my best)

The background is an iceberg with 6 levels, denoting 6 different levels of privacy.

The tip of the iceberg is titled “The Brainwashed” with a quote beside it that says “I have nothing to hide”. The logos depicted in this section are:

The surface section of the iceberg is titled “As seen on TV” with a quote beside it that says “This video is sponsored by…”. The logos depicted in this section are:

An underwater section of the iceberg is titled “The Beginner” with a quote beside it that says “I don’t like hackers and spying”. The logos depicted in this section are:

A lower section of the iceberg is titled “The Privacy Enthusiast” with a quote beside it that says “I have nothing I want to show”. The logos depicted in this section are:

An even lower section of the iceberg is titled “The Privacy Activist” with a quote beside it that says “Privacy is a human right”. The logos depicted in this section are:

The lowest portion of the iceberg is titled “The Ghost”. There is a quote beside it that has been intentionally redacted. The images depicted in this section are:

  • A cancel sign over a mobile phone, symbolizing “no electronics”
  • An illustration of a log cabin, symbolizing “living in a log cabin in the woods”
  • A picture of gold bars, symbolizing “paying only in gold”
  • A picture of a death certificate, symbolizing “faking your own death”
  • An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing “hiding ones identity in public”

End of transcription.

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago

      “As seen on TV” does not imply privacy, it just implies a large advertising budget. These are software that market themselves as private (and are sometimes better than nothing at all) but may still be just as bad as software on the tip of the iceberg.

  • nossaquesapao@lemmy.eco.br
    link
    fedilink
    arrow-up
    3
    ·
    1 month ago

    Funny how you need more and more technical knowledge to go deeper into privacy, until the last level, which is basically giving up on technology itself.

  • recklessengagement@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    1 month ago

    I think this is the first time I’ve seen an iceberg meme with sources and explanations for each item. Fantastic. Your work is appreciated.

    • comfy@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago

      To be honest, and it wouldn’t work here, but I sometime enjoy the cryptic nature of iceberg memes at the lower ranks. It’s like a scavenger hunt.

  • mmhmm@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    1 month ago

    I was at the bike shop a few weeks back and a ghost walked in. He came in wearing a medical mask covered by a bandana, sunglasses, cap. They wore gloves, long sleaved pants and shirt.

    First question from staff, ‘this a robbery?’

    Ghost, ‘no, I just need 27 2.5 tubes, miss.’

    They get the tubes, he agrees. Staff asks if he has an account. Ghost says, “nope, why would I need one?” Staff says they do it for records, insurance claim assist, and discounts. Ghost goes with a John Doe, pays cash and peaces the fuck out.

    Total King, but dude was given up a lot. Half of us were drinking beers enjoying a warm evening in spring. I hope he has had some good rides.

    I can say with confidence thay he was a white male. In his 50s. About 5’10". 140 lbs-ish. If anyone wants to get any tips, good luck!

  • tisktisk@piefed.social
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    TIL I’m a privacy activist–who can help me get to the ghost mode?
    (Do I even want to get there or is that limited to journalists who have entire states trying to unalive them?)

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      2
      ·
      1 month ago

      Do I even want to get there

      Only you can answer that.

      or is that limited to journalists who have entire states trying to unalive them?

      Pretty much, but if you want to give up all technology, work for yourself, and fake your death, then more power to you!

      • jaybone@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 month ago

        Seems like faking your death would cause more privacy problems than it solves. Why not just “stay alive” with a completely innocuous identity? Then adopt some new identity which cannot be traced back to the original?

        • The 8232 Project@lemmy.mlOP
          link
          fedilink
          arrow-up
          1
          ·
          1 month ago

          If you’re alive, you are asked for documents such as property records, taxes, etc. and if you refuse then bad things happen. If you fake your death, no more questions are asked and you can take on fake identities. In essence, faking your death takes your identity out of “the system”

  • ISOmorph@feddit.org
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    Can you explain why you would think Steam is so bad? I would argue they’re pretty fair, especially with the option to buy steam cards for cash to not disclose your personal data. Does the client do some unsavory shit?

    • lazynooblet@lazysoci.al
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      1 month ago

      Seeing steam at the top makes me question the list. Likely a hate of DRM rather than privacy

      • lb_o@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        Yeap, and Brave in the middle. They only pretend they are for privacy, but they are the very opposite.

        • dogs0n@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          1 month ago

          Yeah i hate when I see people using Brave, because they have been brainwashed.

          Does anyone remember when they were injecting their own referral links into links for online stores (99% certain they did this pls prove wrong if you know better)? This alone leaves them with 0 trust in my books.

          • const_void@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            1 month ago

            Brave is and always has been gross. Never understood how they’ve been so successful at tricking people into installing it.

