Visit Blog
Explore Tumblr blogs with no restrictions, modern design and the best experience.
Fun Fact
Furby, that creepy 1990's doll, has a tumblr page.
#privacy
privacygalaxy · 14 minutes ago
Text
How many mail inboxes do I need? 8 is the answer I came up with
Hi Reddit. I started to care about privacy and tidy up my emails. I have ~20 different emails right now, most of them unused. I am currently deleting or redirecting all of my accounts on various websites. My goal is to compatimentalize my life to the best I can. I do this for both privacy and security reasons so I'm sorry if it's not the right place.
I think I need 8 inboxes (not aliases) ignoring my pro email. However that's a lot, and I would like to reduce this number.
I plan to use a different email host for each of these inboxes. I thought about end-to-end encryption but it is probably useless in my case since my correspondents don't use it.
Do you think this is pertinent ?
# Use Example Sensitivity Intended use frequency Comment 1 Contact address Keep in touch with relatives; contact address for everything IRL High Daily Has my real name in it. No account should be linked to it. 2 Vital RL accounts Bank; tax returns; insurance; ISP; ... Maximum Weekly Has my real name in it (All services for which I use it have my name anyway). This is for all vital IRL services. If this is compromised, I am screwed. 3 Non-vital RL accounts (hobbies...) Amazon; Steam; social media; ... High Weekly Any service I paid for but that isn't vital and doesn't necessarily have my real name in them. 4 Email for the political group I'm part of Organizing; discussing conferences, videos, or books; general theorizing. Maximum Daily (sometimes several times a day) This one is the most likely to be targeted by private individuals given that we're political. We all used nicknames but the leaders know my RL name. If this is compromised normally my identity shouldn't be, but the group is. I am potentially in danger if I am identified. 5 "Internet life" accounts Reddit (main account); Discord; ... Medium Monthly For accounts on video games platforms I use to pay stuff, I will use #3, not this one. This is for accounts that (normally) don't have personal data 6 Random crap Stuff I only need once Low Only when needed Crap for which I might still want to hold on; or crap that doesn't accept throwable emails. 7 ISP email / Low Never Automatically created at my name by my ISP. I don't have any use for it. 8 Recovery email Password recovery Maximum Only when needed I play to link all my other 7 adresses to it to use it in case one adress is compromised. I will use it ONLY for this purpose.
original post here
0 notes
privacygalaxy · 14 minutes ago
Text
Picocrypt - A FOSS 4MB Encryption Tool!
Disclaimer: Picocrypt is free and open source software. I do not make any money from it and I'm not promoting it for commercial purposes. I'm doing this because my software can help people take back their privacy and secure their files.
Hey everyone!
I'm the creator of Picocrypt, a very simple, very small, and very secure file encryption tool. It's free, open-source, and actively maintained. If you're looking for a dead-simple, user-friendly, and secure encryption tool, then Picocrypt is exactly what you're looking for.
What makes Picocrypt different?
Picocrypt is different from your stereotypical encryption tool. Typically, encryption software is either complicated to use (ie. VeraCrypt), or very insecure (ie. ZipCrypto). Picocrypt brings the best of simplicity and security together, to allow anyone to easily encrypt their files securely, even with little to no technical knowledge.
Why is Picocrypt secure? (Technical)
Picocrypt is very secure encryption tool, as it was designed specifically with security in mind. It uses XChaCha20-Poly1305 as the cipher and MAC, as well as Argon2d for key derivation. SHA3-512 (Keccak) is used for key checking and BLAKE3 for file corruption checks. It's reliable and actively prevents file corruption by using Reed-Solomon parity bytes to protect the file header, which can recover corrupted bytes. Using this suite of algorithms, Picocrypt is about as secure as file encryption can get. It's more secure than 7-Zip (which only uses SHA-256 for key derivation), more secure than AxCrypt (as ChaCha20 is more secure than AES), and more secure than VeraCrypt in terms of key derivation (Argon2d instead of SHA/Whirlpool/Streebog). Picocrypt uses the Pycryptodome and Argon2-cffi Python libraries, which are open source and well known in the Python community.
How simple is it to use?
It comes with a simple GUI, and it's very lightweight. The UI is very intuitive and is designed for anyone to be able to use. Picocrypt's goal is to be the simple encryption tool that can achieve extremely high levels of security at the same time.
What do you guys think? Is it something you would use? Let me know in the comments!
original post here
0 notes
privacygalaxy · 14 minutes ago
Text
how does ubuntu (in terms of privacy) hold up nowadays?
I only see threads from ~1 year ago saying that it was better than windows but still bad.
should I use it? Thanks!
original post here
0 notes
privacygalaxy · an hour ago
Text
Can "Badwolf" Privacy browser be sand boxed via 'firejail'???
I was trying to further harden my new setup, and I am using a minimalist privacy based Web Browser. However I'm wonderin if it can be futher secured with tools like 'apparmor' and 'firejail'...?
original post here
0 notes
privacygalaxy · an hour ago
Text
Do you create a mozilla account?
