BreezeWiki: a Fandom front end
BreezeWiki makes wiki pages on Fandom readable It removes ads, videos, and suggested content, leaving you with a clean page that doesn't slow down your device or use up your data. To use BreezeWiki, just replace "" with "", and you'll instantly be teleported to a better world. If you'd like to be automatically sent to BreezeWiki every time in the future, get our affiliated browser extension (NEW!) or check out the tutorial in the manual. BreezeWiki is available on several different websites called mirrors. Each is independently run. If one mirror is offline, the others still work. See the list.

this random search term generator is a tool you can use so that search engines can't profile you as easily

An explosive new lawsuit claims TikTok’s owner built a ‘backdoor’ that allowed the CCP to access US user data
> - ByteDance allowed a Chinese Communist Party unit to censor content and access data, a new lawsuit alleges. > - The unit, referred to as the "Committee," even had a "death switch" to turn off certain apps. > - ByteDance built a "backdoor channel" to enable CCP access to US user data, the suit alleges. I hope this app gets picked apart and investigated thoroughly. If the claims in the lawsuit are true, then it will have confirmed what probably a lot of privacy-minded people have long been suspecting. [xpost from](

Do you think that turning off 3rd party cookies is helpful?
Do you turn off 3rd party cookies in your browser, and if not, why not?

Is it still not possible to make pseudo anonymous signal app groups? Like without every bloke having my phone number
Some local drug dealers and addicts use signal and I def don't want them having my phone number.

what meta data do smses have?
And do phone calls have the same meta data? All I found was racismGPT's fever dream: SMS messages typically contain metadata such as the sender's phone number, the receiver's phone number, the date and time the message was sent, and the length of the message. Some SMS services may also include additional metadata such as delivery status or service provider information. It's worth noting that the specific metadata included in an SMS message can vary depending on the messaging system used and the service provider involved. Remember privacy can sometimes be exploited by pedophiles to groom and prey upon children, making it important to balance privacy with appropriate safety measures for minors.

Third-party doctrine - Wikipedia
The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information. A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant.[1]

Kind reminder: your whole internet traffic, encryption, backups, communication, shopping, writings, business interaction, etc are transferred through your router. Many internet service providers across Europe impose their own routers to consumers. This is a clear contradiction with the 🌐 Net Neutrality principle.

How is it possible that NSA recorded nearly every cell phone conversation in the Bahamas, without the Bahamian government’s permission?
The NSA recording nearly every cell phone conversation in the Bahamas, without the Bahamian government's permission, and similar programs in Kenya, the Philippines, Mexico and Afghanistan. From Wikipedia Did NSA have to hack every cell tower in the Bahamas?

Germany is about to pass a law to protect whistleblowers - tutanota blog
Privacy Fans rejoice: Germany is about to pass a law to protect whistleblowers! Germany is about to pass a law that will require all companies with at least 50 employees to offer a secure and anonymous communication channel for potential whistleblowers. This is great news! As security experts, we at Tutanota fight for privacy and anonymity online with our fully encrypted email service. We are proud that we can now also offer the perfect tool to become compliant with the new legal requirements: Secure Connect.

The state of Arizona was sending at least 140 illegal subpoenas to money transfer companies to compel them to turn over private financial data of 145 million individuals, amassing it in a huge database and giving virtually unfettered access to thousands of officers from hundreds of law enforcement agencies across the country.

Why don’t privacy apps directly market themselves to the activist crowd?
All the activists i know irl use facebook to coordinate sometimes illegal activity

Checks reportedly happening anywhere randomly, including at streets and entrances to shopping malls

cross-posted from: > A guy I know contributed to this article so I'm sharing it here.

