Digital 2A

I saw an unclassified release from the FBI that Islamic terrorists are using Telegram to coordinate and transfer funds. Unfortunate legislation in the UK was recently passed that eliminates many privacy protections online for their country.

To ban privacy and encryption is no less a problem than to ban arms, because both technologies serve as a leash upon would-be tyrannical governments. For sure, terrorists will use every advantage they can get. But that does not mean innocent people like us must digitally take off our body armor because terrorists can use the same.

IMHO, privacy should be protected under the 4th amendment and the 1st amendment, no matter where our data lives. Unfortunately, Supreme Court precedents allow serving companies with court orders to produce customer data, which often happens without notice to said customer. Even if companies have a policy to voluntarily notify the customer, judges often issue gag orders to prevent them from doing so, especially if the judge believes that notice could “impede the investigation.”

This knowledge that I may be doxxed and physically and financially threatened chills my 1st amendment rights to speak openly about what I believe in certain public fora. That is why I spend more and more time learning about how to protect my privacy.

Privacy is like body armor. It’s my right to protect myself online, just like it is my right to protect myself on the street. It makes certain things more uncomfortable, but I willingly do it because I value my privacy more.

Text messaging

Although the FBI points out Telegram, this is likely only because Telegram can and does leak information to the FBI. According to a November 2020 internal training document obtained via FOIA, Telegram will disclose phone numbers and IP addresses “to relevant authorities,” although they have no access to message content (unless there is a mole in the chat).

Instead, I recommend Signal, which does not even have access to IP addresses and phone numbers. I think that lack of access is the strongest guarantee of privacy, since a warrant or subpoena can’t return information that the company can’t get. Further, Signal’s source code is available for anyone to check, and independent security experts continually verify that its privacy guarantees are maintained.

If you use Apple services, beware of iCloud backups in apps like iMessage and WhatsApp. These can be turned over if Apple is served a search warrant.

Email

Aside from the usual tips about not clicking in emails that look suspicious while claiming authority and trust, whom you choose for email may affect your privacy as well. There is a reason why doctors and banks only notify you via email that a message with personal info is waiting for you if you log into their site. It’s because email is not secure and can be snooped on. Never give sensitive information via email, and if you do, you should invalidate it immediately and change it if you can.

Likewise, I am in the process of changing my email provider from Google to Proton. I suspect that Google with its business model is more interested in having access to my data than it is interested in keeping my emails private. It also is subject to American anti-privacy government control laws. Proton, in contrast, builds its entire product line with privacy as its primary selling point, and is based offshore. In addition, Proton allows you to encrypt emails you send if your addressee has also configured email encryption, and all Proton email accounts have that configured by default. Remember James O’Keefe, the visionary journalist who founded Project Veritas? He uses a Proton email account.

Web browser

It is usually not the web browser itself that gets compromised, but rather the information standard web browsers reveal to Google Analytics and Facebook trackers, and they resell that information.

One thing you can do to mitigate tracking online is to install anti-tracking extensions into your browser, but that is something I am not as familiar with. There is a simpler solution: use a privacy-oriented browser like Brave, and change your search engine to something besides Google (I use Brave Search). Browsers like this will identify and stop trackers it knows about from working. Sometimes they even skip over tracking redirects and take you directly to the site you wanted to see, improving speed and privacy at the same time.

For even more privacy, you can set your browser to automatically delete all cookies every time you quit the browser. Many trackers rely on storing identifiers and history information inside your web browser. Some of these can’t be turned off without breaking the web site. But if you clear your cookies frequently, that makes it harder for trackers to identify your browsing patterns, since you have broken their database connection between your browsing sessions. You will have to put in your login data more frequently, but ads will become more generic, and it will be harder to identify you as a single user on the internet. Alternatively, you can use a short-lived incognito session for sites like Facebook and Youtube that you are especially worried about.

Also, although most websites and browsers support HTTPS to encrypt your web traffic, the names of the sites you visit are not encrypted by default. It’s part of how basic internet works, and it is called DNS. Any man in the middle can see all the web addresses you visit.

