• 3 Posts
  • 64 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle



  • I did read this part, and while this is generally true, there are use cases of such large models. Some of them require the input of personal data (find bugs in my code, formalize this email, scan this picture for text and translate it, draw an anime version of this picture of my friend tom)

    So people being weary of security implications of such large models are certainly not

    in a huge circle jerk that never ends, but refuses to understand how it all works.

    Sure you can just call them all dumb using ai like the mainstream (putting in personal data) and attribute it to an unwillingness to understand, but this doesn’t match the reality. Most people don’t even understand how an operating system functions, which components work online and which offline and who can access which of their information, let alone know how “AI” works and what the security implications are.

    So If people ask those questions, hoping there are alternatives they can use safely your answer “no, u just dumb, machine can’t harm you, its not magic, just don’t put in data in”

    Is not only rude but also missing the point. Most usefull/fun/mainstream ways DO in fact, put in data.

    You explaining basic models also doesn’t help, as the concern here is not mainly/only the model, but american spy institution to access all prompts you did put in, maybe categorizing you in personality clusters dependent on your usage of language or assigning tags on which political stance a users has (and with entities like the NSA I could imagine far worse)

    Also “A model is a model” Is not very accurate in such cases. When someone has control and secrecy over each aspect of the model, it would be very well possible for entities like the NSA to manipulate the content the models puts out in arbitrary directions. A government controlling and manipulating information the public receives is a red flag for a lot of people (rightfully so IMHO)

    How are people supposed to get better in digital privacy topics if you just tell them to shut up and insult them when they aks questions trying to learn? You acting like you are in your Elfenbeinturm of genius isn’t helping anyone.


  • There is a difference between a general scare about the AI buzzword and legitimate distrust in online services which are closely connected to american spying institutions (regardless if they are ai or not)

    If my calories tracker app would apoint a (former) NSA official on their board, I would be looking for alternatives too. This is not about AI, this is about a company with huge sets of private data being closely interconnected with american spy institutions.

    Sad that you don’t seem to be able to distinguished between legitimate security questions and badly informed hypes/scares ass soon as a buzzword like AI occurs








  • Exactly. If you want to be 100℅ sure you don’t get tracked AT ALL you can’t use the internet.

    The second you connect metadata is gained by ISP and all the servers which get called. This can be enough to track you down for powerful entities like the government.

    If only your aunt may with a evening school IT course is your threat, a pin and graphene os is probably enough

    Also OP mentioned his sim card is registered on his real life name, so having that connected to cellphones is enough to track you if you have a warrant to force your internet service provider to share the information




  • You always need to ask: which data do you want to protect.

    If its position data and calls: nothing, it really doesn’t matter what phone you use if the connection is not secure.

    If its communication via messenger like matrix: you are already quite good protected with graphene os and matrix from a safe source.

    If its Trojans from the police: don’t download any software/apps/services that are not open source and widely reputable. (Most rich western states can probably still get full control if they want to because of zerodays)

    If you want privacy for calls: get a simcard without your name/Iban/PayPal/creditcard etc attached to it in any way (prepaid with cash), Reset the phone, drive somewhere where you don’t work or live with phone off Insert simcard and turn on phone. Wait Turn off phone and disable sim card Use only WiFi until you really need sim service (best not at your home or work).

    If you want to protect data on phone: don’t have biometric login (you can be forced to put your finger on the sensor, you can’t be forced to type in a password as easily)

    Netguard, shelter, only FOSS software, regular updates, no cloud, no google is never a bad idea, also only communicate via safe encrypted protocols (matrix, xmpp, pgp, https, etc., NOT WhatsApp, Facebook, unencrypted mail, http, SMS, calls)

    EDIT: people here mentioned that graphene has a build in firewall, which you can use instead of netguard. I have netguard running though as I know the interface and options, have separate profiles for shelter and normal and don’t use a VPN anyway.


  • To be honest, if kyc means what I think it does (I am not from the states) so that your provider knows your real identity, this phone with this sim will not be private, especially not when constantly connected to cell service.

    With a warrant the local police could force your provider to tell them to which cell phone tower you are connected to, effectively giving them live position data. They can also read all unencrypted trafic this way (calls, SMS, telegram, http traffic etc.)

    If your thread level is the police, you already f’d up, sry :/


  • SomeLemmyUser@discuss.tchncs.detoPrivacy@lemmy.mlPixel 8A and Grapheneos
    link
    fedilink
    arrow-up
    6
    arrow-down
    3
    ·
    edit-2
    1 month ago

    Plus: its google/us hardware. They could always hide something in lower level software like drivers or bios.

    (Cant find the arricle i was thinking of, maybe false): It was recently discovered that snapdragons pinged their home server when turning on, which was not noticeable in android as it was on a deeper software level


  • SomeLemmyUser@discuss.tchncs.detoPrivacy@lemmy.mlPixel 8A and Grapheneos
    link
    fedilink
    arrow-up
    30
    arrow-down
    1
    ·
    edit-2
    1 month ago

    If you want to be sure you cant be tracked, monitored, spyed on, and calls can’t be intersepted:

    Don’t ever connect it to WiFi and don’t insert a sim card.

    Graphene or not, your ISP can still share your position or other meta data with government and stuff (in the us they can also be forced to not tell you) - in some countries they legally sell to third party’s, in some probably illegaly

    Calls are normally not encrypted so the os doesn’t matter as much if its the government who can force your ISP or if someone is skilled enough for a Man in the middle attack.

    Android is a highly complex system, it will never be 100% safe.

    If you just want to decrease spying by companies and less powerful people:

    Use neo store or fdroid (no google play or aurora) as all apps there are Foss

    Don’t install gapps or any other google services/packages

    Use shelter for less trusted apps

    Use netguard to block apps from accessing the internet

    Physically block your cameras

    If you want to be absolutely sure no one is recording audio: destroy mics with a needle and connect headset only when you need it

    To only use communication apps which are encrypted and you hold the keys should be not needed to be said: matrix, signal, element, xmpp are good, (telegram (normal chats), Facebook, WhatsApp etc is a no go)



  • I think me admitting not understanding something and following advice of trusted humans is a very different thing than will full ignorance and you framing it as such is telling of the ivory tower you sit in.

    Maybe what you tell me about flatpac being better and more secure is right, but trusting you, a stranger from the internet is certainly not better than trusting friends studying in the field. Is flatpack the more secure version of the aur though? The aur ist fully foss, so public scrutiny takes places. In my mind, flatpac wasn’t, but maybe I’m wrong here.

    As for point 5.: again: I don’t argue that the way its done in Linux is bad or without reason. I just state that it is more difficult for the end user.

    For btrfs: As for my understanding: the graphical installer only supports one option for encrypted file system: lvm-ext4. When you select encryption it is not possible to select btrfs anymore (or any other). As soon as you tick “encrypt system” it defaults to luks–>lvm–>ext4 and doesn’t allow you to change it Maybe because it only support encrypted lvm and subvolumes won’t work with btrfs (+to quote your own link: "The DebianInstaller can format and install to single-disk Btrfs volumes, but does not yet support multi-disk btrfs volumes nor subvolume "

    I don’t understand the part about “rsync”, but im pretty sure its not what I had in mind when talking about first time user friendly options.