  • LeTak@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    1 month ago

    Tried the Privacy Activist and Enthusiast section. Was not really fun and you loose connection to most of your friends and family. Now I have a balanced setup with something out of each layer. Perfect balanced, as things should be

    • Hellmo_luciferrari@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      I have taken my own approach; there are things from each layer that I use. Some begrudgingly but others gladly.

      The problem I faced when starting this journey is it does cut out a lot of people. And it becomes isolsting. So I did reel back a bit.

      • Natanox@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        It’s equally frustrating to talk to people who’re completely entrenched in the Enthusiast / Activist section. The utter disconnect when it comes to what’s viable for most people is annoying to deal with sometimes. Statements like “Everyone who is able to read can easily learn to use Arch Linux” or “Everyone can flash their phone” do give me headaches. Was there, did both, wouldn’t recommend to my less nerdy family.

        • net00@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 month ago

          The FOSS circlejerk for lack of better term is very loud on Fediverse as a whole. It’s tiring when each time anyone mentions using Windows, or Apple there’s at least one fucker telling you to swap to linux lol…

          It’s very loud so I have thought at times to switch back to reddit, where it’s at least less pervasive.

  • rekabis@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Any Chromium-based browser in anything but the top-most panel is a non-starter with their abandonment of Manifest v2. Manifest v3 seriously cripples any Chromium-based browser’s ability to be secure, as extensions like uBlock Origin are no longer compatible by design.

    Google has it’s ad business to protect, after all.

      • wolfinthewoods@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        So what’s the deal with i2p? I heard it was a more secure alternative to vpns, I downloaded it but I haven’t been motivated to figure out how to set it up on Linux.

            • swelter_spark@reddthat.com
              link
              fedilink
              English
              arrow-up
              0
              ·
              1 month ago

              In some ways I2p is more secure, but it has its own pros and cons. It’s primarily used with services & sites within its own network, similar to onion sites, and used that way it’s said to be faster than Tor. It can be used for torrenting with a client that supports it, like qBittorrent or BiglyBT, without harming the network. There are outproxies you can use if you want to anonymize access to normal websites, but there’s only a few of them, and it’s slow. You can have it and Tor running at the same time without them interfering with each other, though.

              • wolfinthewoods@lemmy.ml
                link
                fedilink
                English
                arrow-up
                0
                ·
                30 days ago

                So, it sounds like you’d be better off just running Tor or a vpn unless you have a specific use-case for i2p. I looked briefly at the install instructions, but it seemed to be like it would be a hassle to initially setup on my linux build.

                • swelter_spark@reddthat.com
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  edit-2
                  28 days ago

                  I think that would be fair to say. I mostly run it to contribute to the network, so that other people can communicate or share files more privately. (On OpenSuSE, it can be installed from the repo and just run with no special configuration.)

  • prinzmegahertz@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    What’s the issue with steam? I thought the epic game store was the one actively spying on your device

    • Broken@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago

      Steam has telemetry. They gather a ton of data on you. What details, how they use it, and how secure it is I can’t answer, but it’s clear that it’s happening.

  • MajesticElevator@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    1 month ago

    Sadly, using small niche VPNs that might be more trusted makes you stand out more. It’s pretty unusual to have a Mullvad user on your server

    They don’t rotate IPs as well so a lot of them are blacklisted… and don’t offer port forwarding anymore

    I wish they could change IPs reguarly and add port forwarding back :-( - I would happily pay for their service again

    Because 5€ for their current service is overpriced

    • dogs0n@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 month ago

      Sadly, using small niche VPNs that might be more trusted makes you stand out more.

      This probably doesn’t matter does it? Because being spotted as a mulvad, airvpn, etc user doesn’t make you more of a target for anything.

      It just means that if they try to trace your connection back to you, they won’t find anything out, because you have a trusted zero-logging vpn.

      Only think I could see is it could potentially be easier to track usage through the ip and assume it’s one person, but idk you could do that with anything if you look at the request timings, etc. It’s still just guesses.

      Am i missing something?

      It’s pretty unusual to have a Mullvad user on your server

      Probably not on the usual sites people visit (youtube, etc, the big sites 99% of ppl go to exclusively), but I can see your point for any smaller site.

      Because 5€ for their current service is overpriced

      Airvpn provide a discount for each extra month you sign up for in bulk which is nice. It’s a great service in my opinion.

      https://airvpn.org/

  • PraiseTheSoup@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    I use Keepass but mostly for convenience and I don’t understand why it’s in the 5th category. If I have 50 different accounts with 50 different passwords but they can all be had with one keepass password, how is that different than having 50 different accounts all using the same password?

    • IttihadChe@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 month ago

      ~ how is that different than having 50 different accounts all using the same password?

      Because the password manager would have to be hacked itself.

      If you just use the same password for everything, any of those 50 sites could be hacked.

    • Dessalines@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 month ago
      1. With a long enough passphrase, your keepass db is uncrackable by any current tech.
      2. If you have 50 accounts using the same password, if any one of those websites get hacked, they now have access to every other account.