The is quite flexible. I compiled a list of examples:
What I like: edit a copy of any on the web and embed it. .
I am wondering how people use it. As I am not them on my hosted instance, I do not know. If you use it, please get in touch :)
Hat sich, so frage ich mich schonmal jemand aus der bubble kompetent mit dem z. B. bei auseinandergesetzt Hintergrund, der Anbieter will seinen Kunden den Zugang zu den eigenen Dokumenten, wie Rechnung etc. nur noch ausschlielich ber eine mit verseuchte App anbieten. retrt erwnscht.
EU verlangt von Online-Plattformen Gratis-Dienste ohne personalisierte Werbung
Die EU-Aufsichtsbehrden fordern groe Online-Plattformen zu einer akzeptablen Alternative ohne Datenfreigabe auf, statt nur "Zustimmen oder zahlen" anzubieten.
Tracking Mobile Network Surveillance Tracking Methods and How to Mitigate Against ThemThis list is not exhaustive by any means, but it will serve as a good introduction. I am working on a proper longform post to simplify and flesh out this topic with more detailed, actionable advice.#cybersecgirl #mobile #tracking #privacytechprohttps://techcrunch.com/2023/12/16/google-geofence-warrants-law-enforcement-privacy/FBI / Cast Cellular Analysis and Geo-Location Guide 2019 (Unclassified)https://s3.documentcloud.org/documents/21088576/march-2019-fbi-cast-cellular-analysis-geo-location-field-resource-guide.pdfMobile Network Surveillance tracking methods include:Geofencing, Geolocation Trilateration Triangulationhttps://tracki.com/pages/how-gps-tracker-works-and-cell-phone-tower-triangulation-accuracyStingrays / Aerial Stingrays (Dirtboxes)https://sls.eff.org/technologies/cell-site-simulators-imsi-catchershttps://puri.sm/posts/taking-the-sting-out-of-stingray/IMSIhttps://www.kicksecure.com/wiki/MobilePhoneSecurity#InternationalMobileSubscribedIdentity(IMSI)https://www.whonix.org/wiki/SurveillanceCapabilitiesMalicious SMS Re-Routinghttps://www.kicksecure.com/wiki/MobilePhoneSecurity#MaliciousSMSRe-routingMobile Device Privacy and Securityhttps://www.kicksecure.com/wiki/MobilePhoneSecurity#TelephonyProtocolsBluetoothhttps://arxiv.org/pdf/2107.05868Airtagshttps://arstechnica.com/gadgets/2023/05/nypd-urges-citizens-to-buy-airtags-to-fight-surge-in-car-thefts/Full resources: https://buggedplanet.info/index.phptitle=MainPageSome Mitigations:Use GrapheneOS. #GrapheneOS is able to turn off Wifi and bluetooth scanning + GPS.https://i.nostr.build/Q7e6K.jpg Faraday bags, airplane mode, modem and sensor kill switches, always-on VPN. Do not autoconnect to WiFi or Bluetooth (keep off when not in use)RFID (keep off when not in use)IMEI changehttps://www.srlabs.de/blog-post/blue-merlehttps://github.com/srlabs/blue-merleBluetoothhttps://github.com/Semper-Viventem/MetaRadarAirGuardhttps://discuss.privacyguides.net/t/airguard-foss-airtag-detector/12391https://github.com/seemoo-lab/AirGuardLink ohne
Genial, ein Sampler als Plugin verfgbar fr Linux/Mac/Windows
Part3:
Multi-factor authentication / 2FA:
- I use Authy as an authenticator app, and enable 2FA on every site that offers it. But if you only use it for your e-mail provider, that'sa major improvement.
Extra indulgence:
- I've subscribe to Incogni for one year. They will try to get your e-mail address removed with as many data brokers as possible. Unfortunately only for one e-mail address.
I think that's everything, but I'm open for other tips and tricks. Sorry for the long post.
Part 2:
Disposable e-mail addresses:
I only use my real e-mail address for truly trusted recipients. What about all others Well...
- SimpleLogin.io will allow you to create as many e-mail addresses as you like (only about 5 in a free account though). I've added my own custom domain. Added bonus is that you can see which e-mail addresses generate spam. In that case disabling the address is simple.
Secure cloud storage:
I wanted to stop using Google Drive, because, well, Google
- pCloud will let you buy (not rent) cloud space, buy once and keep using it as long as you like. pCloud is a Swiss company, so protected by strict privacy law. It also integrates nicely with Linux, WIndows or MacOS
Passwords:
- Bitwarden does this pretty well and secure. I used to use LastPass, but in the end it leaked like a sieve
Just in case you're interested, this is how I try to stay secure and private online.
(multipart)
Ads and trackers:
Malware is dangerous, trcking kills your privacy and ads are simply annoying and slow down your browsing, so:
- NextDNS will filter out most ads, malware and trackers. Aditionally, you get encrypted DNS and if necessary some extra filters like gambling or porn
- The uBlock Origin browser plugin does the same blocking, I've added it in case NextDNS misses something
- The Trace Online Tracking Protection browser plugin will prevent browser fingerprinting, this only seems to work on Linux, not on my Chromebook. Just have a peek at ...
- Don't use Chrome browser (or Edge). I'm using Firefox on Linux and Kiwi on Android. Brave browser is also quite good.
Fascinating.
"This paper proposes mSAIL, 8 8 2.6 mm and 62 mg embedded system for monarch migration tracking, constructed using 8 prior custom-designed ICs providing solar energy harvesting, an ultra-low power processor, light/temperature sensors, power management, and a wireless transceiver, all integrated and 3D stacked on a micro PCB with an 8 8 mm printed antenna."