One way to stop this snooping is to use DNS over HTTPS (DoH), or the similar DNS over TLS (DoT), which takes some know-how to configure. I didn’t have time to learn that myself yet, so I used a simpler, shotgun approach: the Tor network (Brave has both an incognito and a Tor mode).

Tor is not for every website, since it is slow and frequently blocked. But it does an excellent job of hiding what you are doing online, and it usually routes your traffic through other countries around the world. It’s like encrypted DNS and free VPN at the same time, with no central governing authority. If one Tor node goes down, other Tor nodes replace it automatically.

Conclusion

This is the way decentralized internet was supposed to work. Unfortunately, big players took over the market and now most web sites and services are hosted through Cloudflare, Google, Amazon, and Microsoft, which are all in cahoots with the government. Regular people like us can reclaim our control over our data by embracing peer-to-peer small-guy networks whenever possible, and encrypting wherever we can.

This digital privacy movement is very much like the original conception of 2A. Rather than have a slow, centralized authority deciding when to use violence, that power should be distributed to the people, who can react faster and in their own interests. If individuals misuse that power, then courts can dis-empower them by locking them up after jury trial by their peers. Likewise in true peer-to-peer networking, knowledge about bad actors can be distributed and the bad guy penalized. But most of all, the power is in the user’s hands, not the government or pseudo-government monopolies.

9 Likes

Good info to know, MusashiAharon. Unfortunately, I’m ignorant about most of this stuff and had never heard of Telegram until now. I need to be more aware and careful with this privacy stuff. And like you, I also feel stifled from expressing opinions sometimes.

7 Likes

There’s a couple of ways to view this subject,

one

The man who asks a question is a fool for a minute, the man who does not ask is a fool for life.
~Confucius

Which means learn about encryption, VPN’s etc

and two

There is no privacy

Everything created by men for men, is created, by men for men

So, unless you created all this digital world you’re not apt to control it

And if you live a life where truth is paramount, all you know or practice, then why would dare to hide in the first place?

And who is it that holds you back?

Be The Change You Want To See In The World, the simple/short quote, the real quote

“We but mirror the world. All the tendencies present in the outer world are to be found in the world of our body. If we could change ourselves, the tendencies in the world would also change. As a man changes his own nature, so does the attitude of the world change towards him. This is the divine mystery supreme. A wonderful thing it is and the source of our happiness. We need not wait to see what others do.” – Mahatma Gandhi

I’d never argue that

or say its foolish to use it, rather I personally do not trust it, but, neither do I trust that which we do use

We here utilize those three, we are seeking a better way, but what does that mean?

No matter which method we’ve calculated or considered we also calculate and consider a way it can be used to stop us, and while we are moving away from those there is no guarantee of safe or secure hosting

When it comes down to it the end users can be cut from us, ISP’s can block traffic

So, in this game, everyone will need to think like MusashiAharon

and, everything MusashiAharon utilizes needs to be secure and trustworthy

Since most people won’t give up their bottle fed 6pm news, since most prefer to get jabs and wear masks when the news bottle feeds them to do so

How much would you wager everyone takes on the same protocol MusashiAharon does?

Truth is not what you want it to be; it is what it is, and you must bend to its power or live a lie.
~Miyamoto Musashi

4 Likes

been using brave since it came out. It shields my NAT box so no ones see past the NAT. Its like a VPN behind the firewall.

When they force us to go digital, I will go analog.

4 Likes

I have a number of browsers, for testing, including Brave, I liked the basic attention token idea when it came out, but since then

image

How can you trust a browser that caters to specific operating systems?

3 Likes

There is no absolute privacy, just like there is no perfect bulletproof armor. But you can make things so private that you’ll have lived a full and happy life and have passed to the world of truth from old age before that privacy is breached. And maybe no one will bother to try because it’s too much work.

For one thing, it is open source, and smarter people than me have reviewed it and recommended it.

About OSes, I used to use macOS, but since last year I’ve been using Arch Linux. Brave runs under Linux, too.