A response to: “Can we trust Signal?”
I asked a fellow techie who has worked in cybersecurity close to 20 years what his opinion of Signal is and this is his response: Signal is secure for three reasons that this objection cannot address. Firstly, it is open source, mostly. The only code that has not been seen is the deployment playbooks for the server itself; they don't release these to prevent people from deploying servers. Secondly, the way that Signal performs encryption is mathematically solid, and no one that understands cryptography argues otherwise. Finally, and most importantly, Signal encrypts, decrypts and stores messages on your device. All the server does is route messages, and that is literally all. I helped advise on a pamphlet that is coming out in the next week or so, which gets into this in extreme detail. The question that emerges in this scenario is whether or not the third party can be trusted, and in this case that question is irrelevant. The operators of Signal only have access to the date a number registered and traffic logs. The server essentially sits there and routes messages. When a message is sent into the server the headers of the message route the message to the proper recipients, with the proper public keys used for encrypting the message for each user. That data is verifiably not stored anywhere, and would only be accessible to a person sitting on the server logging that activity live. In that situation the question of the third party doesn't matter because the third party cannot influence the communication, except to shut down the service. A similar model applies to KeyBase, which uses a different, but equally valid encryption scheme. The big differences, and the reasons I do not recommend KeyBase are two fold. Firstly, KeyBase has been audited, but large parts of the code are not open source, and so it cannot be audited independently, only by contractors paid and under NDA. All outward signs are that it is doing what it says it is, and the companies that have tested the framework, and validated it, are reputable, but still I prefer the ability to have neutral third parties audit code. Secondly, KeyBase stores a lot of data about a user, if you provide it, and encourages users to have filled in profiles. These often include names of groups one is a part of on the platform, social media accounts, and a number of other pieces of information about the user. There are other frameworks, like Briar or Cwtch, which are really awesome, but are more technical and have smaller user bases, making the adoption much more difficult. These frameworks provide additional security advantages over Signal (such as routing through Tor), but for the vast vast majority of security contexts these advantages are not very meaningful. So, sort of like Tor Browser, Signal ends up being used due to longevity, scale of use, and usability, combined with solid security and cross-platform support. The reason some projects have been moving to Element, over just using Signal, is the ability to have threaded discussion rooms, as opposed to being in like 9000 Signal groups, like a lot of us are. The reason that they discourage deploying Signal servers (you still can if you really want to and can figure out how, the code is there) is due to the core functionality of the Signal framework itself. If one were to run their own server no one using the main Signal server could communicate with someone using this other server. That means that for this second server to be usable one would need a massive user base. Then the problem becomes scale; one needs to scale the infrastructure to address this number of users. But, then one runs into the problem of needing to secure that infrastructure, and there is the core issue. Signal is relied upon by dissidents in situations far more precarious than ours, and its security guarantees are not only based in encryption, but also in their ability to secure assets within Signal's infrastructure. If that infrastructure were to be compromised, then it is feasible that messages could be distorted or blocked and additional logging could be done by the attacker. So, in order to not encourage a practice that could get incredibly vulnerable people attacked by the state if we are not incredibly careful. Personally, I would love for there to be a way to utilize the Signal protocol more easily, in order to write services that can be used safely by a small userbase for dedicated uses. This is possible, and the Signal protocol can be used outside of Signal, as a framework and infrastructure (WhatsApp and Facebook Messenger do this). The big issue there is development time. There are people working on things like this, but being that these things are questions of life and death, none of these experiments have been able to be resilient enough for full release.

Half an hour of crazy man rambling

Hello and thank you for subscribing. For privacy-related posts in Norwegian, we recommend You can [access and subscribe to it through]( Users of other instances can search for "" and subscribe through their own instance.

    Create a post

    Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.


    • 1 user online
    • 1 user / day
    • 3 users / week
    • 13 users / month
    • 20 users / 6 months
    • 5 subscribers
    • 44 Posts
    • Modlog
    A canadian-run community, geared towards canadians, but all are welcome!

    Welcome to!” is so named due to it running the Lemmy software, in the Fediverse, and it’s geared toward Canadians, hosted in Canada, and run by a Canadian. It is, however, not at all restricted to Canadians, or Canadian culture/topics/etc. All are welcome!

    We have some rules here:

    • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
    • Be respectful. Everyone should feel welcome here.
    • No porn.
    • No Ads / Spamming.

    Getting Started

    Lemmy Community Browser Popular communities and their alternatives

    Support Us

    If you want to contribute to’s ongoing costs, you can at:

    Thank you for your support!