Androids AirTag competitor gears up for launch, thanks to iOS release
A and baseband is to be considered at all times, and even if people were to tunnel everything via / that won't avoid the and "" aspect.
Ideally we'd have stuff like the & ready to , but sadly I've to still work on getting the necessary done based upon / .
Granted, the best thing one can do is to bounce public WiFis with anonymized MAC addresses...
That works okay with Tor Bridges, but won't work in like where you only have a national intranet and the only options you have to get any access is through smuggled SIMs at the Chinese and Russian Border...
As someone who lives on the web, I understand the importance of cookies and will often just click "allow all". This time on the other hand...
hat offensichtlich seine Website "optimiert" und meine Antwort ist ein schallendes nein!
Perhaps (only guessing) you don't overview completely the ramifications of using and the like. I do to large extent. I personally had two quite frightening experiences with Google myself. Since then I am very strict in my decline of Google and the rest of the gang, sorry.
just looked at the DDG news section - I think MSN stuff is unavoidable, but you don't have to open it in an app - click Expand Article instead.
Vivaldi is a very good private browser. But keep DDG for the App Tracking Prevention.
Schwurbeln statt Fakten. Der -Befrworter basht mal wieder gegen die Datenschtzer und argumentiert wie toll doch sei und wie schlecht ist. Beispiele werden nicht geliefert.
Dass Verhaltensanalyse stattfindet, wird in keinem Wort erwhnt. Und natrlich kein Wort ber den Klau des Generalschlssels oder ber die Berichte der letzten Hacks.
Genug user sind ja schon ignorant genug was und und angeht. Aber kann man im Gegensatz dazu mit eigenen Augen sehen und vielleicht bringt das ja bei einigen den Stein ins Rollen oder das Fass zum berlaufen.
Im building , a new blogging service
- No
- No
- No
- No
- No
- No registration to try
- first
- mode
- Read anywhere (even on ).
- drag/drop
- Bring your own
You can check out my blog mirror at
Happy to send invites.
Please help me get the word out
Still the only possible battery replacement for apple customers().
: von und verriet Empfngeradressen
websites share visitors' data with , The Register
Could have been worse last time researchers checked it was 98.6%
CALL
We are looking for websites without , which do not source any external content and, if possible, do not set .
Languages initially: DE - EN - ES
Thank you for every message.
Spreading the word would also be a big help.
AUFRUF
Gesucht werden Webseiten ohne , die keine externen Inhalte beziehen und mglichst auch keine setzen.
Sprachen vorerst: DE - EN - ES
Vielen Dank fr jede Meldung.
Weitersagen wre ebenfalls eine groe Hilfe.
: des -Herstellers kommt ber Online-Werbung heise online
bizarre, it still powers the bluetooth chip when the phone is off allowing it to continue sending beacons for the "Find My Device" network
"Android 15 could allow devices to be tracked even when switched off"
It stands to reason that if you want to get a hold of a lot of data, which technically has value, your job would be the devalue said data as much as possible.
This is what happened to the citc 2000, when covered every single page like a plague of locusts. Your eyeball time was devalued.
Then, basically devalued your personal information by making it normal to give all of it away.
Now Facebook wants $10 to remove ads, but not .
Just a reminder that on March 28th, 2017 the U.S. House voted to approve a Senate resolution that allows internet service providers to sell your browsing history to anyone who will pay for it.
Remember, your U.S. ISP is legally spying on you, tracking where you go on the internet, and then shamelessly reselling that information.
...because the above on contains a ... unfortunately I couldn't post the link usable here on . That's why the link shortener for once, but not one that you. You can see which one, why and alternatives in the link:
:mastodon: GER
Integrate the X (twitter) tracking pixel on your LnkBio page
:
von und verriet .
Ein Designproblem in der der und des chinesischen Versenders Yun Express hat dazu gefhrt, dass Dritte die Empfngeradressen deutscher DHL-Kunden ansehen konnten. ...
Es folgte ein Vortrag von Andreas Mayer (HS Heilbronn): "Self- & Running a Marathon: Is your in Danger"
Rachelle Sellung prsentierte eine Forschungsarbeit des iaostuttgart
auf der GI zum Thema or being tracked: How much do self-trackers care about their datas
Darum ist Microsoft 365 schlecht fr die : Deshalb wre der passende Begriff. Alles in allem wird es einer der Grnde sein, warum die DSK sagt, dass nicht datenschutzkonform einsetzbar ist.
This is the repository of the trackenn prototype that was released a month ago
Ad revenue
by Jeremy Keith
Offenbar versuchen Webseiten ihr immer strker zu verschleiern, denn wer nennt eine JavaScript-Datei schon jslzljvXWO98rBqSWMwogCpcmHZKMdtofun4HuVbTY.js
Es artet aus und nimmt groteske Formen an.
Wie oft bekommt man eigentlich eine neue IP-Adresse
Ich teste das gerade mit diesem Script, dass ich tglich aufrufe:
printf "IP: %s - %sn" $(curl -s ipinfo.io/ip) $(date +'%d.%m.%Y') >>iplog4.txtprintf "IP: %s - %sn" $(curl -s v6.ipinfo.io/ip) $(date +'%d.%m.%Y') >>iplog6.txt
Knnt ihr auch manuell abrufen und notieren (oder lokal im System abfragen, aber das ist meist komplizierter):
Mich interessieren die Ergebnisse wegen :
How do you normally track your progress towards goals you have
Fjords, Pharaohs or Koalas Time to Plan for Your Next Eclipse
--
<-- shared media article
--
If you cant get enough of totality, or missed out this time, youll have three more chances in the next four years in destinations like Iceland, Spain, Egypt and Australia