this post was submitted on 07 May 2025
1511 points (95.9% liked)

Privacy

37633 readers
834 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

The Privacy Iceberg

This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.

Transcription (for the visually impaired)

(I tried my best)

The background is an iceberg with 6 levels, denoting 6 different levels of privacy.

The tip of the iceberg is titled "The Brainwashed" with a quote beside it that says "I have nothing to hide". The logos depicted in this section are:

The surface section of the iceberg is titled "As seen on TV" with a quote beside it that says "This video is sponsored by...". The logos depicted in this section are:

An underwater section of the iceberg is titled "The Beginner" with a quote beside it that says "I don't like hackers and spying". The logos depicted in this section are:

A lower section of the iceberg is titled "The Privacy Enthusiast" with a quote beside it that says "I have nothing I want to show". The logos depicted in this section are:

An even lower section of the iceberg is titled "The Privacy Activist" with a quote beside it that says "Privacy is a human right". The logos depicted in this section are:

The lowest portion of the iceberg is titled "The Ghost". There is a quote beside it that has been intentionally redacted. The images depicted in this section are:

  • A cancel sign over a mobile phone, symbolizing "no electronics"
  • An illustration of a log cabin, symbolizing "living in a log cabin in the woods"
  • A picture of gold bars, symbolizing "paying only in gold"
  • A picture of a death certificate, symbolizing "faking your own death"
  • An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing "hiding ones identity in public"

End of transcription.

(page 3) 50 comments
sorted by: hot top controversial new old
[–] recklessengagement@lemmy.world 268 points 1 day ago (2 children)

I think this is the first time I've seen an iceberg meme with sources and explanations for each item. Fantastic. Your work is appreciated.

[–] comfy@lemmy.ml 55 points 1 day ago

To be honest, and it wouldn't work here, but I sometime enjoy the cryptic nature of iceberg memes at the lower ranks. It's like a scavenger hunt.

load more comments (1 replies)
[–] jagged_circle@feddit.nl 25 points 1 day ago (2 children)
[–] greywolf0x1@lemmy.ml 11 points 1 day ago (6 children)

as is i2p, qbittorrent and a few others

[–] ArcaneSlime@lemmy.dbzer0.com 10 points 1 day ago

And qubes/whonix.

load more comments (5 replies)
load more comments (1 replies)
[–] jagged_circle@feddit.nl 27 points 1 day ago* (last edited 1 day ago) (1 children)

I give workshops on privacy. I always tell them that if they get nothing else out of my presentation, its that they should use a password manager.

Honestly I think keepass should be beginner. That comes first before everything else.

Also I think Tor Browser should come before VPNs. Its free and easier to use than VPNs (for when you want to google something secret and don't want to be tracked. Most beginners are selective like that)

[–] Bazoogle@lemmy.world 8 points 1 day ago (1 children)

Why keepass and not Bitwarden? Wouldn't bitwarden be more user friendly for trying to ease people into secure technologies?

[–] jagged_circle@feddit.nl 3 points 1 day ago* (last edited 19 hours ago) (1 children)

Bitwarden had some security issues historically. I generally recommend using software for password managers that isn't internet connected.

My keepass trainings involve generating a veracrypt encrypted USB drive (for windows and Mac users) for storing a backups of their keepass file. I also recommend they upload it to whatever cloud storage they use (google drive or iCloud usually)

load more comments (1 replies)
[–] wasabi@feddit.org 53 points 1 day ago (6 children)

I have no clue why telegram is often mentioned when it comes to "privacy focused messaging". They don't even have e2e encrypted group chats. Only 1:1 chats may be encrypted as an opt-in. Even WhatsApp is more secure than that, since they use signals encryption.

Also the "we don't give out even a byte of data to anyone" statements made by telegram have been thoroughly debunked as lies. When telegrams bottom line is in danger, they have and will give out your data.

[–] Bazoogle@lemmy.world 6 points 1 day ago

Yea, telegram being advertised as a privacy messenger is a joke. If people want to have group chats like in discord and don't care about privacy, whatever. But to try and flaunt how privacy focused you are while using your own home-brewed encryption is a joke. Not to mention the fact you have to turn it on for every chat you want end to end encrypted.

The whole thing about not giving out data is really only accomplished by spreading user data across several countries. So you would have to get a search warrant from every country to get the data, relying on some countries not wanting to cooperate with other countries. That is not real security. Real security would be encrypting it so you literally couldn't give them the data, even if they had a search warrant. Ya know, like signal.

load more comments (5 replies)
[–] LeTak@lemm.ee 57 points 1 day ago (9 children)

Tried the Privacy Activist and Enthusiast section. Was not really fun and you loose connection to most of your friends and family. Now I have a balanced setup with something out of each layer. Perfect balanced, as things should be

[–] Hellmo_Luciferrari@lemm.ee 27 points 1 day ago (3 children)

I have taken my own approach; there are things from each layer that I use. Some begrudgingly but others gladly.

The problem I faced when starting this journey is it does cut out a lot of people. And it becomes isolsting. So I did reel back a bit.

