This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.
Transcription (for the visually impaired)
(I tried my best)
The background is an iceberg with 6 levels, denoting 6 different levels of privacy.
The tip of the iceberg is titled “The Brainwashed” with a quote beside it that says “I have nothing to hide”. The logos depicted in this section are:
- Apple
- TikTok
- PayPal
- Google Chrome
- CashApp
- Samsung
- Steam
- Microsoft Windows
- Ring (Security Camera)
- YouTube
- Amazon
- Discord
- Gmail
- ChatGPT
The surface section of the iceberg is titled “As seen on TV” with a quote beside it that says “This video is sponsored by…”. The logos depicted in this section are:
An underwater section of the iceberg is titled “The Beginner” with a quote beside it that says “I don’t like hackers and spying”. The logos depicted in this section are:
- Telegram
- Authy
- Brave Browser
- Privacy.com (Virtual Cards)
- DuckDuckGo
- iMessage
- Proton Mail
- AdBlock (Browser Extension)
A lower section of the iceberg is titled “The Privacy Enthusiast” with a quote beside it that says “I have nothing I want to show”. The logos depicted in this section are:
An even lower section of the iceberg is titled “The Privacy Activist” with a quote beside it that says “Privacy is a human right”. The logos depicted in this section are:
- Monero
- GrapheneOS
- Vanadium (Web Browser)
- KeePassDX
- SimpleX Chat
- Accrescent
- SearXNG
- Aegis Authenticator
- OpenWrt
- Mullvad VPN
- An illustration of physical cash
The lowest portion of the iceberg is titled “The Ghost”. There is a quote beside it that has been intentionally redacted. The images depicted in this section are:
- A cancel sign over a mobile phone, symbolizing “no electronics”
- An illustration of a log cabin, symbolizing “living in a log cabin in the woods”
- A picture of gold bars, symbolizing “paying only in gold”
- A picture of a death certificate, symbolizing “faking your own death”
- An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing “hiding ones identity in public”
End of transcription.
Gold is great until you find out you can manufacture it and mass production was kept secret to avoid what happened with diamonds.
The day we can mass produce gold is the day we have a post-scarcity society. Full elemental transmutation, which would be required to mass produce gold, would also eliminate virtually all resource shortages.
We are already post scarcity
The scarcity of housing and food is artificial scarcity
Post-scarcity refers to most goods being able to be produced in abundance with minimal human labor. Even assuming that current food production fully falls under that umbrella, housing definitely does not, and it requires a lot more than just food and housing.
Housing it definitely does. There’s more empty houses than homeless people.
We’ve already arrived at post scarcity. All we need to do is this off the capitalists that keep unused housing empty. The scarcity is artificial
I was referring to the fact that building and maintaining housing is still a largely manual process, and requires a fairly large amount of human labor. Maintaining power, water, sewage, and other things required for modern housing requires an even larger amount of human work.
Whether there are enough houses to actually fit all the people is unrelated to this.
My point is we already did all that. Thanks to efforts from our ancestors, we no longer have a scarcity of housing.
What we do have is a bunch of oligarchs who have stolen our housing and are holding it for ransom
produce gold? please tell me how one “mass produces” a base element?
alchemy
Is tuta better than protonmail?
monero
Yeah this invalidates the whole chart. Fuck crypto spam.
Funny how you need more and more technical knowledge to go deeper into privacy, until the last level, which is basically giving up on technology itself.
The last level is living in a cabin in the woods and writing manifestos about industrial society and the ills of technology O_o
Hey, it’s my house! How’d you get a picture of it?!
TAILS is missing :(
as is i2p, qbittorrent and a few others
So what’s the deal with i2p? I heard it was a more secure alternative to vpns, I downloaded it but I haven’t been motivated to figure out how to set it up on Linux.
It’s more similar to tor than a vpn.
Ah, is it considered more secure, or is it just different?
as a darknet it’s more secure than tor, but less people use it so less anonymous. the benefits are really for using in-network services there, not so much for accessing the clearnet, though you’ll find clearnet things bridged to i2p
Ah, so for in-house networks to remain secure from others on their network?
In some ways I2p is more secure, but it has its own pros and cons. It’s primarily used with services & sites within its own network, similar to onion sites, and used that way it’s said to be faster than Tor. It can be used for torrenting with a client that supports it, like qBittorrent or BiglyBT, without harming the network. There are outproxies you can use if you want to anonymize access to normal websites, but there’s only a few of them, and it’s slow. You can have it and Tor running at the same time without them interfering with each other, though.
So, it sounds like you’d be better off just running Tor or a vpn unless you have a specific use-case for i2p. I looked briefly at the install instructions, but it seemed to be like it would be a hassle to initially setup on my linux build.
I think that would be fair to say. I mostly run it to contribute to the network, so that other people can communicate or share files more privately. (On OpenSuSE, it can be installed from the repo and just run with no special configuration.)
And qubes/whonix.
That’s how amnesiac it is.
Thanks for providing this. It is obvious you put a lot of time into this. Truly appreciated. I will have to look into these.
How did you find these yourself?
I wouldn’t put Telegram at the level. I would put it in “The Brainwashed.” Its encryption is disabled by default. You need to manually enable it on each chat, and you can’t enable it on group chats. The app gives a false sense of privacy. Telegram flaunts its end-to-end encryption, but it never mentions that it is disabled by default, and it refuses to enable the default. The final result is that people are not using the feature.