When Brave says they require Windows 10 or later, it means they are dropping support for Windows 7, whose mainstream support from Microsoft ended in January 2015, and whose extended support ended January 2020. From the virus and malware perspective, it is important to run a recent enough system that is still getting security updates.

4 Likes

I love the former part of that :hugs:

However the latter, not so much

https://www.schneier.com/blog/archives/2023/01/breaking-rsa-with-a-quantum-computer.html

https://www.nature.com/articles/s41598-021-95973-w

I’m more cynical, I only see history repeating, DEHOMAG then, qubit now, and tomorrow?

But I’m happy you work on it, perhaps you’ll take down skynet someday :man_shrugging:

3 Likes

Quantum computing can theoretically break RSA, and it likely will eventually. Maybe in 10 years the technology will be practical and available to governments?

But I didn’t say RSA. I said, “you can make things so private…” Take a look at what Edward Snowden does to see how far you can go. Most people can get adequate security and live comfortably without going that far.

4 Likes

Wasn’t intending to put words in your mouth or even argue, just not so apt to conclude anything digital is secure, what is it anyhow, other than energy, it’s intangible, its simple and complex a bit of an enigma, and with that cynicism I’m also not apt to conclude its new other than to our knowledge, and therefore neither do I doubt a single year could change you and I sharing a different conversation on the subject.

And while I’d like to believe everything is currently private/secure I’m not actually uncomfortable with my belief its not, why?

Personal acceptance of additional scripture.

Pentateuch,Tanakh,Talmud,Apocrypha, New Testament

Acceptance of the New Testament seems to preclude room for the Talmud, however it does not preclude other words or even muses

So, if its not private, and is even used nefariously, should I shun or fear it?

Snowden is a good example on your part, an example what is thought to be secret and secure is not, and may well be used against those who designed it against us, perpetrators

And what is peace and safety?

Again, your study may pay off, you may be a future Snowden :sunglasses:

Who knows what the premium plan offers :skull_and_crossbones:

When?

3 Likes

Man, y’all’s discussion is on a whole other level way beyond my understanding. I guess I need to do more research and educate myself on how to better protect my privacy.

5 Likes

That’s the thing. I’m not quite sure. It could be some unseeing stranger who reads an opinion of mine and decides to doxx me because he/she disagrees with it. Or it could be an employer or potential future employer who disagrees or maybe misconstrues or misunderstands what I was trying to say, resulting in dire employment consequences. Or it could be that I put my foot in my mouth and said something stupid without thinking - you know the saying, “Better to remain silent and be thought a fool than to speak and remove all doubt.” So to answer your question, I guess I hold myself back sometimes in order to avoid one of the scenarios above.

5 Likes

Because:

II Samuel 24:14 And David said to Gad; “I am greatly oppressed; let us fall now into the hand of the L.rd; for His mercies are great; but into the hand of man let me not fall.”

And thus Jews pray in the morning:

May it be Your Will before You, L.rd, my G.d, and G.d of my forefathers, that I be saved today and every day from the brazen and from brazenness, from evil men, from evil friends, and from evil neighbors; from an evil impediment, from a judgmental gaze, from judgmental speech, from talebearing, from false testimony, from hatred of creatures, and from false accusation; from unnatural death, from evil disease, from evil accidents, and from a destructive mis-guider; from a harsh judgment, and from a harsh prosecutor, whether a member of the Covenant, or not a member of the Covenant; and from the sentence of Purgatory.

5 Likes

We keep keep it shorter here at our house.

Let us not be led into tempation, and deliver us from evil.

Part of the Lord’s Prayer…

4 Likes

wow, first time I’ve encountered a religion outside of Catholicism that holds belief in such a place, its not one I share but due more to lack of study than conviction.

Can you explain the Jewish belief in purgatory?

That’s what I pictured when I asked :wink:
not to judge you, but due to my own self examination, its the old saying on how one finger pointing out and three pointing back

Seems a huge part of what he ministered was already existing :sunglasses:


Now why does that not seem surprising :face_with_hand_over_mouth:

3 Likes