The Privacy Iceberg

This is original content. AI was not used anywhere except for the bottom right image, simply because I could not find one similar enough to what I needed. This took around 6 hours to make.

Transcription (for the visually impaired)

(I tried my best)

The background is an iceberg with 6 levels, denoting 6 different levels of privacy.

The tip of the iceberg is titled “The Brainwashed” with a quote beside it that says “I have nothing to hide”. The logos depicted in this section are:

The surface section of the iceberg is titled “As seen on TV” with a quote beside it that says “This video is sponsored by…”. The logos depicted in this section are:

An underwater section of the iceberg is titled “The Beginner” with a quote beside it that says “I don’t like hackers and spying”. The logos depicted in this section are:

A lower section of the iceberg is titled “The Privacy Enthusiast” with a quote beside it that says “I have nothing I want to show”. The logos depicted in this section are:

An even lower section of the iceberg is titled “The Privacy Activist” with a quote beside it that says “Privacy is a human right”. The logos depicted in this section are:

The lowest portion of the iceberg is titled “The Ghost”. There is a quote beside it that has been intentionally redacted. The images depicted in this section are:

  • A cancel sign over a mobile phone, symbolizing “no electronics”
  • An illustration of a log cabin, symbolizing “living in a log cabin in the woods”
  • A picture of gold bars, symbolizing “paying only in gold”
  • A picture of a death certificate, symbolizing “faking your own death”
  • An AI generated picture of a person wearing a black hoodie, a baseball cap, a face mask, and reflective sunglasses, symbolizing “hiding ones identity in public”

End of transcription.

  • iterable@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    Gold is great until you find out you can manufacture it and mass production was kept secret to avoid what happened with diamonds.

    • Jolteon@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      The day we can mass produce gold is the day we have a post-scarcity society. Full elemental transmutation, which would be required to mass produce gold, would also eliminate virtually all resource shortages.

        • Jolteon@lemmy.zip
          link
          fedilink
          arrow-up
          0
          ·
          1 month ago

          Post-scarcity refers to most goods being able to be produced in abundance with minimal human labor. Even assuming that current food production fully falls under that umbrella, housing definitely does not, and it requires a lot more than just food and housing.

          • jagged_circle@feddit.nl
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 month ago

            Housing it definitely does. There’s more empty houses than homeless people.

            We’ve already arrived at post scarcity. All we need to do is this off the capitalists that keep unused housing empty. The scarcity is artificial

            • Jolteon@lemmy.zip
              link
              fedilink
              arrow-up
              0
              ·
              1 month ago

              I was referring to the fact that building and maintaining housing is still a largely manual process, and requires a fairly large amount of human labor. Maintaining power, water, sewage, and other things required for modern housing requires an even larger amount of human work.

              Whether there are enough houses to actually fit all the people is unrelated to this.

              • jagged_circle@feddit.nl
                link
                fedilink
                English
                arrow-up
                0
                ·
                1 month ago

                My point is we already did all that. Thanks to efforts from our ancestors, we no longer have a scarcity of housing.

                What we do have is a bunch of oligarchs who have stolen our housing and are holding it for ransom

    • Owl@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      produce gold? please tell me how one “mass produces” a base element?

  • nossaquesapao@lemmy.eco.br
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Funny how you need more and more technical knowledge to go deeper into privacy, until the last level, which is basically giving up on technology itself.

      • wolfinthewoods@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        So what’s the deal with i2p? I heard it was a more secure alternative to vpns, I downloaded it but I haven’t been motivated to figure out how to set it up on Linux.

            • sploodged@lemmy.dbzer0.com
              link
              fedilink
              arrow-up
              0
              ·
              1 month ago

              as a darknet it’s more secure than tor, but less people use it so less anonymous. the benefits are really for using in-network services there, not so much for accessing the clearnet, though you’ll find clearnet things bridged to i2p

            • swelter_spark@reddthat.com
              link
              fedilink
              English
              arrow-up
              0
              ·
              1 month ago

              In some ways I2p is more secure, but it has its own pros and cons. It’s primarily used with services & sites within its own network, similar to onion sites, and used that way it’s said to be faster than Tor. It can be used for torrenting with a client that supports it, like qBittorrent or BiglyBT, without harming the network. There are outproxies you can use if you want to anonymize access to normal websites, but there’s only a few of them, and it’s slow. You can have it and Tor running at the same time without them interfering with each other, though.

              • wolfinthewoods@lemmy.ml
                link
                fedilink
                English
                arrow-up
                0
                ·
                30 days ago

                So, it sounds like you’d be better off just running Tor or a vpn unless you have a specific use-case for i2p. I looked briefly at the install instructions, but it seemed to be like it would be a hassle to initially setup on my linux build.

                • swelter_spark@reddthat.com
                  link
                  fedilink
                  English
                  arrow-up
                  0
                  ·
                  edit-2
                  28 days ago

                  I think that would be fair to say. I mostly run it to contribute to the network, so that other people can communicate or share files more privately. (On OpenSuSE, it can be installed from the repo and just run with no special configuration.)

  • PeteWheeler@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    Thanks for providing this. It is obvious you put a lot of time into this. Truly appreciated. I will have to look into these.

    How did you find these yourself?

  • mycamgirl@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I wouldn’t put Telegram at the level. I would put it in “The Brainwashed.” Its encryption is disabled by default. You need to manually enable it on each chat, and you can’t enable it on group chats. The app gives a false sense of privacy. Telegram flaunts its end-to-end encryption, but it never mentions that it is disabled by default, and it refuses to enable the default. The final result is that people are not using the feature.