Do you sign up for mozilla account and sync book marks or is there a good privacy focused book mark sync tool? I have my work station at home and a laptop I take to work or traveling. I have alot of book marks set up and i'd really like to sync them some how.
original post here
0 notes
privacygalaxy · an hour ago
Text
What are methods to get cheap anonymous internet access👽👾🤖?
I live in the forest.
original post here
0 notes
privacygalaxy · an hour ago
Text
Google Drive and iCloud Drive
Are this services the same in terms of privacy? I’m not so sure, because the last few years Apple is focusing strongly in user privacy.
original post here
0 notes
privacygalaxy · 2 hours ago
Text
How does Windows Firewall really work and how to keep it secure?
I think I might've changed some permissions by mistake while I was trying to allow one specific app to go through the Firewall. In the case I disabled something I need, would I get the prompt again once I try to use the app online?
Edit: What if I change the name of the app in that list? Will the PC have trouble using the Firewall settings I've made(Permissions) properly because of changing the name of the app in the Windows Firewall list?
original post here
0 notes
privacygalaxy · 2 hours ago
Text
Custom rom for samsung J530F
I need an android based os for my phone
original post here
0 notes
privacygalaxy · 3 hours ago
Text
Sending GDPR request to Facebook rather than deleting my account on my own. Thoughts?
Should I send a GDPR request to Facebook via ICO U.K. ( an organisation in U.K. that makes sure GDPR rules are applied ) rather than going to settings and deleting my account?
Can we assume they will obey the law? I am asking because if you check the Facebook privacy policy, they clearly state that deleting an account only deletes user content such as photos, posts etc. The information that Facebook gathers about users are not deleted ( or at least not mentioned in the privacy policy. They say only user submitted content is deleted ). However, GDPR states that every information associated with the account must be deleted.
Any thoughts on this? Sending a GDPR request via ICO is basically free, so it can’t harm to do it I think?
original post here
0 notes
privacygalaxy · 4 hours ago
Text
Am I sending browsing history to TP Link
I recently purchased a new TP Link router but haven't received it yet. I tried understanding the privacy policy but not sure what parts apply to what functions. My question is this; will all of my browsing data be sent to TP Link under their TOS even if it's just under my IP address and not personal info? It seems like some features are only available through the app which I assume sends much more personal identifiers than just installation of the router without the additional functions but I'm unsure of how much data I will be sharing by installing this router. Right now I am more concerned with info shared under the TOS than backdoors or other illegal means of stealing my info. Can anyone help me? Thanks in advance!
original post here
0 notes
privacygalaxy · 4 hours ago
Text
Seeking Firestick hardware replacement.
I have a amazon firestick that I’ve jailbroken to watch videos. I primarily use Terrarium style apps &/Kodi. I don’t like that there’s no way to disable Alexa, though I’ve never used it. They want me to update the os again, the last update was only a month or two ago. I don’t trust them or their updates. It feels like an ultimatum. I have no other TV service. I get my internet for the firestick from tethering my cell phone. Is there another piece of hardware that can run Kodi &/ TTV style apps? Or should I just ply my laptop into the TV?
original post here
0 notes
privacygalaxy · 4 hours ago
Text
Am I Doing This Right? I need some help and tips on my threat model. I don't know how to do it!
So a while back, I was concerned about my privacy but it was somewhat recently that I actually did research on it and started taking action. The problem was that I got so paranoid and perfectionist that it drove me crazy and stressed me out to the point where I started thinking that anything I connected to a certain computer like a mic or mouse, was automatically compromised. It got bad to the point that I ended up getting rid of so many things that it was really expensive to replace. After a while I started getting tired of the stress and anxiety it was causing that I stopped caring about privacy and security. Until a few days ago is when I started caring again since I wanted to be a Content Creator but I noticed some things. I've seen so many popular people online getting hacked and being stalked or even threatened and that's not something I really want to go through if I do pursue doing YouTube and possibly Instagram. After this, I kinda just thought that I should really work on my privacy again just this time actually do it properly and make a threat model rather than attempting to protect my data from everybody. I made this threat model and I can't help but thinking I'm doing something wrong. I was hoping you guys could give me some tips on how to actually do this since I'm not too sure how to do these things.
TL;DR I need help with my threat model on how to actually do it
Personal
What do I want to protect?
Personal Information, Jobs, Banking Info, anything requiring real info
Who do I want to protect it from?
From any hackers who attempt to steal the info and large companies selling for ads
How bad are the consequences if I fail?
My personal information could be out on the internet for sale or used for things like black mailing, identity theft, etc.
How likely is it that I will need to protect it?
70-80% Its really common for things like this to happen
How much trouble am I willing to go through to try to prevent potential consequences?
Compartmentalization and using secure apps and providers like Protonmail, Firefox, etc.
Social
What do I want to protect?