[–] Natanox@discuss.tchncs.de 15 points 1 day ago (10 children)

It's equally frustrating to talk to people who're completely entrenched in the Enthusiast / Activist section. The utter disconnect when it comes to what's viable for most people is annoying to deal with sometimes. Statements like "Everyone who is able to read can easily learn to use Arch Linux" or "Everyone can flash their phone" do give me headaches. Was there, did both, wouldn't recommend to my less nerdy family.

load more comments (10 replies)
load more comments (2 replies)
load more comments (8 replies)
[–] infinitesunrise@slrpnk.net 18 points 1 day ago

Thanks a ton OP for linking to all the tools and services in description, this is an awesome resource!

[–] rekabis@lemmy.ca 20 points 1 day ago (1 children)

Any Chromium-based browser in anything but the top-most panel is a non-starter with their abandonment of Manifest v2. Manifest v3 seriously cripples any Chromium-based browser’s ability to be secure, as extensions like uBlock Origin are no longer compatible by design.

Google has it’s ad business to protect, after all.

[–] Charger8232@lemmy.ml 13 points 1 day ago (3 children)

Not all Chromium-based browsers are bad. Browsers such as Vanadium or Trivalent are very secure, and discourage the use of extensions altogether due to privacy and security risks. These browsers come with ad blocking preinstalled.

load more comments (3 replies)
[–] moseschrute@lemmy.ml 25 points 1 day ago* (last edited 1 day ago) (7 children)

Weird how Apple and iMessage are not in the same category. How do distrust apple’s privacy claims but trust iMessage?

[–] edel@lemmy.ml 13 points 1 day ago

True. Apple would need a category on its own, but if i have to choose would place it on "As seen on TV".

It is fairly private and they quite give a fight about maintaining that status. There are no cases I am aware off they comply to open the system for authorities publicly and if so, they do not claim encryption anymore (as per UK.) Now... the key word is publicly; If I were a zealous top intelligence agency I would not force Apple to break an account for me so to obtain evidence on an individual so I can present it to a judge... for me Apple or Protonmail (or any other popular encrypted service really) would be far more valuable a place where I quietly could obtain intel on tens of thousands of targets and with that find other ways to find evidence if need be. It is a good sacrifice for the sustainability of the scheme.

Of course, this is just a thought and no evidence has been brought up. Apple is a large company and some whistleblower could easily popup if that were the case... yet again, having the right tight team is easy to keep it undercover, specially in a closed sourced software. The fact that the US is eyeing so many encrypted SaaS but Apple, with its omnipresence reach, is almost always left alone is a bit odd.

load more comments (6 replies)
[–] root@lemmy.world 7 points 1 day ago (1 children)
load more comments (1 replies)
[–] mmhmm@lemmy.ml 108 points 1 day ago (10 children)

I was at the bike shop a few weeks back and a ghost walked in. He came in wearing a medical mask covered by a bandana, sunglasses, cap. They wore gloves, long sleaved pants and shirt.

First question from staff, 'this a robbery?'

Ghost, 'no, I just need 27 2.5 tubes, miss.'

They get the tubes, he agrees. Staff asks if he has an account. Ghost says, "nope, why would I need one?" Staff says they do it for records, insurance claim assist, and discounts. Ghost goes with a John Doe, pays cash and peaces the fuck out.

Total King, but dude was given up a lot. Half of us were drinking beers enjoying a warm evening in spring. I hope he has had some good rides.

I can say with confidence thay he was a white male. In his 50s. About 5'10". 140 lbs-ish. If anyone wants to get any tips, good luck!

load more comments (10 replies)
[–] confusedbytheBasics@lemm.ee 3 points 23 hours ago

I use something from each tier except the As Seen on TV tier.

[–] prinzmegahertz@lemm.ee 34 points 1 day ago (8 children)

What’s the issue with steam? I thought the epic game store was the one actively spying on your device

[–] Broken@lemmy.ml 14 points 1 day ago (3 children)

Steam has telemetry. They gather a ton of data on you. What details, how they use it, and how secure it is I can't answer, but it's clear that it's happening.

load more comments (3 replies)
load more comments (7 replies)
[–] eee@lemmy.dbzer0.com 29 points 1 day ago

Thank you so, so much for the transcription, appreciated!

[–] ISOmorph@feddit.org 60 points 1 day ago (14 children)

Can you explain why you would think Steam is so bad? I would argue they're pretty fair, especially with the option to buy steam cards for cash to not disclose your personal data. Does the client do some unsavory shit?

[–] lazynooblet@lazysoci.al 49 points 1 day ago* (last edited 1 day ago) (3 children)

Seeing steam at the top makes me question the list. Likely a hate of DRM rather than privacy

[–] lb_o@lemmy.world 62 points 1 day ago (5 children)

Yeap, and Brave in the middle. They only pretend they are for privacy, but they are the very opposite.

[–] dogs0n@sh.itjust.works 20 points 1 day ago (1 children)

Yeah i hate when I see people using Brave, because they have been brainwashed.

Does anyone remember when they were injecting their own referral links into links for online stores (99% certain they did this pls prove wrong if you know better)? This alone leaves them with 0 trust in my books.

load more comments (1 replies)
load more comments (4 replies)
load more comments (2 replies)
load more comments (13 replies)
load more comments
view more: ‹ prev next ›