    A cryptographer and professor wrote a good piece about Telegram’s encryption, calling it “unusual” and the “non-standard authenticated encryption mode ever invented”: Is Telegram really an encrypted messaging app?

  • Owl@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    You play games on steam? clearly brainwashed.

    also how dare you slander Malwarebytes like that

  • PraiseTheSoup@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    1 month ago

    I use Keepass but mostly for convenience and I don’t understand why it’s in the 5th category. If I have 50 different accounts with 50 different passwords but they can all be had with one keepass password, how is that different than having 50 different accounts all using the same password?

  • jagged_circle@feddit.nl
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I give workshops oj privacy. I always tell them that if they get nothing else out of my presentation, its that they should use a password manager.

    Honestly I think keepass should be beginner. That comes first before everything else.

    Also I think Tor Browser should come before VPNs. Its free and easier to use than VPNs (for when you want to google something secret and don’t want to be tracked. Most beginners would be selective like that)

    • Bazoogle@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      Why keepass and not Bitwarden? Wouldn’t bitwarden be more user friendly for trying to ease people into secure technologies?

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        1 month ago

        Bitwarden had some security issues historically. I generally recommend using software for password managers that isn’t internet connected.

        My keepass trainings involve generating a veracrypt encrypted USB drive (for windows and Mac users) for storing a backups of their keepass file. I also recommend they upload it to whatever cloud storage they use (google drive or iCloud usually)

        • Bazoogle@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          1 month ago

          Bitwarden had some security issues historically.

          What security issues? If you mean potential security vulnerabilities researcher found that they’ve patched, I don’t understand how that would be different from Keepass and their previous security vulnerabilities. Bitwarden has never had a security issues historically that I know of. Lastpass, on the other hand…

          I generally recommend using software for password managers that isn’t internet connected.

          I also recommend they upload it to whatever cloud storage they use

          I also really don’t get these two. They seem to contradict each other.

          I usually recommend bitwarden, where they can use the browser extension and mobile phone app. It gives them autofill features on all their sites. Getting someone to change their passwords and use a password manager is already difficult enough. Giving them the most convenient option is going to make it more like they stick with it.

  • Gina@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    Throw away mobile phone and just use an air gapped machine. Your productivity will tank but then you’ll eventually add local databases of the shit you actually need on your air gapped machine and your productivity will triple.

      • Gina@lemmy.wtf
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Well shit, I shouldn’t be the first to tell you that if you’re serious about your privacy then get off of windows.

        Also if the CIA is targeting with you with air gap malware, then you fucked all the way up. Pedophiles are saying “damn, fuck that guy”

    • utopiah@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      Your productivity will tank

      Will it though? It’s not like paying with cash or even a credit/debit card takes radically longer than paying with a phone. It’s not like reading a book vs mindlessly scrolling Reddit or Lemmy makes productivity drop.

      We get used to instantaneous tasks and convenience but in fine it’s like speeding up while driving from work to home, it’s not really the seconds or even minutes daily that count, it’s where you are going.

      So… a “dumb” phone will probably for most not make productivity “tank” IMHO.

      • Gina@lemmy.wtf
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Yes, your productivity is going to tank. No way you’ll be prepared for a full air gapped machine on day 1.

        • utopiah@lemmy.ml
          link
          fedilink
          arrow-up
          0
          ·
          edit-2
          1 month ago

          What does that have to do with a phone?

          Edit: FWIW you can say no (ideally explaining why, even providing an alternative while doing so, e.g. NextCloud with CollaboraOffice, for email… well you can clarify in a footer that this email thread is not private and suggest creating Tuta or ProtonMail account, even if one time use) to people who use Google Docs and GMail. You can also have a one time use account.

  • tisktisk@piefed.social
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    TIL I’m a privacy activist–who can help me get to the ghost mode?
    (Do I even want to get there or is that limited to journalists who have entire states trying to unalive them?)

    • The 8232 Project@lemmy.mlOP
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      Do I even want to get there

      Only you can answer that.

      or is that limited to journalists who have entire states trying to unalive them?

      Pretty much, but if you want to give up all technology, work for yourself, and fake your death, then more power to you!

      • jaybone@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        Seems like faking your death would cause more privacy problems than it solves. Why not just “stay alive” with a completely innocuous identity? Then adopt some new identity which cannot be traced back to the original?

        • The 8232 Project@lemmy.mlOP
          link
          fedilink
          arrow-up
          0
          ·
          1 month ago

          If you’re alive, you are asked for documents such as property records, taxes, etc. and if you refuse then bad things happen. If you fake your death, no more questions are asked and you can take on fake identities. In essence, faking your death takes your identity out of “the system”

    • murky0106@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      limited to journalists who have entire states trying to unalive them. Don’t live your life in fear

    • Rose56@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      You should stage your death, like they tried to do on prison break and then move to Mexico or Columbia. Send me a DM for more information /J

    • PieMePlenty@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      1 month ago

      Easier than you think it is. Hard to keep at it. All you need to do is stop using a phone or computers. Death cert is only needed when you’ve been compromised and people are out to get you. Gold isnt really usable unless you stumble onto a secret underground society where all trade is done in gold. Realistically, you’d sooner be trading goods (or services) for other goods (or services).

      This level technically shuns technology and that brings its own challenges. Its like saying you cant have privacy with technology. I dont necessarily agree with this statement so I’d say don’t go to this level.

  • dontblink@feddit.it
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    I think I’m probably slowly transitioning to “the ghost” but more as a matter of digital minimalism than for privacy lmao