A cryptographer and professor wrote a good piece about Telegram’s encryption, calling it “unusual” and the “non-standard authenticated encryption mode ever invented”: Is Telegram really an encrypted messaging app?
You play games on steam? clearly brainwashed.
also how dare you slander Malwarebytes like that
I use Keepass but mostly for convenience and I don’t understand why it’s in the 5th category. If I have 50 different accounts with 50 different passwords but they can all be had with one keepass password, how is that different than having 50 different accounts all using the same password?
I give workshops oj privacy. I always tell them that if they get nothing else out of my presentation, its that they should use a password manager.
Honestly I think keepass should be beginner. That comes first before everything else.
Also I think Tor Browser should come before VPNs. Its free and easier to use than VPNs (for when you want to google something secret and don’t want to be tracked. Most beginners would be selective like that)
Why keepass and not Bitwarden? Wouldn’t bitwarden be more user friendly for trying to ease people into secure technologies?
Bitwarden had some security issues historically. I generally recommend using software for password managers that isn’t internet connected.
My keepass trainings involve generating a veracrypt encrypted USB drive (for windows and Mac users) for storing a backups of their keepass file. I also recommend they upload it to whatever cloud storage they use (google drive or iCloud usually)
Bitwarden had some security issues historically.
What security issues? If you mean potential security vulnerabilities researcher found that they’ve patched, I don’t understand how that would be different from Keepass and their previous security vulnerabilities. Bitwarden has never had a security issues historically that I know of. Lastpass, on the other hand…
I generally recommend using software for password managers that isn’t internet connected.
I also recommend they upload it to whatever cloud storage they use
I also really don’t get these two. They seem to contradict each other.
I usually recommend bitwarden, where they can use the browser extension and mobile phone app. It gives them autofill features on all their sites. Getting someone to change their passwords and use a password manager is already difficult enough. Giving them the most convenient option is going to make it more like they stick with it.
Thanks a ton OP for linking to all the tools and services in description, this is an awesome resource!
Throw away mobile phone and just use an air gapped machine. Your productivity will tank but then you’ll eventually add local databases of the shit you actually need on your air gapped machine and your productivity will triple.
Well shit, I shouldn’t be the first to tell you that if you’re serious about your privacy then get off of windows.
Also if the CIA is targeting with you with air gap malware, then you fucked all the way up. Pedophiles are saying “damn, fuck that guy”
The government targeting pedos? That would be a more effective way to eliminate government than doge
This is Lemmy. You’re the 30billionth to tell me.
Since we are 6, that’s about 6 billion times per each of us.
I think someone is stealing some of my 6 billion for themselves. Just some. Not all. Just. Some.
Yeah, that’s because I didnn’t count you!
Your productivity will tank
Will it though? It’s not like paying with cash or even a credit/debit card takes radically longer than paying with a phone. It’s not like reading a book vs mindlessly scrolling Reddit or Lemmy makes productivity drop.
We get used to instantaneous tasks and convenience but in fine it’s like speeding up while driving from work to home, it’s not really the seconds or even minutes daily that count, it’s where you are going.
So… a “dumb” phone will probably for most not make productivity “tank” IMHO.
Yes, your productivity is going to tank. No way you’ll be prepared for a full air gapped machine on day 1.
until you need to collaborate with the average person who uses google docs and gmail
What does that have to do with a phone?
Edit: FWIW you can say no (ideally explaining why, even providing an alternative while doing so, e.g. NextCloud with CollaboraOffice, for email… well you can clarify in a footer that this email thread is not private and suggest creating Tuta or ProtonMail account, even if one time use) to people who use Google Docs and GMail. You can also have a one time use account.
TIL I’m a privacy activist–who can help me get to the ghost mode?
(Do I even want to get there or is that limited to journalists who have entire states trying to unalive them?)There is this steadily growing activist group that you could join up with.
Do I even want to get there
Only you can answer that.
or is that limited to journalists who have entire states trying to unalive them?
Pretty much, but if you want to give up all technology, work for yourself, and fake your death, then more power to you!
Seems like faking your death would cause more privacy problems than it solves. Why not just “stay alive” with a completely innocuous identity? Then adopt some new identity which cannot be traced back to the original?
If you’re alive, you are asked for documents such as property records, taxes, etc. and if you refuse then bad things happen. If you fake your death, no more questions are asked and you can take on fake identities. In essence, faking your death takes your identity out of “the system”
limited to journalists who have entire states trying to unalive them. Don’t live your life in fear
You should stage your death, like they tried to do on prison break and then move to Mexico or Columbia. Send me a DM for more information /J
Easier than you think it is. Hard to keep at it. All you need to do is stop using a phone or computers. Death cert is only needed when you’ve been compromised and people are out to get you. Gold isnt really usable unless you stumble onto a secret underground society where all trade is done in gold. Realistically, you’d sooner be trading goods (or services) for other goods (or services).
This level technically shuns technology and that brings its own challenges. Its like saying you cant have privacy with technology. I dont necessarily agree with this statement so I’d say don’t go to this level.
I think I’m probably slowly transitioning to “the ghost” but more as a matter of digital minimalism than for privacy lmao
I’m like a mix of the three tiers above ghost and in not really trying to be which is odd