Personal Info as well as the Pseudonym behind the YouTube and possibly Instagram account
Who do I want to protect it from?
Hackers who attempt to identify me, employers who attempt to background search me (I would assume they wouldn't know it's me since its a pseudonym), etc.
How bad are the consequences if I fail?
Possibly having stalkers, personal information exposed and/or stolen, black mailing, etc. Anyone who dislikes me or fans who attempt to stalk and they may try to do bad things
How likely is it that I will need to protect it?
Changes throughout time, very low if I'm barely beginning on YouTube, but chances will increase if gaining popularity
How much trouble am I willing to go through to try to prevent potential consequences?
Compartmentalization, separating the Pseudonym from my Personal, possibly using a VM with a Virtual Network (The sub won't let me type the actual word) . Windows would be used for software but VM for account info, etc. (I just don't know how to put the videos and photos on the VM so the next idea was to have multiple operating systems, possibly even live ones)
Private
What do I want to protect?
Information on what I watch, like, hobbies, shopping, etc.
Who do I want to protect it from?
Companies attempting to sell info for ads, employers who attempt to background search, etc.
How bad are the consequences if I fail?
Not too bad, it's just more of personal preference that these companies don't know everything I watch and search or how I live
How likely is it that I will need to protect it?
90-100% Companies are constantly looking for info to sell all day and night
How much trouble am I willing to go through to try to prevent potential consequences?
Compartmentalization, using things like TOR for light searches, using another browser for things like streaming and watching YouTube. Shopping on a different profile of FF possibly, using prepaid or cash if possible.
A few things I'm really confused on
- How do I pay for streaming services in the most anonymous or private way (which ever is possible)
- Is it a bad thing if I transfer accounts from the ones I have existing to the new ones? (For an example, I have music software and in game purchases that I would like to keep but will there be a cost changing the emails on the old account with the new email?)
- Should I delete all of my old accounts and start fresh? (Is it even possible if I'm using computers that had old accounts with my info, or I guess considering it compromised? I have a laptop I want to use but since my school info and info since before I cared about privacy was on there, I'm still paranoid that I can never use it again)
- Should I compartmentalize shopping and accounts with purchases?
- What are recommended OS and Distros? ( I thought about having Kali as for my personal and private, Windows for things like editing videos and producing music and a VM for the Social Media Account)
- How bad is it for me to put my threat model online? (This isn't that much of a private account)
- Is there any other ways to attempt to do this threat model?
Sorry if this is really vague but I didn't want to put everything online as I think it gives me a disadvantage. Unless I already gave too much out D:
I have more questions but I can't remember at the moment so I might ask more. Thanks for reading!
original post here
0 notes
santoshbvn · 4 hours ago
Text
Google Chrome: DuckDuckGo doesn’t need you to make use of Google Chrome, right here’s why
Google Chrome: DuckDuckGo doesn’t need you to make use of Google Chrome, right here’s why
Privateness-focused search engine DuckDuckGo has slammed the brand new advert monitoring technique by Google, saying it’s unhealthy for privateness and places the customers in a gaggle primarily based on their shopping historical past, and any web site can get that group ID to focus on and fingerprint them. Google has introduced FLoC (Federated Studying of Cohorts) expertise to offer a extra…
Tumblr media
View On WordPress
0 notes
privacygalaxy · 5 hours ago
Text
How to explain to my friend why the fb and linkedin leaks are bad?
Title.
original post here
0 notes
binaryblogger · 5 hours ago
Text
Episode 952 - Tools, Tips and Tricks - HaveIBeenPwned Phone Numbers
This week's tools, tips, and tricks talk about a new feature on HaveIBeenPwned.com. You can now search for your phone number. This episode talks about why this was added and why you should go search right now to see if you are a victim.
Source - https://haveibeenpwned.com/
Be aware, be safe.
Become A Patron! Patreon Page
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Binary Blogger Website
Security In Five Website
Security In Five Podcast Page - Podcast RSS
Twitter @securityinfive
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - bblogger@protonmail.com
Check out this episode!
0 notes
privacygalaxy · 6 hours ago
Text
Anyone know how to buy stuff off eBay anonymously ?
Of course I’m going to create a new eBay account but how can I safely buy stuff that doesn’t trace back to me? Should I use a virtual machine ? Tor browser ? What about payment? Can I use my debit card or go find a prepaid card? And shipping it to my address, is there anything else I can do besides changing the name ?
original post here
1 note · View note
privacygalaxy · 6 hours ago
Text
Is there a way to Remove Blot ware from an unrooted android device using ADB command?
Like Google apps
original post here
0 notes
privacygalaxy · 6 hours ago
Text
Question: What are your thoughts about Waterfox?
I heard this web browser called Waterfox is pretty privacy-focused, but don't know much about it. They claim to be an open source ethical product alternative to Google and I believe they are based off of Gecko.
original post here
0 notes
bob3160 · 6 hours ago
Video
youtube
Skype - Hide Your Profile from Strangers
0 notes